A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags.
Sarah AbughazalahKonstantinos MarkantonakisKeith MayesPublished in: SEC (2013)
Keyphrases
- rfid tags
- authentication protocol
- low cost
- radio frequency identification
- cost effective
- public key
- rfid systems
- lightweight
- rfid technology
- authentication scheme
- security issues
- resource constrained
- mutual authentication
- secret key
- key distribution
- user authentication
- real time
- embedded systems
- security protocols
- risk assessment
- security mechanisms
- sensor networks