Low-cost authentication protocol for passive, computation capable RFID tags.
Gul N. KhanMarkus B. MoessnerPublished in: Wirel. Networks (2015)
Keyphrases
- rfid tags
- authentication protocol
- low cost
- rfid reader
- radio frequency identification
- rfid systems
- lightweight
- cost effective
- user authentication
- authentication scheme
- public key
- real time
- resource constrained
- rfid technology
- security protocols
- security issues
- mutual authentication
- power consumption
- key distribution
- smart card
- secret key