Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environmen.
Abedelaziz MohaisenKu-Young ChangDowon HongPublished in: KSII Trans. Internet Inf. Syst. (2011)
Keyphrases
- countermeasures
- pervasive computing
- authentication scheme
- information security
- smart card
- user authentication
- security flaws
- rfid tags
- ambient intelligence
- mobile devices
- daily life
- ubiquitous computing
- secret key
- public key
- context aware
- authentication protocol
- service discovery
- mobile computing
- smart environments
- security requirements
- context awareness
- computing environments
- data collection
- security measures
- power analysis
- databases
- security analysis
- cyber attacks
- low cost
- security issues
- network security
- wireless networks
- data streams
- data mining