A Security and Performance Evaluation of Hash-Based RFID Protocols.
Tong-Lee LimTieyan LiYingjiu LiPublished in: Inscrypt (2008)
Keyphrases
- mutual authentication
- rfid tags
- rfid systems
- security protocols
- authentication protocol
- security analysis
- rfid technology
- security properties
- radio frequency identification rfid
- anti collision
- key agreement protocol
- privacy protection
- communication protocols
- cryptographic protocols
- supply chain
- security services
- security requirements
- radio frequency identification
- security issues
- low cost
- secure multiparty computation
- security policies
- key distribution
- key exchange
- data collection
- application level
- network security
- key management
- rfid reader
- smart card
- security problems
- intrusion detection
- secret key
- trusted third party
- access control
- authentication scheme
- data distribution
- information security
- privacy preserving
- security mechanisms
- database systems
- public key
- ns simulator