Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005.
Daesung KwonDaewan HanJooyoung LeeYongjin YeomPublished in: EUC Workshops (2006)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- radio frequency identification
- low cost
- lightweight
- rfid technology
- authentication scheme
- smart card
- security protocols
- public key
- cost effective
- security issues
- security analysis
- resource constrained
- secret key
- authentication mechanism
- similarity measure
- data points
- security mechanisms
- data collection
- trusted third party
- data analysis