Another Fallen Hash-Based RFID Authentication Protocol.
Julio César Hernández CastroPedro Peris-LopezMasoumeh SafkhaniNasour BagheriMajid NaderiPublished in: WISTP (2012)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- hash functions
- radio frequency identification
- lightweight
- low cost
- smart card
- rfid technology
- security analysis
- authentication scheme
- cost effective
- public key
- resource constrained
- security issues
- power consumption
- supply chain
- security protocols
- password authentication
- trusted third party
- security mechanisms
- similarity search
- secret key
- data distribution
- data analysis
- data model