Secure authentication scheme for passive C1G2 RFID tags.
Markus B. MoessnerGul N. KhanPublished in: Comput. Networks (2012)
Keyphrases
- authentication scheme
- rfid tags
- authentication protocol
- rfid reader
- public key
- secret key
- mutual authentication
- smart card
- radio frequency identification
- low cost
- user authentication
- rfid systems
- lightweight
- security issues
- resource constrained
- security analysis
- cost effective
- radio frequency identification rfid
- rfid technology
- security protocols
- security mechanisms
- power consumption
- key distribution
- private key
- security flaws
- digital signature
- cryptographic protocols
- key management
- encryption scheme
- trusted third party
- key agreement
- information security