Tag Impersonation Attack on Two RFID Mutual Authentication Protocols.
Masoumeh SafkhaniNasour BagheriMajid NaderiYiyuan LuoQi ChaiPublished in: ARES (2011)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- radio frequency identification
- radio frequency identification rfid
- rfid reader
- low cost
- lightweight
- rfid technology
- smart card
- mutual authentication
- secret key
- anti collision
- security protocols
- cost effective
- public key
- security analysis
- resource constrained
- security issues
- cryptographic protocols
- key distribution
- ban logic
- security mechanisms
- power consumption
- end to end