On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis.
Bruce NdibanjeHyunho KimYoung-Jin KangYoung-Sil LeeHoon-Jae LeePublished in: AINA (2015)
Keyphrases
- rfid systems
- security analysis
- authentication protocol
- mutual authentication
- rfid tags
- rfid technology
- radio frequency identification
- security requirements
- security problems
- smart card
- security protocols
- rfid reader
- anti collision
- lightweight
- public key
- low cost
- cost effective
- encryption scheme
- information systems
- supply chain management
- information security
- wireless sensor networks