An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
Gildas AvoineAslan TchamkertenPublished in: CoRR (2008)
Keyphrases
- asymptotically optimal
- authentication protocol
- rfid tags
- security protocols
- rfid systems
- mutual authentication
- security mechanisms
- radio frequency identification
- asymptotic optimality
- rfid technology
- low cost
- lightweight
- smart card
- security problems
- resource constrained
- authentication scheme
- arrival rate
- cost effective
- security analysis
- security issues
- public key
- call center
- information systems
- key management
- intelligent agents
- secret key
- ubiquitous computing
- power consumption
- optimal policy
- similarity measure