Abstract
Radio frequency identification (RFID) is becoming one of the best optimistic technology in the area of ubiquitous computing that plays the most crucial role in object identification as a ubiquitous infrastructure. Indeed, an important role of RFID technology is to provide wireless communication between the RFID tags and readers without line-of-sight (LoS) readability. The tags store the sensitive information of an object or thing in RFID systems. The reader reads and writes data, while the backend server stores the information sent by the readers through radio frequency signals. Moreover, the reader collects data from the distinct tags and broadcasts them, and then sends it to the server for further processing. However, security and privacy is a key concern in RFID systems, where an adversary may perform several types of security attacks. To overcome such issues, we have proposed a novel vector-space-based lightweight RFID authentication protocol which integrates the concept of vector space, basis, and linear mapping in this paper that achieves secure authentication. The security analysis has been done that demonstrates the proposed protocol provides resistance to various known attacks. The performance analysis shows the less computation cost associated with the tags, less storage, and communication overhead as well. The proposed protocol provides higher security with lesser cost and shows suitability for low-cost RFID systems.
Similar content being viewed by others
References
Langheinrich M (2009) A survey of RFID privacy approaches. Pers Ubiquit Comput 13(6):413–421
Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394
J. Leu (2010) The benefit analysis of RFID use in the health management center—The experience in Shin Kong Wu Ho-Su memorial hospital. M.A. thesis, Coll. Manage., Nat. Taiwan Univ., Taipei City, Taiwan, 2010.
Yao W, Chu C, Li Z (2012) The adoption and implementation of RFID technologies in healthcare: a literature review. J Med Syst 36(6):3507–3525
Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classifying RFID attacks and defenses. Inf Syst Front 12(5):491–505
Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In International Conference on Ubiquitous Intelligence and Computing (pp. 912–923). Springer Berlin Heidelberg.
Peris-Lopez, P., Hernandez-Castro, J.C., Estévez-Tapiador, J.M. and Ribagorda, A., 2006, July. LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Proc. of 2nd Workshop on RFID Security (p. 06).
Peris-Lopez P, Hernandez-Castro J, Estevez-Tapiador J, Ribagorda A, (2006) EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In On the move to meaningful internet systems 2006: Otm 2006 Workshops (pp. 352-361). Springer Berlin/Heidelberg
Chien HY (2007) SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secure Comput 4(4):337–340
Phan RCW (2008) Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Trans Dependable Secure Comput 6(4):316–320
Peris-Lopez P, Hernandez-Castro JC, Tapiador JM, Ribagorda A (2008) Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In International Workshop on Information Security Applications (pp. 56–68). Springer, Berlin, Heidelberg.
Lee YC, Hsieh YC, You PS, Chen TC (2009) A new ultralightweight RFID protocol with mutual authentication. In Information Engineering, 2009. ICIE'09. WASE International Conference on (Vol. 2, pp. 58–61). IEEE.
Doss R, Zhou W, Sundaresan S, Yu S, Gao L (2012) A minimum disclosure approach to authentication and privacy in RFID systems. Comput Netw 56(15):3401–3416
Van Le T, Burmester M, De Medeiros B (2007) Universally composable and forward-secure RFID authentication and authenticated key exchange. In Proceedings of the 2nd ACM symposium on Information, computer and communications security (pp. 242–252). ACM.
Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705
Ahmadian Z, Salmasizadeh M, Aref MR (2013) Desynchronization attack on RAPP ultralightweight authentication protocol. Inf Process Lett 113(7):205–209
Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP. Secur Commun Netw 7(6):945–949
Avoine G, Buttyant L, Holczer T, Vajda I (2007) Group-based private authentication. In World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a (pp. 1–6). IEEE.
Molnar D, Wagner D (2004) Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on Computer and communications security (pp. 210–219).
Rama N, Suganya R (2010) SSL-MAP: A more secure gossamer-based mutual authentication protocol for passive RFID tags. Int J Comput Sci Eng 2:363–367
Philippe, G. and Marc, G., Lightweight code-based authentication and signature.
Tan CC, Sheng B, Li Q (2007) Severless search and authentication protocols for RFID. In Pervasive Computing and Communications, 2007. PerCom'07. Fifth Annual IEEE International Conference on (pp. 3–12). IEEE.
Lin LC, Tsaur SC, Chang KP (2009) Lightweight and serverless RFID authentication and search protocol. In Computer and Electrical Engineering, 2009. ICCEE'09. Second International Conference on (Vol. 2, pp. 95–99). IEEE.
Lee CF, Chien HY, Laih CS (2012) Server-less RFID authentication and searching protocol with enhanced security. Int J Commun Syst 25(3):376–385
Ahamed SI, Rahman F, Hoque E (2008) ERAP: ECC based RFID authentication protocol. In Future Trends of Distributed Computing Systems, 2008. FTDCS'08. 12th IEEE International Workshop on (pp. 219–225). IEEE.
Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2012) Identity establishment and capability based access control (iecac) scheme for internet of things. In Wireless Personal Multimedia Communications (WPMC), 2012 15th International Symposium on (pp. 187–191). IEEE.
Mtita C, Laurent M, Delort J (2016) Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers. IET Inf Secur 10(5):262–271
Fan K, Ge N, Gong Y, Li H, Su R, Yang Y (2017) An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Netw Appl 10(2):368–376
Aghili SF, Mala H (2019) Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce. Int J Commun Syst 32(3):e3837
Maurya PK, Bagchi S (2018) A secure PUF-based unilateral authentication scheme for RFID system. Wireless Pers Commun 103(2):1699–1712
Maurya PK, Bagchi S (2018) Cyclic group based mutual authentication protocol for RFID system. Wireless Networks, pp 1–11
Lipschutz S, Lipson M (2009) Schaum’s outline of theory and problems of linear algebra. Erlangga
Acknowledgements
This work was carried out in Secure and Computing laboratory, SC&SS, JNU, New Delhi, India and sponsored by the project entitled “Development of Intelligent Device for Security Enhancement (iEYE)” with sanction order: DST/TDT/DDP-12/2017-G.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no competing interests.
Rights and permissions
About this article
Cite this article
Shariq, M., Singh, K. A vector-space-based lightweight RFID authentication protocol. Int. j. inf. tecnol. 14, 1311–1320 (2022). https://doi.org/10.1007/s41870-021-00709-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-021-00709-8