2015 IEEE 29th International Conference on Advanced Information Networking and Applications 2015
DOI: 10.1109/aina.2015.227
|View full text |Cite
|
Sign up to set email alerts
|

On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis

Abstract: This paper presents an efficiency and adaptive cryptographic protocol to ensure users' privacy and data integrity in RFID system. Radio Frequency Identification technology offers more intelligent systems and applications, but privacy and security issues have to be addressed before and after its adoption. The design of the proposed model is based on clustering configuration of the involved tags where they interchange the data with the reader whenever it sends a request. This scheme provides a strong mutual auth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…to verify security properties of UMAPs. Bruce [18] demonstrated BAN logic to prove the security and privacy of the proposed RFID protocol. Also, Qingling C [19] performed BAN logic analysis about the security of a minimalist mutual authentication Protocol.…”
Section: Related Workmentioning
confidence: 99%
“…to verify security properties of UMAPs. Bruce [18] demonstrated BAN logic to prove the security and privacy of the proposed RFID protocol. Also, Qingling C [19] performed BAN logic analysis about the security of a minimalist mutual authentication Protocol.…”
Section: Related Workmentioning
confidence: 99%