An efficient authentication protocol for low-cost RFID system in the prensence of malicious readers.
Shuang MeiXiaolong YangPublished in: FSKD (2012)
Keyphrases
- rfid tags
- low cost
- authentication protocol
- radio frequency identification
- rfid systems
- lightweight
- cost effective
- rfid technology
- real time
- resource constrained
- mutual authentication
- security protocols
- public key
- security issues
- smart card
- power consumption
- authentication scheme
- security mechanisms
- security analysis
- embedded systems
- intrusion detection
- wireless sensor networks