De-synchronization attack on RFID authentication protocols.
Nai-Wei LoKuo-Hui YehPublished in: ISITA (2010)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- radio frequency identification
- low cost
- lightweight
- smart card
- secret key
- public key
- security analysis
- rfid technology
- cryptographic protocols
- user authentication
- key distribution
- security issues
- power consumption
- cost effective
- resource constrained
- security protocols
- secure communication
- encryption scheme