skip to main content
10.1145/3426826.3426850acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmlmiConference Proceedingsconference-collections
research-article

Improved Secure Lightweight RFID Authentication Protocol

Published: 17 December 2020 Publication History

Abstract

In order to improve the computing performance and security of RFID authentication protocol, an improved lightweight RFID two-way authentication protocol is proposed. With the authorization of a small amount of additional information, the two-way authentication between the reader and the tag can be completed quickly, without the need to communicate with the backend server frequently, which avoids increasing the security risks and communication costs caused by additional communication. Compared with the existing RFID authentication protocol, the improved protocol has meet requirements of backward security, mutual authentication, synchronization and non-denial of service. The improved protocol is suitable to be deployed in mobile RFID environment and applied in low-cost RFID tags.

References

[1]
Doss R, Sundaresan S, Zhou W. A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems.Ad Hoc Networks, 2013, 11(1): 383-396.
[2]
Safkhani M, Jannati H, Bagheri N. Security analysis of niu Authentication and ownership management protocol//International Workshop on Radio Frequency Identification: Security and Privacy Issues. Springer, Cham, 2017:3-16.Martin A. Fischler and Robert C. Bolles. 1981. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24, 6 (June 1981), 381–395. https://doi.org/10.1145/358669.358692
[3]
Wang Jie, Wang Xueming. Improved lightweight mobile RFID mutual authentication protocol. Computer Engineering and Design, 2018, 39(4): 912-917.
[4]
Su Tingting. Passive RFID-oriented security authentication protocol. Computer Engineering and Design, 2017, 38(7): 1697-1701.
[5]
Wei Mianyu, Ou Yuyi. Improved anti-desynchronization attack RFID security protocol. Computer Engineering and Design, 2017, 38 (7): 1719-1723.
[6]
Ma Yuanjia, Liu Daowei. An improved RFID mutual authentication protocol that satisfies backward security. Computer Engineering and Applications, 2017, 53(9): 136-140.
[7]
Su Bin, Cheng Ling, Cui Baojiang. Mobile RFID authentication protocol suitable for low-cost tags. Computer Engineering and Applications, 2018, 54(16):68-75.
[8]
Li Xiyuan, Sun Chao, Zheng Wei. RFID mutual authentication protocol based on pseudo-random function. Computer Engineering and Applications, 2018, 54(17): 67-70.
[9]
Zhan Shanhua. Mobile RFID two-way authentication protocol based on cross-bit operation. Computer Engineering and Applications, 2019, 55(7):120-126.R Core Team. 2019. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria.
[10]
Fan K, Ge N, Gong Y, An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Networking and Applications, 2017, 10 (2): 368–376.
[11]
Aghili S F, Ashouri-Talouki M, Mala H. DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. The Journal of Supercomputing, 2018, 74 (12): 509–525.
[12]
Alamr A A, Kausar F, Kim J, et al. A secure ECC-based RFID mutual authentication protocol for internet of things. Journal of Supercomputing, 2018, 74: 4281-4294.
[13]
Tan C C, Sheng B, Li Q. Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 2008, 7(4): 1400-1407.
[14]
Lee C F, Chien H Y, Laih C S. Server‐less RFID authentication and searching protocol with enhanced security. International Journal of Communication Systems, 2012, 25(3): 376-385.
[15]
Safkhani M, Peris-Lopez P, Bagheri N, On the security of tan serverless RFID authentication and search protocols//Proc of the 8th International Conference on Radio Frequency Identification: Security and Privacy Issues. Springer Verlag, 2012: 1-19.
[16]
Deng M, Yang W, Zhu W. Weakness in a Serverless Authentication Protocol for Radio Frequency Identification//Mechatronics and Automatic Control Systems. Springer International Publishing, 2014: 1055-1061.
[17]
He J, Xu Y, Xu Z. Secure and Private Protocols for Server-less RFID Systems. International Journal of Control and Automation, 2014, 7(2):131-142.
[18]
Tian Y, Chen G L, Li J H. A Lightweight Serverless RFID Tag Search Protocol. Advanced Materials Research, 2013, 684: 531-534.
[19]
Zhang W, Liu S, Wang S, An efficient lightweight RFID authentication protocol with strong trajectory privacy protection. Wireless Personal Communications, 2017, 96(8): 1215–1228.
[20]
Xiao H, Alshehri A A, Christianson B. A cloud-based RFID authentication protocol with insecure communication channels//2016 IEEE Trustcom/bigdatase/i​spa, Tianjin, 2016: 332-339.
[21]
Gao Shujing. Research on the key technology of low-cost passive RFID security. Jinan: Shandong University, 2013.
[22]
Weis S A, Sarma S E, Rivest R L, Security and privacy aspects of low-cost radio frequency identification systems. Security in pervasive computing. Springer Berlin Heidelberg, 2004: 201-212.
[23]
Ohkubo M, Suzuki K, Kinoshita S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID//Proc. of the 2004 Symposium on Cryptography and Information Security, Sendai. 2004: 719-724.
[24]
Henrici D, Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers//Proc of the 2nd IEEE Annual Conference on Pervasive Computing and Communications. Los Alamitos(USA): IEEE Computer Society, 2004: 149-153.
[25]
Rhee K, Kwak J, Kim S, Challenge-response based RFID authentication protocol for distributed database environment. Security in Pervasive Computing. Berlin Heidelberg: Springer, 2005: 70-84.
[26]
Lee S M, Hwang Y J, Lee D H, Efficient authentication for low-cost RFID systems. Computational Science and Its Applications–ICCSA 2005. Berlin Heidelberg: Springer, 2005: 619-627.

Cited By

View all
  • (2021)Constructing effective lightweight privacy protection in RFID-based systemsThe Journal of Supercomputing10.1007/s11227-021-03656-077:9(9658-9688)Online publication date: 1-Sep-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MLMI '20: Proceedings of the 2020 3rd International Conference on Machine Learning and Machine Intelligence
September 2020
138 pages
ISBN:9781450388344
DOI:10.1145/3426826
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 December 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Lightweight authentication protocol for RFID
  2. Network security
  3. Radio frequency identification (RFID)
  4. Random numbers

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

MLMI '20

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Constructing effective lightweight privacy protection in RFID-based systemsThe Journal of Supercomputing10.1007/s11227-021-03656-077:9(9658-9688)Online publication date: 1-Sep-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media