Skip to main content
Log in

Security of lightweight mutual authentication protocols

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Sensors and IoT (Internet of Things), which include RFID (Radio-Frequency IDentification) tags, have witnessed widespread adoption across a wide variety of application domains over the last two decades. These sensors and IoT devices are often a part of distributed sensor networks. As with any distributed processing scenario, there is a need to ensure that these devices provide required security and privacy to the tagged object as well as its bearer. Cryptography has been used to address the security and privacy aspects of RFID tags. Unlike a majority of other IoT devices, the commonly used passive RFID tags are extremely resource-constrained and therefore can accommodate only lightweight operations. Security and privacy concerns still need to be addressed as they remain significant regardless of implementation details. We evaluate RFID-based lightweight mutual authentication protocols that have been recently proposed and identify vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Alamr AA, Kausar FF, Kim J, Seo C (2018) A secure ECC-based RFID mutual authentication protocol for internet of things. J Supercomput 74:4281–4294

    Article  Google Scholar 

  2. Anandhi S, Anitha R, Sureshkumar V (2018) Automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment. J Supercomput 74:3148–3167

    Article  Google Scholar 

  3. Chinnasamy NV, Senthilkumar A (2020) Secured distributed routing technique using extended DART and table elimination (ET-DART) technique in wireless sensor networks environment. J Supercomput 76:915–931

    Article  Google Scholar 

  4. Chuang Y, Li F (2020) TCR: a trustworthy and churn-resilient academic distribution and retrieval system in P2P networks. J Supercomput 76:7107–7139

    Article  Google Scholar 

  5. Fotohi R, Firoozi Bari S (2020) A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms. J Supercomput 76:6860–6886

    Article  Google Scholar 

  6. Huh J (2020) Reefer container monitoring system using PLC-based communication technology for maritime edge computing. J Supercomput 76:5221–5243

    Article  Google Scholar 

  7. Kang J (2019) Lightweight mutual authentication RFID protocol for secure multi-tag simultaneous authentication in ubiquitous environments. J Supercomput 75:4529–4542

    Article  Google Scholar 

  8. Mabodi K, Yusefi M, Zandiyan S, Irankhah L, Fotohi R (2020) Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J Supercomput 76:7081–7106

    Article  Google Scholar 

  9. Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classifying RFID attacks and defenses. Inf Syst Front 12(5):491–505

    Article  Google Scholar 

  10. Prakash G, Krishnamoorthy R, Kalaivaani PT (2020) Resource key distribution and allocation based on sensor vehicle nodes for energy harvesting in vehicular ad hoc networks for transport application. J Supercomput 76:5996–6009

    Article  Google Scholar 

  11. Reid J, Gonzalez Nieto JM, Tang T, Senadji B (2007) Detecting relay attacks with timing-based protocols. Proceedings of ASIACCS, March, 204-213

  12. Salim MM, Rathore S, Park JH (2020) Distributed denial of service attacks and its defenses in IoT: a survey. J Supercomput 76:5320–5363

    Article  Google Scholar 

  13. Tewari A, Gupta BB (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73:1085–1102

    Article  Google Scholar 

  14. Tu Y-J, Piramuthu S (2020) On addressing RFID/NFC-based relay attacks: an overview. Decis Support Syst 129:113194

    Article  Google Scholar 

  15. Vallathan G, John A, Thirumalai C, Mohan S, Srivastava G, Chun-Wei J (2020) Suspicious activity detection using deep learning in secure assisted living IoT environments. J Supercomput. https://doi.org/10.1007/s11227-020-03387-8

    Article  Google Scholar 

  16. Wang K-H, Chen C-M, Fang W, Wu T-Y (2018) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J Supercomput 74:65–70

    Article  Google Scholar 

  17. Wang R, He G, Wu X, Wang F, Hu Y (2020) Research on suboptimal energy balance of non-uniform distributed nodes in WSN. J Supercomput 76:3527–3541

    Article  Google Scholar 

  18. Wei Y-C, Wu W-C, Lai G-H, Chu Y-C (2020) pISRA: privacy considered information security risk assessment model. J Supercomput 76:1468–1481

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Selwyn Piramuthu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tu, YJ., Kapoor, G. & Piramuthu, S. Security of lightweight mutual authentication protocols. J Supercomput 77, 4565–4581 (2021). https://doi.org/10.1007/s11227-020-03448-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-020-03448-y

Keywords