A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels.
Hannan XiaoAwatif Ali AlshehriBruce ChristiansonPublished in: Trustcom/BigDataSE/ISPA (2016)
Keyphrases
- communication channels
- authentication protocol
- rfid tags
- mutual authentication
- rfid systems
- radio frequency identification
- low cost
- lightweight
- authentication scheme
- rfid technology
- smart card
- cloud computing
- secret key
- security analysis
- key distribution
- public key
- user authentication
- security protocols
- security issues
- resource constrained
- cost effective
- power consumption
- trusted third party
- password authentication
- security mechanisms
- loosely coupled
- private key
- anomaly detection
- data management