Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain.

Saved in:
Bibliographic Details
Title: Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain.
Authors: Kumar, Vikash, Das, Santosh Kumar
Source: Cyber Security & Applications; Dec2025, Vol. 3, p1-17, 17p
Subject Terms: RADIO frequency identification systems, EDGE computing, CRYPTOGRAPHY, SECURITY management, ENCRYPTION protocols, CYBER physical systems, BLOCKCHAINS
Abstract: This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol. The current system faces significant security risks due to increased connectivity and data exchange within supply chain networks. The proposed protocol integrates edge computing and blockchain to ensure secure, efficient mutual authentication between RFID tags and supply chain nodes. By utilizing the real-time processing capabilities of edge computing and the decentralization and immutability of blockchain, the protocol enhances the security of data transmitted in the system. The proposed protocol utilizes lightweight cryptographic functions optimized for resource-constrained edge devices, ensuring secure authentication and data transmission without compromising scalability or efficiency. Permissioned blockchain technology further strengthens trust and transparency in the supply chain by providing a decentralized, tamper-resistant ledger. The protocol employs cryptographic techniques such as a cryptographically secure one-way hash function, random number generation function, and circular shift operations to ensure data integrity and confidentiality, achieving mutual authentication, forward secrecy, and resistance to cryptographic attacks. Formal security analysis of the proposed authentication protocol is performed using the Real-Or-Random (ROR) model. The results demonstrate that the protocol offers superior trade-offs in term of security, computational cost, and communication efficiency compared to existing authentication protocols in this field. Simulation of the protocol is performed using Automated Validation of Internet Security Protocols and Applications (AVISPA) tools. Its lightweight design makes it suitable for real-world application in resource-constrained IIoT environments. [ABSTRACT FROM AUTHOR]
Copyright of Cyber Security & Applications is the property of KeAi Communications Co. and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
Description
Abstract:This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol. The current system faces significant security risks due to increased connectivity and data exchange within supply chain networks. The proposed protocol integrates edge computing and blockchain to ensure secure, efficient mutual authentication between RFID tags and supply chain nodes. By utilizing the real-time processing capabilities of edge computing and the decentralization and immutability of blockchain, the protocol enhances the security of data transmitted in the system. The proposed protocol utilizes lightweight cryptographic functions optimized for resource-constrained edge devices, ensuring secure authentication and data transmission without compromising scalability or efficiency. Permissioned blockchain technology further strengthens trust and transparency in the supply chain by providing a decentralized, tamper-resistant ledger. The protocol employs cryptographic techniques such as a cryptographically secure one-way hash function, random number generation function, and circular shift operations to ensure data integrity and confidentiality, achieving mutual authentication, forward secrecy, and resistance to cryptographic attacks. Formal security analysis of the proposed authentication protocol is performed using the Real-Or-Random (ROR) model. The results demonstrate that the protocol offers superior trade-offs in term of security, computational cost, and communication efficiency compared to existing authentication protocols in this field. Simulation of the protocol is performed using Automated Validation of Internet Security Protocols and Applications (AVISPA) tools. Its lightweight design makes it suitable for real-world application in resource-constrained IIoT environments. [ABSTRACT FROM AUTHOR]
ISSN:27729184
DOI:10.1016/j.csa.2025.100087