Advertisement

Photonic Network Communications

, Volume 37, Issue 2, pp 204–211 | Cite as

Design and analysis of an ID-updated mutual authentication protocol for mobile RFID system

  • Yang XuEmail author
  • Jinsha Yuan
Original Paper

Abstract

With comprehensive applications of radio-frequency identification (RFID) technology in Internet of things, more and more mobile reader devices are utilized. However, in mobile RFID system the readers are not considered trustworthy as usual; thus, an authentication protocol with the mutual authentication ability is demanded; that is, the tag can authenticate the reader when necessary. In this paper, the one-way Hash is used to realize the mutual authentication between RFID tags, readers and application servers. Meanwhile, to solve the tracking attacks of tags, the ID update ability is proposed. The IDs of the RFID tags used in this protocol are variable and traceable. Besides, the out-of-synchronous mechanism and anti-collision mechanism are also designed for the ID-updating stage. BAN logic is used to prove the security of the protocol, and the communication cost simulations of several protocols are carried out and comparisons are then made. Through the security and comparisons performance analysis of various protocols, the proposed protocol is proved to require for a smaller storage space and lower operation cost. What is more, it can resist multiple attacks, which can meet the requirements of the security and privacy of RFID system for the mobile environment.

Keywords

Mobile RFID system Mutual authentication protocol ID-updating Hash BAN logic 

References

  1. 1.
    Sicari, S., Rizzardi, A., Grieco, L.A.: Security, Privacy and Trust in the Internet of Things. Int. J. Comput. Telecommun. Netw. 76(C), 146–164 (2015)Google Scholar
  2. 2.
    Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)MathSciNetGoogle Scholar
  3. 3.
    Li, J.G., Zhang, Y.C., Wei, X.X.: A provably secure certificate-based broadcast encryption scheme. Acta Electron. Sin. 44(5), 1101–1110 (2016)Google Scholar
  4. 4.
    Fang, W.D., Shan, L.H., Jia, G.Q.: A low complexity secure network coding in wireless sensor network. J. Internet Technol. 17(5), 905–913 (2016)Google Scholar
  5. 5.
    Mujahid, U.: A new ultralight weight RFID mutual authentication protocol: SASI using recursive Hash. Int. J. Distrib. Sens. Netw. 2016(6), 27 (2016)Google Scholar
  6. 6.
    Peris-Lopez, P., Hernandez-Castro, J., Tapiador J.M.: LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Proceedings of Workshop on RFID Security, vol. 2006, No, 10, pp. 6 (2006)Google Scholar
  7. 7.
    Peris-Lopez, P., Hernandez-Castro, JC.: EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, pp. 352–361. Montpellier (2006)Google Scholar
  8. 8.
    Safkhani, M., Peris-Lopez, P.: Cryptanalysis of the Cho et al. protocol: a Hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259(3), 571–577 (2014)MathSciNetzbMATHGoogle Scholar
  9. 9.
    Yuan, J.S., Xu, Y.: Mutual authentication protocol for RFID based on asymmetric keys and Hash function. J. Cryptol. Res. 1(5), 456–464 (2014)Google Scholar
  10. 10.
    Shen, J., Tan, H., Zheng, Y.: An enhanced ID-updating Hash-based RFID authentication protocol with strong privacy protection. Front. Artif. Intell. Appl. 27(4), 121–129 (2015)Google Scholar
  11. 11.
    Bagheri, N., Safkhani, M., Naderi, M.: Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol. Neural Comput. Appl. 24(3–4), 799–805 (2014)Google Scholar
  12. 12.
    Shen, J., Tan, H., Zhang, Y., Sun, X., Xiang, Y.: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimed. Tools Appl. 76(21), 22761–22783 (2017)Google Scholar
  13. 13.
    Chen, C.-L., Yang, T.-T., Leu, F.-Y., Huang, Y.-L.: Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft Comput. 20(3), 365–379 (2014)Google Scholar
  14. 14.
    Hui Feng, H., Yu, P. K.: A privacy and authentication protocol for mobile RFID system. In: IEEE International Symposium on Independent Computing IEEE, pp. 1–6. Orlando (2015)Google Scholar
  15. 15.
    Xiaohong, Z., Yingmeng, H.: RFID mutual-authentication protocol with synchronous updated-keys based on Hash function. J. China Univ. Posts Telecommun. 22(6), 27–35 (2015)Google Scholar
  16. 16.
    Ming Hour, Y.: Lightweight authentication protocol for mobile RFID networks. Int. J. Secur. Netw. 5(1), 53–62 (2010)Google Scholar
  17. 17.
    Robin, D., Saravanan, S., Wanlei, Z.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11(1), 383–396 (2013)Google Scholar
  18. 18.
    Wu, X., Min, Z., Yang, X.: Time-stamp based mutual authentication protocol for mobile RFID system. In: Wireless and Optical Communication Conference IEEE, pp. 702–706. Chongqing (2013)Google Scholar
  19. 19.
    Yoon, E.J.: Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader. Network and Parallel Computing. Springer, Berlin (2012)Google Scholar
  20. 20.
    Vaidya, B., Makrakis, D., Mouftah, H.T.: Authentication mechanism for mobile RFID based smart grid network. In: Electrical and Computer Engineering IEEE. Toronto (2014)Google Scholar
  21. 21.
    Mohammad Sabzinejad, F.: Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. 70(2), 987–1001 (2014)Google Scholar
  22. 22.
    Niu, B., Zhu, X., Chi, H.: Privacy and authentication protocol for mobile RFID systems. Wirel. Pers. Commun. Int. J. 77(3), 1713–1731 (2014)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Electrical and Electronic EngineeringNorth China Electric Power UniversityBeijingChina

Personalised recommendations