Secure Automated Delivery of Critical Goods with RFID-Based Tracking and Authentication.
Chaza ArajiHala AburajouhMaryam Al HailElias YaacoubPublished in: ISNCC (2023)
Keyphrases
- mutual authentication
- security analysis
- authentication scheme
- user authentication
- authentication protocol
- authentication mechanism
- data encryption
- security mechanisms
- rfid tags
- security requirements
- identity management
- integrity verification
- password authentication
- key distribution
- factor authentication
- privacy protection
- electronic commerce
- rfid systems
- visual tracking
- kalman filter
- particle filter
- lightweight
- radio frequency identification rfid
- secure manner
- encryption decryption
- rfid technology
- appearance model
- object tracking
- key agreement protocol
- key agreement
- private key
- real time
- key management
- electronic payment
- data collection
- low cost
- supply chain
- moving objects
- video sequences