Vulnerabilities of RFID Security Protocol Based on Chaotic Maps.
Mete AkgünTubitak UekaeM. Ufuk ÇaglayanPublished in: ICNP (2014)
Keyphrases
- security protocols
- chaotic maps
- rfid tags
- security mechanisms
- rfid systems
- image encryption
- security issues
- radio frequency identification
- image encryption algorithm
- low cost
- image encryption scheme
- authentication protocol
- rfid technology
- chaotic sequence
- security services
- encryption algorithm
- lightweight
- authentication scheme
- cost effective
- security analysis
- smart card
- resource constrained
- security requirements
- security problems
- power consumption
- operating system
- information security
- public key
- key management
- supply chain
- software engineering
- key distribution
- secret key
- intrusion detection