RFID System Mutual Authentication Protocols Based on ECC.
Li FengXuanxia YaoPublished in: UIC/ATC/ScalCom (2015)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- security analysis
- radio frequency identification
- public key
- rfid technology
- low cost
- smart card
- lightweight
- resource constrained
- user authentication
- authentication scheme
- cost effective
- secret key
- security protocols
- supply chain
- security issues
- key distribution
- security requirements
- power consumption
- security mechanisms
- supply chain management
- security problems
- resource constraints