The Security of EPC Gen2 Compliant RFID Protocols.
Mike BurmesterBreno de MedeirosPublished in: ACNS (2008)
Keyphrases
- rfid tags
- rfid technology
- radio frequency identification rfid
- authentication protocol
- mutual authentication
- security protocols
- radio frequency identification
- rfid systems
- rfid middleware
- anti collision
- low cost
- supply chain
- lightweight
- rfid reader
- security issues
- ubiquitous computing
- security properties
- security analysis
- supply chain management
- security mechanisms
- security services
- wireless sensor networks
- cryptographic protocols
- public key
- key technologies
- cost effective
- key distribution
- power consumption
- key agreement protocol
- key establishment
- key exchange
- information systems
- communication protocols
- application level
- radio frequency
- wireless communication
- information security
- intrusion detection
- decision making