Facing man-in-the-middle and route diversion attacks in energy-limited RFID systems based on mobile readers.
Laura GalluccioGiacomo MorabitoMarco CataniaPublished in: Med-Hoc-Net (2011)
Keyphrases
- rfid systems
- security protocols
- security problems
- mobile rfid
- mobile devices
- rfid tags
- security mechanisms
- radio frequency identification
- countermeasures
- energy consumption
- information systems
- anti collision
- mobile communication
- mobile users
- real time
- authentication protocol
- security issues
- mobile applications
- mobile phone
- resource constrained
- security requirements
- data security
- computer networks