On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
Title | On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Bruce, N., Kim, H., Kang, Y., Lee, Y., Lee, H. |
Conference Name | 2015 IEEE 29th International Conference on Advanced Information Networking and Applications |
Keywords | authentication, cryptographic protocol, cryptographic protocols, cryptography protocol, delay analysis, delays, healthcare monitoring and, Indexes, industrial environment, Intelligent systems, mathematical analysis, privacy, protocol-based clustering tag, Protocols, pubcrawl170112, radio frequency identification, radiofrequency identification, RFID, RFID systems, security, security analysis, Servers, supply chain management, supply-chain management systems, telecommunication security |
Abstract | This paper presents an efficiency and adaptive cryptographic protocol to ensure users' privacy and data integrity in RFID system. Radio Frequency Identification technology offers more intelligent systems and applications, but privacy and security issues have to be addressed before and after its adoption. The design of the proposed model is based on clustering configuration of the involved tags where they interchange the data with the reader whenever it sends a request. This scheme provides a strong mutual authentication framework that suits for real heterogeneous RFID applications such as in supply-chain management systems, healthcare monitoring and industrial environment. In addition, we contribute with a mathematical analysis to the delay analysis and optimization in a clustering topology tag-based. Finally, a formal security and proof analysis is demonstrated to prove the effectiveness of the proposed protocol and that achieves security and privacy. |
DOI | 10.1109/AINA.2015.227 |
Citation Key | bruce_modeling_2015 |
- protocol-based clustering tag
- telecommunication security
- supply-chain management systems
- supply chain management
- Servers
- Security analysis
- security
- RFID systems
- RFID
- radiofrequency identification
- radio frequency identification
- pubcrawl170112
- Protocols
- authentication
- privacy
- mathematical analysis
- Intelligent systems
- industrial environment
- Indexes
- healthcare monitoring and
- delays
- delay analysis
- cryptography protocol
- Cryptographic Protocols
- cryptographic protocol