Mutual RFID Authentication Scheme for Resource-constrained Tags.
Nai-Wei LoKuo-Hui YehPublished in: J. Inf. Sci. Eng. (2010)
Keyphrases
- rfid tags
- resource constrained
- authentication scheme
- authentication protocol
- public key
- secret key
- radio frequency identification
- smart card
- key management
- low cost
- lightweight
- rfid technology
- rfid systems
- security mechanisms
- user authentication
- mutual authentication
- security issues
- anti collision
- security analysis
- power consumption
- security flaws
- cost effective
- security protocols
- security requirements
- software engineering
- sensor networks
- wireless sensor networks
- high resolution