Authenticated RFID security mechanism based on chaotic maps.
Zi-Yao ChengYun LiuChin-Chen ChangShih-Chang ChangPublished in: Secur. Commun. Networks (2013)
Keyphrases
- security mechanisms
- chaotic maps
- image encryption
- authentication scheme
- rfid tags
- smart card
- authentication protocol
- public key
- secret key
- image encryption scheme
- radio frequency identification
- rfid systems
- image encryption algorithm
- resource constrained
- security issues
- low cost
- rfid technology
- digital signature
- security requirements
- lightweight
- security analysis
- security protocols
- user authentication
- power consumption
- encryption algorithm
- key management
- supply chain
- information security
- cost effective
- operating system
- access control
- key distribution
- chaotic sequence
- private key
- software development
- multipath