RFID mutual authentication protocols for tags and readers with and without a server.
Song HanTharam S. DillonVidy PotdarElizabeth ChangPublished in: Comput. Syst. Sci. Eng. (2013)
Keyphrases
- information security
- mutual authentication
- rfid tags
- authentication protocol
- smart card
- radio frequency identification
- authentication mechanism
- security analysis
- security requirements
- security issues
- low cost
- authentication scheme
- lightweight
- rfid systems
- anti collision
- rfid technology
- secret key
- security protocols
- cost effective
- public key
- resource constrained
- privacy protection
- user authentication
- key distribution
- client server
- power consumption
- trusted third party