Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard
Mohammad Hassan HabibiMahmoud GardeshiMahdi R. AlaghbandPublished in: CoRR (2011)
Keyphrases
- rfid tags
- authentication protocol
- security protocols
- radio frequency identification
- rfid systems
- low cost
- radio frequency identification rfid
- security mechanisms
- cryptographic protocols
- rfid technology
- lightweight
- smart card
- mutual authentication
- supply chain
- public key
- security issues
- resource constrained
- cost effective
- user authentication
- supply chain management
- secret key
- security analysis
- information systems
- data sharing
- data streams