Skip to main content
Log in

An ultra-lightweight RFID authentication scheme for mobile commerce

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the popularity of mobile social network, more and more people are willing to use a mobile device to accomplish some social activities, such as payment when shopping, product information inquiries, where RFID is a technology which can be good to complete payment functions on mobile devices. However, the widespread use of RFID tags brings the possibility for various security risks and privacy problems. In addition, the storage space, processing capability and power supply of RFID tags are limited. In this paper, in order to reduce the computational cost we present an ultra-lightweight RFID authentication scheme, named ULRAS. ULRAS only uses Bit and XOR operations to prevent the DDOS attack. ULRAS introduces the RR method to make the ULRAS more secure in communication, and uses sub-key and sub-index number into its key update process to achieve the forward security. Compared to the SASI protocol and the Gossamer protocol, ULRAS cost less computation and communication resources and have stronger security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Juels A (2006) RFID security and privacy: A research survey. IEEE J Sel Areas Commun 24(2):381–394

    Article  MathSciNet  Google Scholar 

  2. Ren Y, Chuah M, Yang J, Chen Y (2011) Distributed spatio-temporal social community detection leveraging template matching. Proc GLOBECOM 2011 1–6

  3. Gu L, Pan Y, Dong M, Ota K (2013) Noncommutative lightweight signcryption for wireless Sensor networks. Int J Distrib Sens Netw 10(1):547–565

    Google Scholar 

  4. Dong M, Kimata T, Sugiura K, Zettsu K (2014) Quality-of-Experience (QoE) in emerging mobile social networks. IEICE Trans Inf Syst 97(10):2606–2612

    Article  Google Scholar 

  5. Dong M, Liu X, Qian Z, Liu A, Wang T (2015) QoE-ensured price competition model for emerging mobile networks. IEEE Wirel Commun 22(4):50–57

    Article  Google Scholar 

  6. Su Z, Xu Q (2015) Content distribution over content centric mobile social networks in 5G. IEEE Commun Mag 53(6):66–72

    Article  Google Scholar 

  7. Su Z, Xu Q, Zhu H, Wang Y (2015) A novel design for content delivery over software defined mobile social networks. IEEE Network 29(4):62–67

  8. Engberg SJ, Harning MB, Jensen CD (2004) Zero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience. Proc PST 89–101

  9. Rhee K, Kwak J, Kim S, et al. (2005) Challenge-response based RFID authentication protocol for distributed database environment. Secur Pervasive Comput 70–84

  10. Feldhofer M (2004) An authentication protocol in a security layer for RFID smart tags. Proc MEC 2004 59–762

  11. Saito J, Sakurai K (2005) Grouping proof for RFID tags. Adv Inf Netw Appl 621–624

  12. Fan K, Li J, Li H, Liang X, Shen X, Yang Y (2014) RSEL: Revocable secure efficient lightweight RFID authentication scheme. Concurr Comput Pract Exp 26(5):1084–1096

    Article  Google Scholar 

  13. Fan K, Wang W, Li H, Yang Y (2015) Adaptive sensing private property protection protocol based on cloud. Int J Distrib Sens Netw Article ID 743580, 9 pages. DOI: 0.1155/2015/743580

  14. Chien HY (2007) SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secure Comput 337–340

  15. Peris-Lopez P, Hernandez-Castro JC, Tapiador JME, et al (2009) Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. Inf Secur Appl 56–68

  16. Fan K, Gong Y, Liang CH, Li H, Yang Y (2015) Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur Commun Netw. doi:10.1002/sec.1314, Published online in Wiley Online Library (wileyonlinelibrary.com)

    Google Scholar 

  17. Cao T, Bertino E, Lei H (2009) Security analysis of the SASI protocol. Dependable Secure Comput 6(1):73–77

    Article  Google Scholar 

  18. Bilal Z, Masood A, Kausar F (2009) Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol. Proc NIS 2009 260–267

  19. Tsudik G. YA-TRAP (2006) Yet another trivial RFID authentication protocol. Proc of PerCom 2006. 632–643

  20. Khan G N, Zhu G (2013) Secure RFID authentication protocol with key updating technique. Proc ICCCN 2013 1–5

Download references

Acknowledgments

This work has been financially supported by the National Natural Science Foundation of China (No. 61303216, No. 61373172 and No. 61272457), the China 863 project (No. 2012AA013102), the China Postdoctoral Science Foundation funded project (No.2013M542328), and National 111 Program of China B08038 and B16037, and the Xian Science and Technology Plan funded project (CXY1352WL30).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kai Fan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fan, K., Ge, N., Gong, Y. et al. An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Netw. Appl. 10, 368–376 (2017). https://doi.org/10.1007/s12083-016-0443-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-016-0443-6

Keywords

Navigation