Analysis of Security Issues in SMC based RFID in Supply Chain Management with Energy Modeling



RFID (Radio Frequency Identification) has been used in Supply Chain management but with the advent of Nanotechnology enabled RFID energy consumption is being constantly decreased. The major issues between implementation of such devices are their reliability and security. In this work we have implemented a novel and effective VPP (Virtual Party Protocol) for RFID systems. Use of VPP and insertion of anonymous has been implemented for RFID systems and the advantages over other methods are shown. The mathematical analysis is done for the proposal and its implications are discussed. In this protocol the creation of virtual party to hide the data of the Tags are shown, this method though can be used for joint computation and for other information the hardware needs to be tuned to the requirements. Energy requirements are also shown in this work for a VPP based RFID systems.

usiness is being enhanced by the advent of RFID technologies. RFID technologies benefit from development of many technologies. But the development of SMC where secure joint computation needs to be done is any area which is highly sophisticated because of fewer theories in the area. Business application of RFID can be felt in all domains and therefore building a secure model for RFID is a necessity. As we know that in supply chain management the Tags are passed from various Parties which want to get information about the Tags to detect the possibility of any errors or damage of the systems. In our previous work we have proposed the application of SMC protocols in RFIDs [20]. Five major Critical issues in an RFID security are defined as Confidentiality, Integrity, Authentication, Anonymity, and Availability are defined in [16]. Author has also done an elementary comparison of the security proposals. Cryptographic module based on an 8 bit microprocessor has been shown by Kaiser [1], where he has described the implementation of the protocol on the microprocessor. These methods are good for general RFID but not for passive RFIDs. Tracking resistance and identification performance has been discussed in [2], where author talks methods such as hiding of tag information using less complex and less costly password management. RFID’s application is supply chain management is well known, Piramuthu in [3] shows about the recent protocols for passive RFID system which are the most common used, in that work some issues to make lightweight cryptography is addressed but it does not give a totally hack proof system. Anti-counterfeit ownership transfer in a RFID system is an area in which the ownership transfer issue needs to resolved, an attempt has been made in [4] for the proposing a solution. Noisy Cryptographic Protocols for Low-Cost RFID Tags has been proposed in [5], where the noise is used for improving the security. This method talks about the using the noisy environment and it shows the methodology to implement the same. The developments of Nanotechnology, MEMS have an effect on the RFID systems [6]. Thus in most of the cases author talks about cryptography but the problem of secure multi party computation has been not been addressed which we have tried to work in this project. The idea for coming with a SMC protocol is obvious and its applications are also vast in this area especially in Supply Chain Management. Tracking becomes an issue when RFID and reader interacts, thus a secret sharing needs to be build up between them, some elementary idea is being given earlier for the issue in [12]. Security of RFID basically depends on reader, responder and the database. Thus security measures taken and analysis has been previously done using for CASPER, CSP and FDR . A hash lock was proposed by the author in the work for improving the security. Design of a lightweight RFID security protocol based on the ID Blind Scheme and ECC (Elliptic Curve Cryptography) has been shown in . It is expected to offers enhanced security feature in RFID security with respect to user privacy against tag cloning allowing an additional ECC modular operation [14]. Tag is tough the main focus sometimes reader also needs to hide information which is a rare case but eminent, idea is expanded in where author has discussed about the reader side security issues and constrains

Free download research paper


CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER