How to solve collision and authentication issues using RFID protocol technology.
Albert B. JengLi-Chung ChangHahn-Ming LeeTe-En WeiSzu-Yu LinPublished in: ICMLC (2011)
Keyphrases
- mutual authentication
- authentication protocol
- radio frequency identification rfid
- rfid systems
- rfid tags
- security analysis
- rfid technology
- radio frequency identification
- anti collision
- data encryption
- technical issues
- supply chain
- password authentication
- privacy protection
- cost effective
- security mechanisms
- sensor networks
- security issues
- key technologies
- smart card
- social issues
- low cost
- trusted third party
- rfid middleware
- authentication mechanism
- lightweight
- case study
- data collection
- key agreement protocol
- secure communication
- formal analysis
- security problems
- supply chain management
- security protocols
- resource constrained