Skip to main content
Log in

Constructing effective lightweight privacy protection in RFID-based systems

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

RFID systems usually involve passive tags (with limited computing and storage capacity) to secure data exchange via wireless communication. This paper builds an effective lightweight privacy protection authentication protocol, over the XCro, rotation and XOR functions, to handle the privacy and security problems in RFID systems. We employ both BAN Logic and ProVerif to prove that the new protocol is secure, its writing logic is correct, the query results are true and the protocol is free of all common attacks. We also conduct the OPNET simulation to evaluate the performance of our protocol and the existing lightweight protocol of Fan, in terms of authentication time, throughput, bandwidth consumption rate and queuing delay. The obtained results show that our protocol is more secure and effective—because we can resist all of the mentioned common attacks by a more efficient authentication process which involves less calculations, communications and transmissions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Ind Informat 14(4):1656–1665

    Article  Google Scholar 

  2. Damghani H, Hosseinian H, Damghani L (2019) Investigating attacks to improve security and privacy in RFID systems using the security bit method. In: Proceedings of 2019 5th Conference on Knowledge Based Engineering and Innovation, 2019, pp 833–838

  3. Huang H, Yu P, Liu K (2014) A privacy and authentication protocol for mobile RFID system. In: Proceedings of 2014 IEEE Int’l Symposium on Independent Computing, 2014, pp 1–6

  4. Bernardi P, Gandino F, Lamberti F, Montrucchio B, Rebaudengo M, Sanchez ER (2008) An anti-counterfeit mechanism for the application layer in low-cost RFID devices. In: Proceedings of 2008 4th European Conference on Circuits and Systems for Communications, 2008, pp 227–231

  5. EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard (2018) Specification for RFID air interface protocol for communications at 860 MHz–960 MHz, 2018 GS1 AISBL, Release 2.1, Ratified, Jul 2018

  6. Maarof A, Labbi Z, Senhadji M, Belkasmi M (2016) A novel mutual authentication scheme for low-cost RFID systems. In: Proceedings of 2016 Int’l Conference on Wireless Networks and Mobile Communications, Feb 2016, pp 240–245

  7. Noor NM et al (2016) A study of authentication protocols for security of mobile RFID (M-RFID) system. In: Proceedings of 2016 Int’l Conference on Advances in Electrical, Electronic and Systems Engineering, 2016, pp 339–343

  8. Gódor G, Imre S (2011) Elliptic curve cryptography based authentication protocol for low-cost RFID tags. In: Proceedings of 2011 IEEE Int’l Conference on RFID-Technologies and Applications, 2011, pp 386–393

  9. Khan S, AggarwalRK (2019) Efficient mutual authentication mechanism to secure Internet of Things (IoT). In: Proceedings of 2019 Int’l Conference on Machine Learning, Big Data, Cloud and Parallel Computing, 2019, pp 409–412

  10. Xie W, Xie L, Zhang C, Zhang Q, Tang C (2013) Cloud-based RFID authentication. In: Proceedings of 2013 IEEE Int’l Conference on RFID, 2013, pp 168–175

  11. Yu W, Jiang Y (2017) Mobile RFID mutual authentication protocol based on hash function. In: Proceedings of 2017 Int’l Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017, pp 358–361

  12. He F, Fang Z, Wang D, Wang Q, Hao Y, Wang X (2020) Improved secure lightweight RFID authentication protocol. In: Proceedings of 3rd Int’l Conference on Machine Learning and Machine Intelligence, Sept 2020, pp 127–132

  13. Wu F, Xu L, Kumari S, Li X, Das AK, Shen J (2018) A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J Ambient Intell Humaniz Comput 9(4):919–930

    Article  Google Scholar 

  14. Gabsi S, Beroulle V, Bilgacem H, Machhout M (2019) Architectural choices for implementing a secure ECC-based lightweight RFID tag. In: Proceedinsg of 2019 IEEE Int’l Conference on Design & Test of Integrated Micro & Nano-systems, 2019, pp 1–5

  15. Huang Y, Jiang J (2012) An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags. In: Proceedings of 2012 5th Int’l Symposium on Parallel Architectures, Algorithms and Programming, 2012, pp 133–140

  16. Baghery K, Abdolmaleki B, Akhbari B, Aref MR (2015) Untraceable RFID authentication protocols for EPC compliant tags. In: Proceedings of 2015 23rd Iranian Conference on Electrical Engineering, 2015, pp 426–431

  17. Shi Z, Chen J, Chen S, Ren S (2017) A lightweight RFID authentication protocol with confidentiality and anonymity. In: Proceedings of 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference, 2017, pp 1631–1634

  18. Azad S, Ray B (2019) A lightweight protocol for RFID authentication. In: Proceedings of 2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering, 2019, pp 1–6

  19. Tewari A, Gupta BB (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085–1102

    Article  Google Scholar 

  20. Wang K, Chen C, Fang W, Wu T (2018) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J Supercomput 74(1):65–70

    Article  Google Scholar 

  21. Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36

    Article  Google Scholar 

  22. [online] Available: https://en.wikipedia.org/wiki/Burrows-Abadi-Needham_logic

  23. [online] Available: https://prosecco.gforge.inria.fr/personal/bblanche/proverif/

  24. Marino F, Massei G, Paura L (2013) Modeling and performance simulation of EPC Gen2 RFID on OPNET. In: Proceedings of 2013 IEEE Int’l Workshop on Measurements & Networking, 2013, pp 83–88

  25. Keil Embeded Development Tool. https://www.keil.com

  26. Zhang X, Hu Y (2015) RFID mutual-authentication protocol with synchronous updated-keys based on Hash function. J China Univ Posts Telecommun 22(6):27–35

    Article  Google Scholar 

  27. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208

    Article  MathSciNet  Google Scholar 

  28. [online] Available: https://proverif16.paris.inria.fr/index.php

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Po-Jen Chuang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chuang, PJ., Tu, YF. Constructing effective lightweight privacy protection in RFID-based systems. J Supercomput 77, 9658–9688 (2021). https://doi.org/10.1007/s11227-021-03656-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-03656-0

Keywords

Navigation