A Two-Factor and Reader-Undedicated Authentication Scheme with Passive RFID Tags in WLAN.
Ya-Fen ChangWei-Liang TaiShao-Cian LinTi-Sheng KwamgPublished in: SITIS (2013)
Keyphrases
- rfid reader
- rfid tags
- authentication scheme
- authentication protocol
- public key
- secret key
- smart card
- rfid systems
- radio frequency identification
- cellular networks
- low cost
- lightweight
- mutual authentication
- user authentication
- rfid technology
- security analysis
- security flaws
- cost effective
- resource constrained
- mobile phone
- wireless networks
- security protocols
- security issues
- digital signature
- quality of service
- anti collision
- key distribution
- key management
- information systems
- power consumption
- security requirements
- security mechanisms
- information security