Are RNGs Achilles' Heel of RFID Security and Privacy Protocols?
Atakan ArslanSüleyman KardasSultan Aldirmaz ÇolakSarp ErtürkPublished in: Wirel. Pers. Commun. (2018)
Keyphrases
- mutual authentication
- rfid systems
- authentication protocol
- security analysis
- rfid tags
- privacy protection
- secure multiparty computation
- security protocols
- anti collision
- security properties
- security issues
- security services
- trusted third party
- privacy preserving
- secret key
- radio frequency identification rfid
- authentication scheme
- rfid technology
- radio frequency identification
- cryptographic protocols
- security concerns
- security mechanisms
- homomorphic encryption
- personal information
- key distribution
- statistical databases
- private key
- smart card
- security problems
- low cost
- privacy issues
- data security
- personal data
- security requirements
- lightweight
- privacy requirements
- communication protocols
- individual privacy
- data sharing
- security policies
- private information
- public key
- semi honest
- supply chain
- confidential information
- key exchange
- preserving privacy
- intrusion detection
- key management
- access control
- outsourced databases