Weaknesses of two RFID protocols regarding de-synchronization attacks.
Mete AkgünM. Ufuk ÇaglayanPublished in: IWCMC (2015)
Keyphrases
- security protocols
- rfid tags
- cryptographic protocols
- rfid systems
- anti collision
- secure communication
- security flaws
- radio frequency identification
- low cost
- countermeasures
- authentication protocol
- security properties
- rfid technology
- malicious attacks
- security mechanisms
- data collection
- supply chain
- mutual authentication
- key distribution
- watermarking scheme
- radio frequency identification rfid
- security risks
- rfid reader
- malicious users
- video watermarking
- communication protocols
- lightweight
- communication protocol
- trusted third party
- security analysis