Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication.
Shaoying CaiYingjiu LiChangshe MaSherman S. M. ChowRobert H. DengPublished in: CoRR (2022)
Keyphrases
- rfid tags
- mutual authentication
- authentication protocol
- low cost
- lightweight
- security analysis
- radio frequency identification
- rfid systems
- privacy protection
- cost effective
- resource constrained
- public key
- authentication scheme
- power consumption
- smart card
- security issues
- rfid technology
- security mechanisms
- security protocols
- secret key
- data collection
- intrusion detection
- rfid reader
- decision making