Retrofitting mutual authentication to GSM using RAND hijacking.
Mohammed Shafiul Alam KhanChris J. MitchellPublished in: CoRR (2016)
Keyphrases
- mutual authentication
- rfid tags
- security analysis
- low cost
- radio frequency identification
- lightweight
- authentication protocol
- privacy protection
- rfid systems
- authentication mechanism
- resource constrained
- public key
- rfid technology
- power consumption
- cost effective
- secret key
- security issues
- trusted third party
- security protocols
- security requirements
- authentication scheme
- data analysis