C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications.
Zhihua ZhangHuanwen WangYanghua GaoPublished in: Pers. Ubiquitous Comput. (2015)
Keyphrases
- chaotic map
- authentication protocol
- hash functions
- rfid tags
- rfid systems
- image encryption
- mutual authentication
- authentication scheme
- security analysis
- piecewise linear
- radio frequency identification
- user authentication
- public key
- low cost
- rfid technology
- lightweight
- similarity search
- private key
- secret key
- smart card
- s box
- resource constrained
- power consumption
- key distribution
- real time
- security requirements
- data distribution
- pseudorandom
- security issues
- supply chain
- data streams