Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol.
Seyed Farhad AghiliHamid MalaPublished in: Peer-to-Peer Netw. Appl. (2020)
Keyphrases
- rfid tags
- authentication protocol
- radio frequency identification
- low cost
- rfid systems
- lightweight
- rfid technology
- real time
- security issues
- cost effective
- resource constrained
- mutual authentication
- public key
- anti collision
- smart card
- security protocols
- authentication scheme
- power consumption
- secret key
- data streams
- security analysis
- security mechanisms