Security analysis of two lightweight RFID authentication protocols.
Shaohui WangZhijie HanSujuan LiuDan-wei ChenPublished in: Ann. des Télécommunications (2014)
Keyphrases
- authentication protocol
- lightweight
- mutual authentication
- security analysis
- rfid tags
- public key
- rfid systems
- radio frequency identification
- user authentication
- rfid technology
- smart card
- resource constrained
- key distribution
- cryptographic protocols
- security requirements
- security issues
- security protocols
- wireless sensor networks
- service oriented architecture
- secret key
- security properties
- key exchange