<?xml-model href='http://www.tei-c.org/release/xml/tei/custom/schema/relaxng/tei_all.rng' schematypens='http://relaxng.org/ns/structure/1.0'?><TEI xmlns="http://www.tei-c.org/ns/1.0">
	<teiHeader>
		<fileDesc>
			<titleStmt><title level='a'>DCA-KEAE: A dynamic context-aware key exchange and adaptive encryption scheme for secure RFID systems</title></titleStmt>
			<publicationStmt>
				<publisher>Proc. IEEE ICC 2025</publisher>
				<date>06/08/2025</date>
			</publicationStmt>
			<sourceDesc>
				<bibl> 
					<idno type="par_id">10620558</idno>
					<idno type="doi"></idno>
					
					<author>Bernard Amoah</author><author>Xiangyu Wang</author><author>Jian Zhang</author><author>Shiwen Mao</author><author>Senthilkumar Periaswamy</author><author>Justin Patton</author>
				</bibl>
			</sourceDesc>
		</fileDesc>
		<profileDesc>
			<abstract><ab><![CDATA[In dense RFID systems, where numerous readers and tags operate simultaneously in close proximity, securing reader-to-reader communication is essential to prevent attacks such as eavesdropping and spoofing. Existing protocols focus primarily on reader-to-tag communication and use static security mechanisms that may be inadequate in dynamic conditions. We propose DCA-KEAE, a Dynamic Context-Aware Key Exchange and Adaptive Encryption framework for RFID systems. DCA-KEAE adapts security protocols in real-time based on factors such as reader proximity, system load, and threat levels: it employs lightweight symmetric keys for low-risk scenarios and escalates to stronger protocols like ECDH and AES-256 in highrisk environments. Evaluations with up to 10,000 readers show that DCA-KEAE reduces latency, optimizes encryption, and improves system throughput, offering a scalable and efficient solution for RFID networks, with applications extending to the Internet of Things (IoT), industrial automation, and smart grids.]]></ab></abstract>
		</profileDesc>
	</teiHeader>
	<text><body xmlns="http://www.tei-c.org/ns/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>I. INTRODUCTION</head><p>In the era of smart cities, Industry 4.0, and the Internet of Things (IoT), Radio Frequency Identification (RFID) systems have become indispensable for real-time tracking, identification, and data collection <ref type="bibr">[1]</ref>, <ref type="bibr">[2]</ref>. From supply chain management and inventory control to healthcare and transportation, RFID has been widely deployed in environments that require continuous monitoring and communication between readers and tags. However, as RFID systems scale and become more integrated into critical infrastructures, they face increasingly complex challenges in ensuring secure communications. In dense environments where numerous RFID readers operate simultaneously, protocols like RFIDNet <ref type="bibr">[3]</ref> have enhanced multi-reader coordination, but the security of reader-to-reader communication (RRC), as illustrated in Fig. <ref type="figure">1</ref>, remains a significant concern.</p><p>However, traditional RFID security mechanisms, designed primarily for reader-tag communication, rely on static key exchange and encryption protocols that could be inadequate for the dynamic, resource-constrained settings of dense RFID deployments <ref type="bibr">[4]</ref>. These environments are particularly susceptible to security threats: eavesdropping, spoofing, replay, and man-in-the-middle attacks. Moreover, static security protocols often overcompensate, leading to high overhead in low-risk situations or leaving the system vulnerable in unpredictable environments. Key exchange and encryption are fundamental to protecting communication within RFID systems, but they pose unique challenges in dense environments. RFID readers have limited computational power, and the need for real-time responsiveness requires security protocols that can adapt to varying environmental conditions without incurring excessive overhead. Static security protocols, e.g., AES-GCM-DH <ref type="bibr">[5]</ref>, ECC-AES-CCM <ref type="bibr">[6]</ref>, Hybrid PQC <ref type="bibr">[7]</ref>, and RSA-AES-CBC <ref type="bibr">[8]</ref>, often overcompensate for the worst-case scenario, leading to inefficiency, or underperform when faced with unexpected threats, leaving the system vulnerable and require high-performance platform. As RFID systems continue to be deployed in complex, dynamic environments, it is imperative to develop adaptive security frameworks that respond in real-time to contextual changes, such as reader density, location, proximity to sensitive assets, and communication patterns <ref type="bibr">[9]</ref>, <ref type="bibr">[10]</ref>.</p><p>This paper presents Dynamic Context-Aware Key Exchange, and Adaptive Encryption (DCA-KEAE), the security layer of RFIDNet <ref type="bibr">[3]</ref>-a practical framework designed specifically for secure reader-to-reader communication in dense RFID environments. The technical novelty of DCA-KEAE lies in its ability to dynamically adjust both key exchange protocols and encryption strength based on real-time contextual parameters, such as reader proximity, system load, and risk levels. Unlike static security mechanisms, DCA-KEAE ensures both lowlatency communication and strong security, making it ideal for dense RFID deployments. However, implementing this dynamic system poses several challenges. First, RFID readers have limited computational capacity and operate under strict real-time constraints, necessitating lightweight yet effective security protocols. Second, dynamically adapting encryption strength and key exchange processes to the current operational context requires designing an optimization model that balances security overhead and system performance. Finally, scaling the system to support thousands of readers without compromising security or performance adds a layer of considerable complexity. This paper addresses these challenges with DCA-KEAE to provide a scalable, efficient, and secure solution for RFID systems. While this framework is designed for RFID systems, its scalability and adaptability make it applicable to other areas, such as IoT, industrial automation, and smart grids, where dynamic security adjustments are crucial.</p><p>The key innovations of DCA-KEAE are as follows:</p><p>&#8226; Dynamic Context-Aware Key Exchange: Unlike static protocols, our adaptive key exchange mechanism dynamically selects the optimal protocol in real time based on the RFID network states, such as reader proximity and system load. &#8226; Adaptive Encryption Mechanism: We introduce an encryption framework that adjusts strength based on risk assessment, using AES-128 for low-risk interactions and escalating to AES-256 or ECC for high-risk communications. &#8226; Scalability and Flexibility: Our experimental results demonstrate DCA-KEAE's ability to scale across varying network sizes and configurations, maintaining high security and achieving significant improvements in key exchange latency, encryption efficiency, and system throughput, particularly in dense deployment scenarios. The remainder of this paper is organized as follows: Section II discusses related work. Section III presents the system model and assumptions, while Section IV describes the proposed DCA-KEAE framework. Section V is on our experimental evaluation, and Section VI concludes the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>II. RELATED WORK</head><p>While existing literature on RFID security predominantly focuses on reader-to-tag communication, adaptive and contextaware security schemes have been explored in other areas, such as IoT, Wireless Sensor Networks (WSNs), and general wireless communication systems. For example, frameworks such as LEAP+ <ref type="bibr">[11]</ref> and LSS <ref type="bibr">[12]</ref> for WSNs and DSF <ref type="bibr">[13]</ref> for IoT have introduced dynamic security mechanisms for resource-constrained devices. However, these approaches primarily focus on access control or lightweight encryption for tag-based communication and do not account for the unique challenges of RRC communication in RFID systems. In IoT systems, context-aware security frameworks like SEF (Secure Encryption Framework) <ref type="bibr">[14]</ref> dynamically adapt encryption strength based on environmental parameters such as network density and data sensitivity. Similarly, in WSNs, CANS (Context-Aware Network Security) <ref type="bibr">[15]</ref> optimizes security protocols based on real-time risk assessments. However, these frameworks do not directly translate to RFID systems due to the high density of readers and real-time data exchange required between readers. Furthermore, they often rely on centralized control mechanisms. RFID readers, in contrast to IoT nodes, have more stringent latency requirements and lower computational capacities, especially in dense deployments where coordination among readers is critical for good system performance <ref type="bibr">[3]</ref>.</p><p>The proposed DCA-KEAE is a dynamic, context-aware <ref type="bibr">[16]</ref> security framework specifically designed for secure RRC in RFID systems. Unlike adaptive security systems in IoT or WSNs, DCA-KEAE is tailored to address the unique constraints of RFID readers, including real-time responsiveness, low computational overhead, and the need for scalability in environments with up to 10,000 readers by employing decentralized, real-time adjustment mechanisms. Our framework not only adjusts encryption strength based on contextual factors but also dynamically selects the key exchange mechanism according to real-time risk assessments. This dual adaptation approach ensures a good balance between performance and security, making DCA-KEAE particularly well-suited for dense RFID environments and other applications, such as the Internet of Things (IoT) and industrial systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>III. SYSTEM MODEL AND ASSUMPTIONS</head><p>RFID readers, constrained by limited computational resources and low power capacity, require lightweight security protocols <ref type="bibr">[17]</ref>, <ref type="bibr">[18]</ref> that do not sacrifice real-time responsiveness. This introduces a challenge in balancing security with performance, especially in dense deployments with thousands of readers. DCA-KEAE addresses this by dynamically adjusting both the key exchange protocol and encryption strength based on real-time contextual data such as proximity and system load.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. RFID System Components</head><p>Let R = {R 1 , R 2 , ..., R N } represent the set of N RFID readers, where each reader R i can communicate with other readers R j =i &#8712; R over a wireless channel, exchanging control information (e.g., read rates, system status, and coordination signals). The communication between readers R i and R j at time t is denoted as C i,j (t). The communication process is subject to attacks (see Fig. <ref type="figure">1</ref>) and, therefore, must be secured using appropriate encryption and key exchange protocols.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Assumptions</head><p>The system operates under the following assumptions:</p><p>&#8226; Readers are Context-Aware: Each reader R i can gather realtime contextual information C(R i , t) based on proximity sensors, location tracking, and system monitoring. &#8226; Communication Channels are Unsecured: RRC is considered unsecured, requiring adaptive security mechanisms to ensure confidentiality and integrity. &#8226; Resource Is Constrained: RFID readers can perform lightweight cryptographic operations in real-time, while RFID tags remain resource-constrained and offload cryptographic tasks to readers.</p><p>&#8226; Adversary Capabilities: Adversaries can attempt eavesdropping, spoofing, replay attacks, and MITM attacks, but cannot break modern cryptographic standards (e.g., AES-256, ECC) in real time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C. Contextual Parameters</head><p>The system adapts its security protocols based on a set of contextual parameters defined for each reader R i as:</p><p>where L i (t) is the location of reader R i at time t (obtained using available sensors or localization techniques), P i (t) is the proximity or distance of reader R i to the sensitive tag or neighboring reader that it is communicating with, which is modeled as an inverse square function of the signal strength received from neighboring readers, and S i (t) is the system load on reader R i , representing the number of active communication sessions or the volume of data being processed. Each of these parameters is used to assess the risk level &#961; i (t) of reader R i , which is defined as:</p><p>where f (&#8226;) is a risk function that maps the contextual parameters to a risk value, &#961; i (t) &#8712; [0, 1], where 0 represents the lowest risk and 1 represents the highest risk.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Security Threats</head><p>The DCA-KEAE framework addresses four main security threats in RFID systems: eavesdropping, spoofing, replay attacks, and man-in-the-middle (MITM) attacks. Each of these threats is modeled as a probabilistic event, where the likelihood of an attack depends on the risk level and the network environmental conditions.</p><p>1) Eavesdropping Probability: The probability that communication C i,j (t) between readers R i and R j is eavesdropped is given by:</p><p>where dist(R i , R j ) is the distance between R i and R j , and g(&#8226;) is a function that increases as &#961; i (t) or the distance increases.</p><p>2) Spoofing Probability: The probability of a spoofing attack on reader R i is modeled as:</p><p>where h(&#8226;) increases with the load S i (t) and risk level &#961; i (t).</p><p>3) Replay Attack Probability: The probability of a replay attack on the communication between readers is modeled as:</p><p>where &#8710;t is the time delay between the original message and the replayed message. The function r(&#8226;) increases with larger &#8710;t and higher risk levels &#961; i (t).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4) Man-in-the-Middle Attack Probability:</head><p>The probability of a man-in-the-middle (MITM) attack on communication C i,j (t) between readers R i and R j is given by:</p><p>where dist(R i , R j ) is the distance between readers R i and R j , and k(&#8226;) is a function that increases with risk level &#961; i (t) as well as the distance between the communicating readers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>E. Encryption and Key Exchange</head><p>Let K i,j (t) denote the encryption key used for communication between reader R i and R j at time t. The key exchange protocol is dynamically selected based on the context C(R i , t). We define the encryption strength E i,j (t) as a function of the risk level using two threshold values &#945; and &#946; as:</p><p>These threshold values (typically &#945; = 0.4 and &#946; = 0.7) are chosen based on empirical observations in typical RFID environments, allowing the system to maintain an effective balance between performance and security under varying risk conditions. For encryption strength, AES (Advanced Encryption Standard) and ECC (Elliptic Curve Cryptography) are the widely used encryption methods. The system uses lightweight encryption (AES-128) when the risk level is low and stronger encryption (ECC) when the risk level is high.</p><p>For key exchange, we define the key exchange protocol K(R i , t) as:</p><p>Such an adaptive scheme ensures that a stronger key exchange protocol is employed in higher-risk scenarios, while a lightweight symmetric key exchange is used in low-risk settings to optimize performance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>F. Performance Optimization</head><p>The DCA-KEAE framework is designed to balance the trade-offs between security, computational overhead, and system performance. Thus, we formulated the optimization problem to minimize the overall cost function &#966;(x) as follows:</p><p>where O E represents the encryption overhead, S is the security strength, E is the resource consumption (e.g., CPU cycles, memory, etc.), and C represents the context-awareness of the system. The weights {w 1 , w 2 , w 3 , w 4 } were determined based on an empirical study conducted across several realworld RFID deployments. For example, in critical infrastructure scenarios (e.g., medical facilities), we prioritize security strength by assigning {w 1 = 0.2, w 2 = 0.5}, and reducing the emphasis on overhead minimization. In contrast, for retail environments, overhead reduction is prioritized with {w 1 = 0.4, w 2 = 0.2}, ensuring low latency with adequate security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IV. THE PROPOSED DCA-KEAE FRAMEWORK A. System Overview</head><p>The DCA-KEAE system is designed to ensure secure communication between RFID readers by continuously evaluating the surrounding context and dynamically adjusting both the key exchange protocol and encryption strength. The system operates in the following phases as depicted in Fig. <ref type="figure">2</ref>.</p><p>Reader 1 Reader 4 Reader 3 Reader 2 ---Symmetrical Key Exchange Risk Assessment ECC AES 256 AES 128 ECDH Communication Channel RRC RRC RRC RRC N Context Collection Adaptive Key Exchange Adaptive Encryption Strength Adaptive Encryption Strength Adaptive Key Exchange Adaptive Encryption Strength </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>1) Context Collection and Risk Analysis:</head><p>Each RFID reader periodically gathers contextual information about its operational environment, including its location, proximity to other readers, network load, and the current security threat level and computes the risk value &#961; i (t). 2) Adaptive Key Exchange: Based on the contextual analysis, the system dynamically selects the appropriate key exchange protocol, such as lightweight (e.g., symmetric key) and more secure (e.g., ECDH) options as needed. 3) Encryption Strength Adjustment: Once a secure communication session is established, the encryption algorithm is chosen based on the real-time risk level, ensuring that higher-risk scenarios receive stronger encryption, while low-risk environments maintain minimal overhead.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Context Collection and Risk Assessment</head><p>In DCA-KEAE, each RFID reader R i continuously collects contextual information C(R i , t), which influences its security decisions. The contextual parameters C(R i , t) are defined by <ref type="bibr">(1)</ref>. The risk level &#961; i (t) is computed using <ref type="bibr">(2)</ref>, which then guides the selection of the key exchange protocol and encryption strength. For instance, in a scenario where reader proximity P i (t) increases due to a crowded deployment (e.g., in a warehouse), the risk function &#961; i (t) rapidly approaches 0.75, causing the system to switch from symmetric key encryption to ECDH and AES-256. In contrast, when proximity is low and the system load remains within thresholds, &#961; i (t) remains below 0.4, allowing the system to use lightweight AES-128 encryption for efficiency.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C. Adaptive Key Exchange Mechanism</head><p>Once the risk level &#961; i (t) is computed, the system dynamically selects the appropriate key exchange protocol. The key exchange selection algorithm follows <ref type="bibr">(8)</ref>. Here, &#945; is the threshold risk level that determines when a more secure (but resource-intensive) key exchange protocol, such as ECDH, is needed. This adaptive key exchange mechanism allows DCA-KEAE to adjust its security protocols without over-burdening the system in low-risk scenarios. The flexibility in switching between symmetric key exchange and ECDH ensures that the protocol can scale to different network sizes and configurations while maintaining optimal performance and security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>D. Encryption Strength Adaptation</head><p>Following the key exchange, DCA-KEAE adjusts the encryption strength based on the real-time context. The encryption strength E i,j (t) is selected from a set of available algorithms defined in <ref type="bibr">(7)</ref>. One of the key design challenges is to ensure that the system could adapt its security protocols in real time without introducing latency that could degrade system performance. The lightweight encryption algorithm, AES-128, is chosen to balance security and computational overhead in low-risk situations, while ECC is employed for high-and critical-risk environments despite its higher computational demands. The dynamic nature of the DCA-KEAE framework ensures that such balance is achieved without overloading the RFID readers.</p><p>In extreme, high-risk scenarios, such as targeted MITM attacks on sensitive tags, DCA-KEAE escalates to ECC and AES-256 encryption. However, even with these measures, some scenarios may require additional layers of security. For example, in high-security environments like military installations, where the likelihood of sophisticated attacks is elevated, DCA-KEAE can be combined with Intrusion Detection Systems (IDS) that detect anomalous behavior in the communication channels and multi-factor authentication protocols for reader access control. This hybrid approach ensures that even in extremely high-risk conditions, the RFID system maintains high security without compromising performance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>V. EXPERIMENTAL STUDY AND DISCUSSIONS</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Simulation Setup</head><p>Simulations are carried out using MATLAB, chosen for its robust capabilities in modeling and analyzing communication systems. The RFID network is simulated under different configurations of readers and tags, as well as varying levels of system load, reader density, and proximity to sensitive assets. The simulation environment is configured to model real-time RFID system behavior, including communication between readers and dynamic adjustments in security protocols based on context-aware data. The setup is focused on evaluating DCA-KEAE's ability to: (i) dynamically adjust key exchange protocols and encryption strength; (ii) balance system performance (throughput, latency, overhead) and security robustness; and (iii) scale efficiently across a range of network sizes.</p><p>To evaluate the scalability and performance of DCA-KEAE, we simulated networks with varying numbers of RFID readers (from 100 to 10,000) and tags (up to 1,000,000). These parameters are chosen to reflect both small-scale and largescale RFID deployments in real-world scenarios. The number of readers per square meter is varied to create low-density (5 readers/m&#178;), medium-density (10 readers/m&#178;), and high-density (20 readers/m&#178;) environments. The Poisson distribution is used to model tag reads as it reflects real-world traffic patterns, where read requests occur sporadically and unpredictably. There are two types of tags: normal and sensitive. Sensitive tags (&#963; T = 1), such as medical devices or critical infrastruccomponents, require stronger encryption due to the higher risk of eavesdropping or tampering. Normal tags (&#963; T = 0) are assigned lightweight encryption to reduce computational overhead, reflecting the lower security requirements of less critical assets. Such classification allows us to evaluate DCA-KEAE's ability to dynamically adjust encryption strength based on the contextual importance of tags.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Performance Metrics</head><p>We evaluate DCA-KEAE based on the following metrics: (i) Key Exchange Latency (T KE (R i , R j )), the time taken to establish a secure communication channel between readers R i and R j ; (ii) Encryption Overhead (O E ) is the computational cost of encryption relative to no encryption. For a given encryption strength E, overhead is defined as: O E = Time with encryption/Time without encryption. <ref type="bibr">(14)</ref> We measure overhead for three encryption levels: AES-128, AES-256, and ECC. (iii) Throughput (&#964; ) is defined as the number of successful RRCs per second:</p><p>Throughput measures the system's ability to maintain performance as reader density and system load increase. (iv) Security Strength (S) measures the system's resilience to attacks. We simulate eavesdropping, spoofing, replay, and manin-the-middle attacks and measure the percentage of attacks successfully thwarted by each protocol. S = N attacks thwarted /N total attacks .</p><p>(v) Energy efficiency (&#951;) is the amount of useful work done per unit of energy consumed per communication E comm , as</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C. Experimental Results and Discussions</head><p>As shown in Fig. <ref type="figure">3</ref>, DCA-KEAE consistently demonstrates low key exchange latency, T KE (R i , R j ), across various risk levels (Fig. <ref type="figure">3(a)</ref>), with values staying below 1.05&#215;-time steps (averaging 1.0423&#215;) even in high-risk scenarios, indicating the framework is well-optimized to balance security without introducing significant delays. Fig. <ref type="figure">3(b</ref>) illustrates the success rate of attacks over time as the system adjusts to higherrisk conditions. Only 0.14271% of the attacks are successful. Fig. <ref type="figure">3</ref>(c) affirms that DCA-KEAE not only scales efficiently but also maintains strong security, thwarting nearly 98% of attacks while preserving low latency and high throughput. Fig. <ref type="figure">3(d)</ref> shows the fluctuations in proximity and system load (within 1 unit per reader) over time. DCA-KEAE dynamically adjusts encryption and key exchange protocols based on these varying conditions, ensuring minimal latency and maintaining strong security even as environmental factors shift. This dynamic adjustment allows the system to maintain optimal performance despite high variability in real-time conditions.</p><p>When compared to static security protocols such as AES-GCM-DH, RSA-AES-CBC, ECC-AES-CCM, and Hybrid PQC in real time avalanche of unexpected threat conditions as shown in Table <ref type="table">I</ref>, DCA-KEAE outperforms them across key performance metrics: DCA-KEAE achieves the lowest latency (1.0299 time steps), highest security strength (98.11%), and lowest attack success rate (1.03%), while maintaining the highest throughput (97,973.48 reads/s) and low energy consumption (0.60 mJ). DCA-KEAE's energy efficiency is primarily due to its ability to scale encryption strength down to AES-128 in low-risk scenarios, where less resources are required. This contrasts with static protocols like RSA-AES-CBC, which maintain a higher baseline energy consumption regardless of the risk level. DCA-KEAE also minimizes encryption overhead (2.99%) while offering superior anomaly detection capabilities, particularly in critical risk scenarios, thanks to its adaptive risk assessment framework.</p><p>As shown in Table <ref type="table">II</ref>, DCA-KEAE marginally outperforms Hybrid PQC in detecting abnormalities across varying risk scenarios. This is attributed to DCA-KEAE's dynamic adjustment of key exchange and encryption protocols in real time, allowing it to respond more effectively to sudden changes in proximity, system load, or potential security threats. Hybrid PQC, while being robust, uses static mechanisms and lacks such real-time adaptability, leading to slightly lower detection rates in high-risk scenarios. Discussions: The experimental results verify that DCA-KEAE provides significant improvements in key exchange latency, encryption overhead, and system throughput compared to fixedsecurity systems. The adaptive nature of DCA-KEAE enables it to adjust security level based on real-time risk assessment, balancing the trade-off between security and performance. The results show that DCA-KEAE is well-suited for dense RFID deployments with varying system loads and tag sensitivities. The framework effectively reduces computational costs while maintaining robust security, making it a scalable and efficient TABLE I: Performance comparison (Mean) of DCA-KEAE with other static security protocols under real-time avalanche of abnormal conditions (unexpected threats) for 10,000 readers and 1,000,000 tags over 100,000 time steps. Avg Latency Avg Security Attack Success Throughput Energy Consumption Encryption Overhead Protocol (time steps) Strength (%) Rate (%) (reads/s) per communication (mJ) (%) AES-GCM-DH [5] 1.0350 94.00 1.11 97,893.08 0.60 2.01 ECC-AES-CCM [6] 1.0550 96.00 1.07 97,933.78 1.50 5.10 Hybrid PQC [7] 1.0299 98.11 1.03 97,968.58 0.60 2.99 RSA-AES-CBC [8] 1.0450 89.00 1.21 97,807.16 0.70 3.03 DCA-KEAE [Ours] 1.0299 98.11 1.03 97,973.48 0.60 2.99</p><p>TABLE II: Comparison of abnormality detection in various risk scenarios for DCA-KEAE and HYBRID PQC over 100,000 time steps. Risk Scenario Protocol CRITICAL HIGH MEDIUM LOW DCA KEAE [proposed] 116770 120916 124349 140960 HYBRID PQC 116216 120230 123858 140740</p><p>solution for real-world RFID applications.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>VI. CONCLUSIONS</head><p>This paper presented DCA-KEAE, a dynamic context-aware security framework for securing RRC in dense RFID systems. By dynamically adjusting key exchange and encryption strength based on real-time factors such as proximity and system load, DCA-KEAE improves key exchange latency, reduces encryption overhead, and scales efficiently in large networks. Beyond RFID, the framework has broader applications in IoT, industrial automation, and smart grids, where real-time security adjustments are essential. Future work will focus on energy optimization, machine learning integration for enhanced risk assessment, and applying the framework to critical infrastructure sectors.</p></div></body>
		</text>
</TEI>
