A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Time cost evaluation for executing RFID authentication protocols
2010
2010 Internet of Things (IOT)
There are various reader/tag authentication protocols proposed for the security of RFID systems. Such a protocol normally contains several rounds of conversations between a tag and a reader and involves cryptographic operations at both reader and tag sides. Currently there is a lack of benchmarks that provide a fair comparison platform for (a) the time cost of cryptographic operations at the tag side and (b) the time cost of data exchange between a reader and a tag, making it impossible to
doi:10.1109/iot.2010.5678437
dblp:conf/iot/ChiewLLDA10
fatcat:yehap557h5atzedw432nntly2e