Scalable RFID authentication protocol based on physically unclonable functions.
Isil KurtFatih AlagözMete AkgünPublished in: Comput. Networks (2023)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- lightweight
- mutual authentication
- radio frequency identification
- smart card
- low cost
- security analysis
- rfid technology
- security protocols
- authentication scheme
- public key
- resource constrained
- data sets
- secret key
- cost effective
- software development
- trusted third party
- feature space