Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse.
Krishna BagadiaUrbi ChatterjeeDebapriya Basu RoyDebdeep MukhopadhyayRajat Subhra ChakrabortyPublished in: HOST (2017)
Keyphrases
- authentication protocol
- rfid tags
- low cost
- rfid systems
- radio frequency identification
- mutual authentication
- rfid technology
- smart card
- real time
- lightweight
- cost effective
- public key
- security analysis
- embedded systems
- security issues
- security protocols
- resource constrained
- authentication scheme
- computer systems
- security problems
- distributed systems
- authentication mechanism
- password authentication