Scalability and Security Conflict for RFID Authentication Protocols.
Imran ErgulerEmin AnarimPublished in: Wirel. Pers. Commun. (2011)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- radio frequency identification
- radio frequency identification rfid
- security analysis
- low cost
- security protocols
- lightweight
- rfid technology
- public key
- smart card
- ban logic
- security issues
- cryptographic protocols
- key distribution
- resource constrained
- power consumption
- cost effective
- security problems
- security mechanisms
- secret key
- session key
- security requirements
- knn