Side-Channel Attack on a Protected RFID Card.
Rixin XuLiehuang ZhuAn WangXiaojiang DuKim-Kwang Raymond ChooGuoshuang ZhangKeke GaiPublished in: IEEE Access (2018)
Keyphrases
- security protocols
- rfid tags
- smart card
- power analysis
- secret key
- sensitive data
- authentication protocol
- radio frequency identification
- low cost
- rfid systems
- countermeasures
- information security
- security requirements
- rfid technology
- authentication scheme
- malicious users
- radio frequency identification rfid
- rfid reader
- mutual authentication
- security analysis
- location tracking
- data analysis
- denial of service attacks
- data collection