Skip to main content
Log in

Design and analysis of an ID-updated mutual authentication protocol for mobile RFID system

  • Original Paper
  • Published:
Photonic Network Communications Aims and scope Submit manuscript

Abstract

With comprehensive applications of radio-frequency identification (RFID) technology in Internet of things, more and more mobile reader devices are utilized. However, in mobile RFID system the readers are not considered trustworthy as usual; thus, an authentication protocol with the mutual authentication ability is demanded; that is, the tag can authenticate the reader when necessary. In this paper, the one-way Hash is used to realize the mutual authentication between RFID tags, readers and application servers. Meanwhile, to solve the tracking attacks of tags, the ID update ability is proposed. The IDs of the RFID tags used in this protocol are variable and traceable. Besides, the out-of-synchronous mechanism and anti-collision mechanism are also designed for the ID-updating stage. BAN logic is used to prove the security of the protocol, and the communication cost simulations of several protocols are carried out and comparisons are then made. Through the security and comparisons performance analysis of various protocols, the proposed protocol is proved to require for a smaller storage space and lower operation cost. What is more, it can resist multiple attacks, which can meet the requirements of the security and privacy of RFID system for the mobile environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Sicari, S., Rizzardi, A., Grieco, L.A.: Security, Privacy and Trust in the Internet of Things. Int. J. Comput. Telecommun. Netw. 76(C), 146–164 (2015)

    Article  Google Scholar 

  2. Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  3. Li, J.G., Zhang, Y.C., Wei, X.X.: A provably secure certificate-based broadcast encryption scheme. Acta Electron. Sin. 44(5), 1101–1110 (2016)

    Google Scholar 

  4. Fang, W.D., Shan, L.H., Jia, G.Q.: A low complexity secure network coding in wireless sensor network. J. Internet Technol. 17(5), 905–913 (2016)

    Google Scholar 

  5. Mujahid, U.: A new ultralight weight RFID mutual authentication protocol: SASI using recursive Hash. Int. J. Distrib. Sens. Netw. 2016(6), 27 (2016)

    Google Scholar 

  6. Peris-Lopez, P., Hernandez-Castro, J., Tapiador J.M.: LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Proceedings of Workshop on RFID Security, vol. 2006, No, 10, pp. 6 (2006)

  7. Peris-Lopez, P., Hernandez-Castro, JC.: EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, pp. 352–361. Montpellier (2006)

  8. Safkhani, M., Peris-Lopez, P.: Cryptanalysis of the Cho et al. protocol: a Hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259(3), 571–577 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  9. Yuan, J.S., Xu, Y.: Mutual authentication protocol for RFID based on asymmetric keys and Hash function. J. Cryptol. Res. 1(5), 456–464 (2014)

    Google Scholar 

  10. Shen, J., Tan, H., Zheng, Y.: An enhanced ID-updating Hash-based RFID authentication protocol with strong privacy protection. Front. Artif. Intell. Appl. 27(4), 121–129 (2015)

    Google Scholar 

  11. Bagheri, N., Safkhani, M., Naderi, M.: Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol. Neural Comput. Appl. 24(3–4), 799–805 (2014)

    Article  Google Scholar 

  12. Shen, J., Tan, H., Zhang, Y., Sun, X., Xiang, Y.: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimed. Tools Appl. 76(21), 22761–22783 (2017)

    Article  Google Scholar 

  13. Chen, C.-L., Yang, T.-T., Leu, F.-Y., Huang, Y.-L.: Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft Comput. 20(3), 365–379 (2014)

    Article  Google Scholar 

  14. Hui Feng, H., Yu, P. K.: A privacy and authentication protocol for mobile RFID system. In: IEEE International Symposium on Independent Computing IEEE, pp. 1–6. Orlando (2015)

  15. Xiaohong, Z., Yingmeng, H.: RFID mutual-authentication protocol with synchronous updated-keys based on Hash function. J. China Univ. Posts Telecommun. 22(6), 27–35 (2015)

    Article  Google Scholar 

  16. Ming Hour, Y.: Lightweight authentication protocol for mobile RFID networks. Int. J. Secur. Netw. 5(1), 53–62 (2010)

    Article  Google Scholar 

  17. Robin, D., Saravanan, S., Wanlei, Z.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11(1), 383–396 (2013)

    Article  Google Scholar 

  18. Wu, X., Min, Z., Yang, X.: Time-stamp based mutual authentication protocol for mobile RFID system. In: Wireless and Optical Communication Conference IEEE, pp. 702–706. Chongqing (2013)

  19. Yoon, E.J.: Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader. Network and Parallel Computing. Springer, Berlin (2012)

    Google Scholar 

  20. Vaidya, B., Makrakis, D., Mouftah, H.T.: Authentication mechanism for mobile RFID based smart grid network. In: Electrical and Computer Engineering IEEE. Toronto (2014)

  21. Mohammad Sabzinejad, F.: Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. 70(2), 987–1001 (2014)

    Article  Google Scholar 

  22. Niu, B., Zhu, X., Chi, H.: Privacy and authentication protocol for mobile RFID systems. Wirel. Pers. Commun. Int. J. 77(3), 1713–1731 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Xu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, Y., Yuan, J. Design and analysis of an ID-updated mutual authentication protocol for mobile RFID system. Photon Netw Commun 37, 204–211 (2019). https://doi.org/10.1007/s11107-018-0812-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11107-018-0812-6

Keywords

Navigation