Reconsidering Ryu-Takagi RFID authentication protocol.
Dang Nguyen DucKwangjo KimChan Yeob YeunPublished in: ICITST (2010)
Keyphrases
- authentication protocol
- fuzzy model
- rfid tags
- rfid systems
- mutual authentication
- radio frequency identification
- low cost
- lightweight
- rfid technology
- fuzzy rules
- fuzzy sets
- security analysis
- input output
- membership functions
- public key
- rule base
- authentication scheme
- secret key
- resource constrained
- smart card
- fuzzy clustering
- security issues
- security protocols
- pattern recognition
- cost effective
- trusted third party
- genetic algorithm
- neural network
- control system
- hash functions
- software engineering
- power consumption