Achieving protection against man-in-the-middle attack in HB family protocols implemented in RFID tags.
Aisha AseeriOmaimah BamasagPublished in: Int. J. Pervasive Comput. Commun. (2016)
Keyphrases
- rfid tags
- authentication protocol
- low cost
- lightweight
- security protocols
- radio frequency identification
- anti collision
- mutual authentication
- rfid technology
- cellular networks
- rfid systems
- real time
- resource constrained
- security issues
- artificial intelligence
- security mechanisms
- cost effective
- rfid reader
- anomaly detection