Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.
Krishna BagadiaUrbi ChatterjeeDebapriya Basu RoyDebdeep MukhopadhyayRajat Subhra ChakrabortyPublished in: SPACE (2019)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- radio frequency identification
- lightweight
- low cost
- rfid technology
- smart card
- security analysis
- radio frequency identification rfid
- security protocols
- security issues
- ban logic
- authentication scheme
- user authentication
- key distribution
- public key
- cryptographic protocols
- security problems
- resource constrained
- secret key
- real time
- security requirements
- hash functions
- authentication mechanism
- security mechanisms
- trusted third party
- password authentication
- power consumption
- wireless sensor networks
- encryption scheme
- information security
- distributed systems
- supply chain