Abstract
With comprehensive applications of radio-frequency identification (RFID) technology in Internet of things, more and more mobile reader devices are utilized. However, in mobile RFID system the readers are not considered trustworthy as usual; thus, an authentication protocol with the mutual authentication ability is demanded; that is, the tag can authenticate the reader when necessary. In this paper, the one-way Hash is used to realize the mutual authentication between RFID tags, readers and application servers. Meanwhile, to solve the tracking attacks of tags, the ID update ability is proposed. The IDs of the RFID tags used in this protocol are variable and traceable. Besides, the out-of-synchronous mechanism and anti-collision mechanism are also designed for the ID-updating stage. BAN logic is used to prove the security of the protocol, and the communication cost simulations of several protocols are carried out and comparisons are then made. Through the security and comparisons performance analysis of various protocols, the proposed protocol is proved to require for a smaller storage space and lower operation cost. What is more, it can resist multiple attacks, which can meet the requirements of the security and privacy of RFID system for the mobile environment.
Similar content being viewed by others
References
Sicari, S., Rizzardi, A., Grieco, L.A.: Security, Privacy and Trust in the Internet of Things. Int. J. Comput. Telecommun. Netw. 76(C), 146–164 (2015)
Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)
Li, J.G., Zhang, Y.C., Wei, X.X.: A provably secure certificate-based broadcast encryption scheme. Acta Electron. Sin. 44(5), 1101–1110 (2016)
Fang, W.D., Shan, L.H., Jia, G.Q.: A low complexity secure network coding in wireless sensor network. J. Internet Technol. 17(5), 905–913 (2016)
Mujahid, U.: A new ultralight weight RFID mutual authentication protocol: SASI using recursive Hash. Int. J. Distrib. Sens. Netw. 2016(6), 27 (2016)
Peris-Lopez, P., Hernandez-Castro, J., Tapiador J.M.: LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Proceedings of Workshop on RFID Security, vol. 2006, No, 10, pp. 6 (2006)
Peris-Lopez, P., Hernandez-Castro, JC.: EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, pp. 352–361. Montpellier (2006)
Safkhani, M., Peris-Lopez, P.: Cryptanalysis of the Cho et al. protocol: a Hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259(3), 571–577 (2014)
Yuan, J.S., Xu, Y.: Mutual authentication protocol for RFID based on asymmetric keys and Hash function. J. Cryptol. Res. 1(5), 456–464 (2014)
Shen, J., Tan, H., Zheng, Y.: An enhanced ID-updating Hash-based RFID authentication protocol with strong privacy protection. Front. Artif. Intell. Appl. 27(4), 121–129 (2015)
Bagheri, N., Safkhani, M., Naderi, M.: Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol. Neural Comput. Appl. 24(3–4), 799–805 (2014)
Shen, J., Tan, H., Zhang, Y., Sun, X., Xiang, Y.: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimed. Tools Appl. 76(21), 22761–22783 (2017)
Chen, C.-L., Yang, T.-T., Leu, F.-Y., Huang, Y.-L.: Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft Comput. 20(3), 365–379 (2014)
Hui Feng, H., Yu, P. K.: A privacy and authentication protocol for mobile RFID system. In: IEEE International Symposium on Independent Computing IEEE, pp. 1–6. Orlando (2015)
Xiaohong, Z., Yingmeng, H.: RFID mutual-authentication protocol with synchronous updated-keys based on Hash function. J. China Univ. Posts Telecommun. 22(6), 27–35 (2015)
Ming Hour, Y.: Lightweight authentication protocol for mobile RFID networks. Int. J. Secur. Netw. 5(1), 53–62 (2010)
Robin, D., Saravanan, S., Wanlei, Z.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11(1), 383–396 (2013)
Wu, X., Min, Z., Yang, X.: Time-stamp based mutual authentication protocol for mobile RFID system. In: Wireless and Optical Communication Conference IEEE, pp. 702–706. Chongqing (2013)
Yoon, E.J.: Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader. Network and Parallel Computing. Springer, Berlin (2012)
Vaidya, B., Makrakis, D., Mouftah, H.T.: Authentication mechanism for mobile RFID based smart grid network. In: Electrical and Computer Engineering IEEE. Toronto (2014)
Mohammad Sabzinejad, F.: Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. 70(2), 987–1001 (2014)
Niu, B., Zhu, X., Chi, H.: Privacy and authentication protocol for mobile RFID systems. Wirel. Pers. Commun. Int. J. 77(3), 1713–1731 (2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xu, Y., Yuan, J. Design and analysis of an ID-updated mutual authentication protocol for mobile RFID system. Photon Netw Commun 37, 204–211 (2019). https://doi.org/10.1007/s11107-018-0812-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11107-018-0812-6