Title :
Modeling and analysis of RFID authentication protocols for supply chain management
Author :
Kumar, A. ; Gopal, K. ; Aggarwal, A.
Author_Institution :
CSE/IT, Jaypee Inst. of Inf. Technol., Noida, India
Abstract :
A secure interconnection of objects through RFID technology extends the range of information availability. Security in this integration is achievable through proper identification, authentication, grouping / yoking, distance bounding, and tag and ownership transfer protocols. This work analyzes the computational and communicational cost of group and authentication protocols. Further, these protocols are modeled and analyzed using alloy model. Results show that a network of 255 nodes can be constructed with delays of 9.6 msec and 7.6 msec using peer to peer and centralized connectivity respectively.
Keywords :
cryptographic protocols; radiofrequency identification; supply chain management; RFID authentication protocols; alloy model; centralized connectivity; communicational cost; computational cost; information availability; integration security; peer to peer connectivity; secure interconnection; supply chain management; Authentication; Computational efficiency; Cryptography; Peer-to-peer computing; Protocols; Radiofrequency identification; authentication; grouping; lightweight cryptography; modeling; security;
Conference_Titel :
Parallel, Distributed and Grid Computing (PDGC), 2014 International Conference on
Conference_Location :
Solan
Print_ISBN :
978-1-4799-7682-9
DOI :
10.1109/PDGC.2014.7030752