Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value.
Jung-Sik ChoSang-Soo YeoSung Kwon KimPublished in: Comput. Commun. (2011)
Keyphrases
- brute force
- authentication protocol
- secret key
- rfid tags
- mutual authentication
- locality sensitive hashing
- rfid systems
- hash functions
- radio frequency identification
- smart card
- lightweight
- authentication scheme
- low cost
- public key
- user authentication
- information security
- rfid technology
- session key
- computationally expensive
- security analysis
- ciphertext
- cost effective
- computer chess
- authentication mechanism
- encryption scheme
- security protocols
- resource constrained
- data distribution
- key management
- similarity search
- security mechanisms
- real time
- exhaustive search
- diffie hellman
- secret sharing scheme
- supply chain
- dynamic programming
- wireless sensor networks