Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards.
Daewan HanDaesung KwonPublished in: Comput. Stand. Interfaces (2009)
Keyphrases
- rfid tags
- authentication protocol
- rfid systems
- radio frequency identification
- low cost
- rfid technology
- radio frequency identification rfid
- mutual authentication
- lightweight
- supply chain
- resource constrained
- public key
- security issues
- smart card
- security protocols
- authentication scheme
- security mechanisms
- security analysis
- power consumption
- distributed systems
- real time