How to protect security and privacy in the IoT: a policy-based RFID tag management protocol.
Evangelos RekleitisPanagiotis RizomiliotisStefanos GritzalisPublished in: Secur. Commun. Networks (2014)
Keyphrases
- rfid systems
- rfid tags
- rfid technology
- radio frequency identification rfid
- mutual authentication
- radio frequency identification
- authentication protocol
- security problems
- privacy protection
- low cost
- security protocols
- security issues
- supply chain
- lightweight
- ubiquitous computing
- rfid reader
- security mechanisms
- privacy policies
- supply chain management
- computer networks
- key technologies
- security services
- sensitive information
- cost effective
- public key
- decision making
- trusted third party
- real time
- security analysis
- private information
- smart home
- data sharing
- social networking
- smart card
- power consumption