Designing secure RFID authentication protocols is (still) a non-trivial task.
Panagiotis RizomiliotisEvangelos RekleitisStefanos GritzalisPublished in: NSS (2011)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- radio frequency identification
- smart card
- security analysis
- lightweight
- radio frequency identification rfid
- cryptographic protocols
- public key
- user authentication
- security protocols
- key distribution
- rfid technology
- low cost
- security mechanisms
- security issues
- session key
- resource constrained
- cost effective
- ban logic
- secret key
- hash functions
- power consumption
- information systems