Vol. 5 No. 1 (2025): Journal of Millimeterwave Communication, Optimization and Modelling
Articles

A Secure Lightweight Authentication Scheme for RFID Systems in IoT Environment

Dr. Md Morshed
Daffodil International University

Published 28.02.2025

Keywords

  • RFID security,
  • IoT,
  • privacy,
  • recovery,
  • authentication

Abstract

Radio Frequency Identification (RFID) technology is suitable for IoT applications. RFID is cheap and light weight and hence it is very popular in IoT technology. The concern of research community is the privacy and security issue of RFID system. Due to low storages of RID tag it a challenging research problem to ensure privacy and security such as data visibility, loss, modification, eavesdrop etc.  In this paper we propose a new RFID authentication protocol for RFID system. It ensures privacy and security in IOT environment in a more efficient way. To ensure better security we use a different password for each tag and it changes after each authentication process. It also can protect from an unexpected lack of synchronization in case an incomplete authentication is held for any unwanted problem in authentication phase. The proposed protocol shows some relatively superior performance in some aspects of computation and storages.

References

  1. A. Jules,S. Garfinkel, and R. Pappu, “RFID privacy: an overview of problems and proposed solutions,” IEEE Security and Privacy. 3(3): 34-43, May/June 2005.
  2. A. Jules, “RFID security and privacy: A research survey,” IEEE Journal on Selected Areas in Communication, 24(2), February 2006.
  3. EPCglobal Web site, 2005. Referenced 2005 at http://www.EPCglobalinc.org.
  4. R. Want,”An Introduction to RFID Technilogy,” IEEE Pervasive Computing, vol. 5, pp. 25 – 33, 2005.
  5. B. S. Prabhu, X. Su, H. Ramamurthy, C. Chu, R. Gadh, “WinRFID – A Middleware for the enablement of Radio Frequency Identification (RFID) based Applications,” UCLA - Wireless Internet for the Mobile Enterprise Consortium (WINMEC)420 Westwood Pl., Los Angeles CA 90095.
  6. D. Molnar and D. Wagner, “Privacy and security in library RFID: Issues, practices, and architectures,” In B. Pfitzmann and P. Liu, editors, Conference on Computer and Communications Security - ACM CCS, pages 210–219, Washington, DC, USA, October 2004. ACM Press.
  7. K. Rhee, J. Kwak, S. Kim and D. Won, “Challenge-Response Based RFID Authentication Protocol for Distributed Database Environmnet,” SPC 2005, LNCS 3450, pp. 70-84, 2005.
  8. E.Y. Choi, S.M. Lee, D.H. Lee, “Efficient RFID Authentication Protocol for Ubiquitous Computing Environment,” Embedded and Ubiquitous Computing, vol.3832, pp.945-954, 2005.
  9. J. Zhi-Wei , S. Xiao-yan, H. Lee and Z. Tao, “A Revised One-way Hash based Low-cost Authentication Protocol In RFID System,” Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference, Page(s): 1 – 4.
  10. M. Ohkubo, K. Suzki, and S. Kinoshita, ”Cryptographic approach to “privacy-friendly” tags.,” In RFID Privacy Workshop, MIT, MA, USA, November 2003. http://www.rfidprivacy.us/2003/agenda.php.
  11. H. Chien and C. Chen, ”Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards,” Computer Standards & Interfaces, 29(2):254–259, February 2007.
  12. D. Henrici and P. Muller, “Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers,” In R. Sandhu and R. Thomas, editors, International Workshop on Pervasive Computing and Communication Security -PerSec 2004, pages 149–153, Orlando, Florida, USA, March 2004. IEEE Computer Society.
  13. S.M. Lee, Y.J. Hwang, D.H. Lee and J.I. Lim, “Efficient Authentication for Low-Cost RFID systems,” ICCSA05, vol. 3480 LNCS, pp.619-629, Springer-Verlag, 2005.
  14. B. Song and C. J. Mitchell, “RFID authentication protocol for low-cost tags,” In WISEC, pages 140-147, 2008.
  15. T. Dimitriou, “A lightweight RFID protocol to protect against traceability and cloning attacks,” In Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm, pages 59–66, Athens, Greece, September 2005. IEEE.
  16. B. Song, “RFID Tag Ownership Transfer,” In 4thWorkshop on RFID Security (RFIDsec 08), Budaperst, Hungary, July 2008.
  17. M.E. Hoque,F. Rahman, S.I. Ahamed, “Supporting Recovery, Privacy and Security in RFID Systems Using A Robust Authentication Protocol,” Proceedings of the 2009 ACM symposium on Applied Computing, SAC’09, Honlulu, Hawaii,USA. pp.1062-1066.
  18. S. Cai, Y. Li, T. Li, R. H. Deng, “Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions,” WiSec’09, March 16–18, 2009, Zurich, Switzerland.
  19. M. Shafiq, K. Shingh, C. Lal, M. Conti, T. Khan, ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags. Computer Networks, 217(2022), pp. 1-11.
  20. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M Estévez- Tapiador, Arturo Ribagorda, LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags, in: Proc. of 2nd Workshop on RFID Security, Vol. 6, 2006.
  21. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M Estevez-Tapiador, Arturo Ribagorda, ????2AP: a minimalist mutual-authentication protocol for lowcost RFID tags, in: International Conference on Ubiquitous Intelligence and Computing, Springer, 2006, pp. 912–923.
  22. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M Estevez-Tapiador, Arturo Ribagorda, EMAP: An efficient mutual-authentication protocol for lowcost RFID tags, in: OTM Confederated International Conferences ‘‘on the Move to Meaningful Internet Systems’’, Springer, 2006, pp. 352–361.
  23. Ticyan Li, Guilin Wang, Security analysis of two ultra-lightweight RFID authentication protocols, in: IFIP International Information Security Conference, Springer, 2007, pp. 109–120.
  24. Tieyan Li, Robert Deng, Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol, in: The Second International Conference on Availability, Reliability and Security (ARES’07), IEEE, 2007, pp. 238–245.
  25. Lijun Gao, Maode Ma, Yantai Shu, Yuhua Wei, An ultralightweight RFID authentication protocol with CRC and permutation, J. Netw. Comput. Appl. 41 (2014) 37–46.
  26. Yun Tian, Gongliang Chen, Jianhua Li, A new ultralightweight RFID authentication protocol with permutation, IEEE Commun. Lett. 16 (5) (2012) 702–705.
  27. Hanguang Luo, Guangjun Wen, Jian Su, Zhong Huang, SLAP: Succinct and lightweight authentication protocol for low-cost RFID system, Wirel. Netw. 24 (1) (2018) 69–78.
  28. Yali Liu, Martianus Frederic Ezerman, Huaxiong Wang, Double verification protocol via secret sharing for low-cost RFID tags, Future Gener. Comput. Syst. 90 (2019) 118–128.
  29. Yali Liu, Xinchun Yin, Yongquan Dong, Keke Huang, Lightweight authentication scheme with inverse operation on passive rfid tags, J. Chin. Inst. Eng. 42 (1) (2019) 74–79.
  30. Liang Xiao, He Xu, Feng Zhu, Ruchuan Wang, Peng Li, SKINNY-based RFID lightweight authentication protocol, Sensors 20 (5) (2020) 1366.
  31. Cuong Trinh, Bao Huynh, Jan Lansky, Stanislava Mildeova, Masoumeh Safkhani, Nasour Bagheri, Saru Kumari, Mehdi Hosseinzadeh, A novel lightweight block cipher-based mutual authentication protocol for constrained environments, IEEE Access 8 (2020) 165536–165550.
  32. Mohd Shariq, Karan Singh, Pramod Kumar Maurya, Ali Ahmadian, Muhammad Rezal Kamel Ariffin, URASP: An ultralightweight RFID authentication scheme using permutation operation, Peer-to-Peer Netw. Appl. 14 (6) (2021) 3737–3757.
  33. Il-Soo Jeon, Eun-Jun Yoon, A new ultra-lightweight RFID authentication protocol using merge and separation operations, Int. J. Math. Anal. 7 (52) (2013) 2583–2593.
  34. Mathieu David, Neeli R. Prasad, Providing strong security and high privacy in low-cost RFID networks, in: International Conference on Security and Privacy in Mobile Information and Communication Systems, Springer, 2009, pp. 172–179.
  35. Xu Zhuang, Yan Zhu, Chin-Chen Chang, A new ultralightweight RFID protocol for low-cost tags: ????2AP, Wirel. Pers. Commun. 79 (3) (2014) 1787–1802.
  36. Madiha Khalid, Umar Mujahid, M Najam-ul Islam, Hongsik Choi, Imtiaz Alam, Shahzad Sarwar, Ultralightweight resilient mutual authentication protocol for IoT based edge networks, J. Ambient Intell. Humaniz. Comput. (2021) 1–12.
  37. C. Cremers, Scyther tool, 2021, http://www.cs.ox.ac.uk/people/cas.cremers/scyther/. [Online; Accessed on March 10, 2021].