Skip to main content
Log in

A vector-space-based lightweight RFID authentication protocol

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Radio frequency identification (RFID) is becoming one of the best optimistic technology in the area of ubiquitous computing that plays the most crucial role in object identification as a ubiquitous infrastructure. Indeed, an important role of RFID technology is to provide wireless communication between the RFID tags and readers without line-of-sight (LoS) readability. The tags store the sensitive information of an object or thing in RFID systems. The reader reads and writes data, while the backend server stores the information sent by the readers through radio frequency signals. Moreover, the reader collects data from the distinct tags and broadcasts them, and then sends it to the server for further processing. However, security and privacy is a key concern in RFID systems, where an adversary may perform several types of security attacks. To overcome such issues, we have proposed a novel vector-space-based lightweight RFID authentication protocol which integrates the concept of vector space, basis, and linear mapping in this paper that achieves secure authentication. The security analysis has been done that demonstrates the proposed protocol provides resistance to various known attacks. The performance analysis shows the less computation cost associated with the tags, less storage, and communication overhead as well. The proposed protocol provides higher security with lesser cost and shows suitability for low-cost RFID systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Langheinrich M (2009) A survey of RFID privacy approaches. Pers Ubiquit Comput 13(6):413–421

    Article  Google Scholar 

  2. Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394

    Article  MathSciNet  Google Scholar 

  3. J. Leu (2010) The benefit analysis of RFID use in the health management center—The experience in Shin Kong Wu Ho-Su memorial hospital. M.A. thesis, Coll. Manage., Nat. Taiwan Univ., Taipei City, Taiwan, 2010.

  4. Yao W, Chu C, Li Z (2012) The adoption and implementation of RFID technologies in healthcare: a literature review. J Med Syst 36(6):3507–3525

    Article  Google Scholar 

  5. Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classifying RFID attacks and defenses. Inf Syst Front 12(5):491–505

    Article  Google Scholar 

  6. Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In International Conference on Ubiquitous Intelligence and Computing (pp. 912–923). Springer Berlin Heidelberg.

  7. Peris-Lopez, P., Hernandez-Castro, J.C., Estévez-Tapiador, J.M. and Ribagorda, A., 2006, July. LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Proc. of 2nd Workshop on RFID Security (p. 06).

  8. Peris-Lopez P, Hernandez-Castro J, Estevez-Tapiador J, Ribagorda A, (2006) EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In On the move to meaningful internet systems 2006: Otm 2006 Workshops (pp. 352-361). Springer Berlin/Heidelberg

  9. Chien HY (2007) SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secure Comput 4(4):337–340

    Article  Google Scholar 

  10. Phan RCW (2008) Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Trans Dependable Secure Comput 6(4):316–320

    Article  Google Scholar 

  11. Peris-Lopez P, Hernandez-Castro JC, Tapiador JM, Ribagorda A (2008) Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In International Workshop on Information Security Applications (pp. 56–68). Springer, Berlin, Heidelberg.

  12. Lee YC, Hsieh YC, You PS, Chen TC (2009) A new ultralightweight RFID protocol with mutual authentication. In Information Engineering, 2009. ICIE'09. WASE International Conference on (Vol. 2, pp. 58–61). IEEE.

  13. Doss R, Zhou W, Sundaresan S, Yu S, Gao L (2012) A minimum disclosure approach to authentication and privacy in RFID systems. Comput Netw 56(15):3401–3416

    Article  Google Scholar 

  14. Van Le T, Burmester M, De Medeiros B (2007) Universally composable and forward-secure RFID authentication and authenticated key exchange. In Proceedings of the 2nd ACM symposium on Information, computer and communications security (pp. 242–252). ACM.

  15. Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705

    Article  Google Scholar 

  16. Ahmadian Z, Salmasizadeh M, Aref MR (2013) Desynchronization attack on RAPP ultralightweight authentication protocol. Inf Process Lett 113(7):205–209

    Article  MathSciNet  Google Scholar 

  17. Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP. Secur Commun Netw 7(6):945–949

    Article  Google Scholar 

  18. Avoine G, Buttyant L, Holczer T, Vajda I (2007) Group-based private authentication. In World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a (pp. 1–6). IEEE.

  19. Molnar D, Wagner D (2004) Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on Computer and communications security (pp. 210–219).

  20. Rama N, Suganya R (2010) SSL-MAP: A more secure gossamer-based mutual authentication protocol for passive RFID tags. Int J Comput Sci Eng 2:363–367

    Google Scholar 

  21. Philippe, G. and Marc, G., Lightweight code-based authentication and signature.

  22. Tan CC, Sheng B, Li Q (2007) Severless search and authentication protocols for RFID. In Pervasive Computing and Communications, 2007. PerCom'07. Fifth Annual IEEE International Conference on (pp. 3–12). IEEE.

  23. Lin LC, Tsaur SC, Chang KP (2009) Lightweight and serverless RFID authentication and search protocol. In Computer and Electrical Engineering, 2009. ICCEE'09. Second International Conference on (Vol. 2, pp. 95–99). IEEE.

  24. Lee CF, Chien HY, Laih CS (2012) Server-less RFID authentication and searching protocol with enhanced security. Int J Commun Syst 25(3):376–385

    Article  Google Scholar 

  25. Ahamed SI, Rahman F, Hoque E (2008) ERAP: ECC based RFID authentication protocol. In Future Trends of Distributed Computing Systems, 2008. FTDCS'08. 12th IEEE International Workshop on (pp. 219–225). IEEE.

  26. Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2012) Identity establishment and capability based access control (iecac) scheme for internet of things. In Wireless Personal Multimedia Communications (WPMC), 2012 15th International Symposium on (pp. 187–191). IEEE.

  27. Mtita C, Laurent M, Delort J (2016) Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers. IET Inf Secur 10(5):262–271

    Article  Google Scholar 

  28. Fan K, Ge N, Gong Y, Li H, Su R, Yang Y (2017) An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Netw Appl 10(2):368–376

    Article  Google Scholar 

  29. Aghili SF, Mala H (2019) Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce. Int J Commun Syst 32(3):e3837

    Article  Google Scholar 

  30. Maurya PK, Bagchi S (2018) A secure PUF-based unilateral authentication scheme for RFID system. Wireless Pers Commun 103(2):1699–1712

    Article  Google Scholar 

  31. Maurya PK, Bagchi S (2018) Cyclic group based mutual authentication protocol for RFID system. Wireless Networks, pp 1–11

    Google Scholar 

  32. Lipschutz S, Lipson M (2009) Schaum’s outline of theory and problems of linear algebra. Erlangga

    Google Scholar 

Download references

Acknowledgements

This work was carried out in Secure and Computing laboratory, SC&SS, JNU, New Delhi, India and sponsored by the project entitled “Development of Intelligent Device for Security Enhancement (iEYE)” with sanction order: DST/TDT/DDP-12/2017-G.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohd Shariq.

Ethics declarations

Conflicts of interest

The authors declare that they have no competing interests.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shariq, M., Singh, K. A vector-space-based lightweight RFID authentication protocol. Int. j. inf. tecnol. 14, 1311–1320 (2022). https://doi.org/10.1007/s41870-021-00709-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-021-00709-8

Keywords

Navigation