DocumentCode :
256020
Title :
Modeling and analysis of RFID authentication protocols for supply chain management
Author :
Kumar, A. ; Gopal, K. ; Aggarwal, A.
Author_Institution :
CSE/IT, Jaypee Inst. of Inf. Technol., Noida, India
fYear :
2014
fDate :
11-13 Dec. 2014
Firstpage :
256
Lastpage :
261
Abstract :
A secure interconnection of objects through RFID technology extends the range of information availability. Security in this integration is achievable through proper identification, authentication, grouping / yoking, distance bounding, and tag and ownership transfer protocols. This work analyzes the computational and communicational cost of group and authentication protocols. Further, these protocols are modeled and analyzed using alloy model. Results show that a network of 255 nodes can be constructed with delays of 9.6 msec and 7.6 msec using peer to peer and centralized connectivity respectively.
Keywords :
cryptographic protocols; radiofrequency identification; supply chain management; RFID authentication protocols; alloy model; centralized connectivity; communicational cost; computational cost; information availability; integration security; peer to peer connectivity; secure interconnection; supply chain management; Authentication; Computational efficiency; Cryptography; Peer-to-peer computing; Protocols; Radiofrequency identification; authentication; grouping; lightweight cryptography; modeling; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Parallel, Distributed and Grid Computing (PDGC), 2014 International Conference on
Conference_Location :
Solan
Print_ISBN :
978-1-4799-7682-9
Type :
conf
DOI :
10.1109/PDGC.2014.7030752
Filename :
7030752
Link To Document :
بازگشت