Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag.
Thomas PlosMartin FeldhoferPublished in: SecureComm (2011)
Keyphrases
- rfid tags
- low cost
- security issues
- radio frequency identification
- rfid systems
- security level
- rfid technology
- low power
- real time
- mutual authentication
- security protocols
- security mechanisms
- authentication protocol
- cost effective
- embedded systems
- radio frequency identification rfid
- public key
- single chip
- low power consumption
- rfid reader
- resource constrained
- network security
- decision making