Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols.
Süleyman KardasZiya Alper GençPublished in: Wirel. Pers. Commun. (2018)
Keyphrases
- authentication protocol
- chaotic map
- rfid tags
- rfid systems
- security protocols
- image encryption
- hash functions
- cryptographic protocols
- authentication scheme
- security analysis
- security problems
- security mechanisms
- radio frequency identification
- piecewise linear
- security requirements
- rfid technology
- security issues
- ban logic
- user authentication
- low cost
- smart card
- lightweight
- public key
- s box
- similarity search
- resource constrained
- key distribution
- standard model
- secret key
- cost effective
- private key
- power consumption
- database systems