Proactive Batch Authentication: Fishing Counterfeit RFID Tags in Muddy Waters.
Qiongzheng LinLei YangYi GuoPublished in: IEEE Internet Things J. (2019)
Keyphrases
- rfid tags
- authentication protocol
- security mechanisms
- mutual authentication
- low cost
- radio frequency identification
- lightweight
- security issues
- authentication scheme
- resource constrained
- user authentication
- rfid systems
- public key
- cost effective
- rfid technology
- context aware
- rfid reader
- power consumption
- security protocols
- security level
- key distribution
- secret key
- security analysis
- cellular networks
- ubiquitous computing
- smart card
- real time
- private key
- radio frequency identification rfid
- mobile terminals
- digital signature
- security problems
- security services
- social media