Weaknesses in Two RFID Authentication Protocols.
Noureddine ChikoucheCherif FoudilPierre-Louis CayrelMohamed BenmohammedPublished in: C2SI (2015)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- radio frequency identification
- low cost
- lightweight
- rfid technology
- public key
- cost effective
- smart card
- security issues
- security analysis
- cryptographic protocols
- resource constrained
- security protocols
- power consumption
- security mechanisms
- key distribution
- ban logic
- sensor networks
- database systems
- real time