Vulnerability aware graphs for RFID protocol security benchmarking.
Shan ChangLi LuXiaoqiang LiuHui SongQingsong YaoPublished in: J. Comput. Syst. Sci. (2015)
Keyphrases
- rfid systems
- mutual authentication
- rfid tags
- security analysis
- authentication protocol
- rfid technology
- security protocols
- radio frequency identification rfid
- radio frequency identification
- privacy protection
- cryptographic protocols
- security problems
- security vulnerabilities
- lightweight
- security properties
- low cost
- secret key
- key agreement protocol
- key agreement
- authentication scheme
- public key
- buffer overflow
- security model
- denial of service attacks
- security requirements
- diffie hellman
- smart card
- supply chain
- security risks
- key exchange protocol
- protocol specification
- information security
- access control
- security issues
- mobile payment
- trusted third party
- intrusion detection
- security services
- elliptic curve
- key management
- security mechanisms
- risk assessment
- supply chain management
- network security
- privacy preserving