Skip to main content

Analysis and Design of Group RFID Tag Security Authentication Protocol

  • Conference paper
  • First Online:
Complex, Intelligent, and Software Intensive Systems (CISIS 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 993))

Included in the following conference series:

Abstract

Aiming at solving the defects of security and privacy of conventional RFID authentication protocols and low authentication efficiency, this paper proposes a group tag security authentication protocol. In the group authentication protocol, it needs to prove that certain tags belong to the same group and exist at the same time. The applicability of RFID authentication protocol is introduced in low-cost tag applications, and an improved scalable lightweight RFID authentication protocol is proposed. The tags only generate pseudo-random numbers and perform join (||) and exclusive-OR (XOR) operations. The response message of the tag is identified by using an existing bit arbitration query tree based on grouping mechanism algorithm. Keeping update to the encrypted information in the tag is synchronized with the server throughout the group certification process. Based on these improvements, this protocol improves the efficiency and security of RFID system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fu, W., Qian, Z.H., Cheng, C., et al.: Anti-collision algorithm for bit arbitration query tree based on grouping mechanism[J]. J. Commun. 37, 41–68 (2016)

    Google Scholar 

  2. Yu, L.L., Zhang, L., Li, J., et al.: A PSO clustering based RFID middleware[C], pp. 222–225. IEEE, New York (2018)

    Google Scholar 

  3. Akgün, M., Çaǧlayan, M.U.: Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Networks, pp. 32–42 (2015)

    Google Scholar 

  4. Zhang, X., Han, D., Cao, G., et al.: RFID security authentication protocol based on present algorithm[J]. J. Commun. 36, 65–74 (2015)

    Google Scholar 

  5. Liu, X., Xie, X., Zhao, X., et al.: Fast identification of blocked RFID tags[J]. IEEE Trans. Mob. Comput. 17, 2041–2054 (2018)

    Article  Google Scholar 

  6. Chen, M., Chen, S., Fang, Y.: Lightweight anonymous authentication protocols for RFID systems[J]. IEEE-ACM Trans. on Networking 25, 1475–1488 (2018)

    Article  Google Scholar 

  7. Yang, Y.L., Peng, C.G., Zhou, Z., et al.: Mobile RFID security authentication protocol based on Edwards curve[J]. J. Commun. 351, 32–138 + 145 (2016)

    Google Scholar 

  8. Yuan, B.Q., Liu, J.Q.: Proof of security of RFID tag ownership transfer protocol[J]. J. Commun. 36, 83–90 (2015)

    Google Scholar 

  9. Dehkordi, M.H., Farzaneh, Y.: Improvement of the hash-based RFID mutual authentication protocol. Wireless Pers. Commun. 75, 219–232 (2014)

    Article  Google Scholar 

  10. Alavi, S.M., Baghery, K., Abdolmaleki, B.: Traceability analysis of recent RFID authentication protocols. Wireles Pers. Commun. 83, 1663–1682 (2015)

    Google Scholar 

  11. Fan, K., Gong, Y., Liang, C., et al.: Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur. Commun. Network, 3095–3104 (2016)

    Google Scholar 

  12. Aghili, S.F., Ashouri-Talouki, M., Mala, H.: DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. J. Supercomputing, 509–525 (2018)

    Google Scholar 

  13. Farash, M.S., Nawaz, O., Mahmood, K., et al.: A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. J. Med. Syst, 165–171 (2016)

    Google Scholar 

  14. Sundaresan, S., Doss, R., Piramuthu, S., et al.: Secure tag search in RFID systems using mobile readers. IEEE Trans. Dependable Secure Comput. 230–242 (2015)

    Google Scholar 

  15. Jannati, H., Bahrak, B.: Security analysis of an RFID tag search protocol. Inf. Process. Lett. 618–622 (2016)

    Google Scholar 

  16. Pourpouneh, M., Ramezanian, R., Salahi, F.: An improvement over a server-less RFID authentication protocol. Int. J. Comput. Network Inf. Secur. 65–171 (2014)

    Google Scholar 

  17. Shahrbabak, M.M., Abdolmaleky, S.: SRMAP and ISLAP authentication protocols: attack and improvements. IACR Cryptology ePrint Archive, 731–741 (2016)

    Google Scholar 

  18. Shen, J., Tan, H., Zhang, Y., et al.: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimedia Tools and Applications, 761–783 (2017)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China under Grant 61672296, Grant 61602261 and Grant 61762071, in part by the Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province under Grant 18KJA520008, and the 1311 Talent Plan of the Nanjing University of Posts and Telecommunications (NUPT).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to He Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zang, K., Xu, H., Zhu, F., Li, P. (2020). Analysis and Design of Group RFID Tag Security Authentication Protocol. In: Barolli, L., Hussain, F., Ikeda, M. (eds) Complex, Intelligent, and Software Intensive Systems. CISIS 2019. Advances in Intelligent Systems and Computing, vol 993. Springer, Cham. https://doi.org/10.1007/978-3-030-22354-0_57

Download citation

Publish with us

Policies and ethics