A Proposed RFID Authentication Protocol based on Two Stages of Authentication.
Abdulhadi AlqarniMaali AlabdulhafithSrinivas SampalliPublished in: EUSPN/ICTH (2014)
Keyphrases
- authentication protocol
- rfid tags
- mutual authentication
- rfid systems
- radio frequency identification
- low cost
- lightweight
- security analysis
- authentication scheme
- smart card
- user authentication
- public key
- rfid technology
- key distribution
- password authentication
- security protocols
- ban logic
- resource constrained
- authentication mechanism
- security issues
- session key
- security mechanisms
- hash functions
- end to end
- trusted third party
- secret key
- information security
- power consumption
- dimensionality reduction