Abstract
Aiming at solving the defects of security and privacy of conventional RFID authentication protocols and low authentication efficiency, this paper proposes a group tag security authentication protocol. In the group authentication protocol, it needs to prove that certain tags belong to the same group and exist at the same time. The applicability of RFID authentication protocol is introduced in low-cost tag applications, and an improved scalable lightweight RFID authentication protocol is proposed. The tags only generate pseudo-random numbers and perform join (||) and exclusive-OR (XOR) operations. The response message of the tag is identified by using an existing bit arbitration query tree based on grouping mechanism algorithm. Keeping update to the encrypted information in the tag is synchronized with the server throughout the group certification process. Based on these improvements, this protocol improves the efficiency and security of RFID system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fu, W., Qian, Z.H., Cheng, C., et al.: Anti-collision algorithm for bit arbitration query tree based on grouping mechanism[J]. J. Commun. 37, 41–68 (2016)
Yu, L.L., Zhang, L., Li, J., et al.: A PSO clustering based RFID middleware[C], pp. 222–225. IEEE, New York (2018)
Akgün, M., Çaǧlayan, M.U.: Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Networks, pp. 32–42 (2015)
Zhang, X., Han, D., Cao, G., et al.: RFID security authentication protocol based on present algorithm[J]. J. Commun. 36, 65–74 (2015)
Liu, X., Xie, X., Zhao, X., et al.: Fast identification of blocked RFID tags[J]. IEEE Trans. Mob. Comput. 17, 2041–2054 (2018)
Chen, M., Chen, S., Fang, Y.: Lightweight anonymous authentication protocols for RFID systems[J]. IEEE-ACM Trans. on Networking 25, 1475–1488 (2018)
Yang, Y.L., Peng, C.G., Zhou, Z., et al.: Mobile RFID security authentication protocol based on Edwards curve[J]. J. Commun. 351, 32–138 + 145 (2016)
Yuan, B.Q., Liu, J.Q.: Proof of security of RFID tag ownership transfer protocol[J]. J. Commun. 36, 83–90 (2015)
Dehkordi, M.H., Farzaneh, Y.: Improvement of the hash-based RFID mutual authentication protocol. Wireless Pers. Commun. 75, 219–232 (2014)
Alavi, S.M., Baghery, K., Abdolmaleki, B.: Traceability analysis of recent RFID authentication protocols. Wireles Pers. Commun. 83, 1663–1682 (2015)
Fan, K., Gong, Y., Liang, C., et al.: Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur. Commun. Network, 3095–3104 (2016)
Aghili, S.F., Ashouri-Talouki, M., Mala, H.: DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. J. Supercomputing, 509–525 (2018)
Farash, M.S., Nawaz, O., Mahmood, K., et al.: A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. J. Med. Syst, 165–171 (2016)
Sundaresan, S., Doss, R., Piramuthu, S., et al.: Secure tag search in RFID systems using mobile readers. IEEE Trans. Dependable Secure Comput. 230–242 (2015)
Jannati, H., Bahrak, B.: Security analysis of an RFID tag search protocol. Inf. Process. Lett. 618–622 (2016)
Pourpouneh, M., Ramezanian, R., Salahi, F.: An improvement over a server-less RFID authentication protocol. Int. J. Comput. Network Inf. Secur. 65–171 (2014)
Shahrbabak, M.M., Abdolmaleky, S.: SRMAP and ISLAP authentication protocols: attack and improvements. IACR Cryptology ePrint Archive, 731–741 (2016)
Shen, J., Tan, H., Zhang, Y., et al.: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimedia Tools and Applications, 761–783 (2017)
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China under Grant 61672296, Grant 61602261 and Grant 61762071, in part by the Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province under Grant 18KJA520008, and the 1311 Talent Plan of the Nanjing University of Posts and Telecommunications (NUPT).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zang, K., Xu, H., Zhu, F., Li, P. (2020). Analysis and Design of Group RFID Tag Security Authentication Protocol. In: Barolli, L., Hussain, F., Ikeda, M. (eds) Complex, Intelligent, and Software Intensive Systems. CISIS 2019. Advances in Intelligent Systems and Computing, vol 993. Springer, Cham. https://doi.org/10.1007/978-3-030-22354-0_57
Download citation
DOI: https://doi.org/10.1007/978-3-030-22354-0_57
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22353-3
Online ISBN: 978-3-030-22354-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)