Attacks on CKK Family of RFID Authentication Protocols.
Zbigniew GolebiewskiKrzysztof MajcherFilip ZagórskiPublished in: ADHOC-NOW (2008)
Keyphrases
- authentication protocol
- rfid tags
- security protocols
- rfid systems
- cryptographic protocols
- security mechanisms
- radio frequency identification
- security problems
- low cost
- lightweight
- smart card
- rfid technology
- security analysis
- security issues
- resource constrained
- public key
- key distribution
- cost effective
- user authentication
- key management
- watermarking scheme
- computer networks
- supply chain
- ban logic
- secret key
- real time
- power consumption
- information sharing
- information systems