Attacks and improvements to chaotic map-based RFID authentication protocol.
Mete AkgünAli Osman BayrakMehmet Ufuk ÇaglayanPublished in: Secur. Commun. Networks (2015)
Keyphrases
- authentication protocol
- chaotic map
- hash functions
- rfid tags
- image encryption
- rfid systems
- security protocols
- mutual authentication
- authentication scheme
- cryptographic protocols
- security analysis
- security mechanisms
- piecewise linear
- radio frequency identification
- smart card
- low cost
- security problems
- rfid technology
- secret key
- lightweight
- similarity search
- user authentication
- security issues
- s box
- resource constrained
- public key
- key distribution
- pseudorandom
- dynamic programming
- key management