Visible to the public On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis

TitleOn Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
Publication TypeConference Paper
Year of Publication2015
AuthorsBruce, N., Kim, H., Kang, Y., Lee, Y., Lee, H.
Conference Name2015 IEEE 29th International Conference on Advanced Information Networking and Applications
Keywordsauthentication, cryptographic protocol, cryptographic protocols, cryptography protocol, delay analysis, delays, healthcare monitoring and, Indexes, industrial environment, Intelligent systems, mathematical analysis, privacy, protocol-based clustering tag, Protocols, pubcrawl170112, radio frequency identification, radiofrequency identification, RFID, RFID systems, security, security analysis, Servers, supply chain management, supply-chain management systems, telecommunication security
Abstract

This paper presents an efficiency and adaptive cryptographic protocol to ensure users' privacy and data integrity in RFID system. Radio Frequency Identification technology offers more intelligent systems and applications, but privacy and security issues have to be addressed before and after its adoption. The design of the proposed model is based on clustering configuration of the involved tags where they interchange the data with the reader whenever it sends a request. This scheme provides a strong mutual authentication framework that suits for real heterogeneous RFID applications such as in supply-chain management systems, healthcare monitoring and industrial environment. In addition, we contribute with a mathematical analysis to the delay analysis and optimization in a clustering topology tag-based. Finally, a formal security and proof analysis is demonstrated to prove the effectiveness of the proposed protocol and that achieves security and privacy.

DOI10.1109/AINA.2015.227
Citation Keybruce_modeling_2015