LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT

As one of the core techniques in the Internet of Things (IoT), Radio Frequency Identification (RFID) plays a crucial role in IoT development. Although the low-cost RFID system has wide prospect, it has to face with huge challenges because of potential security risks, privacy problems and efficiency due to its limitations of processing capability, and storage space and power supply in RFID tags. The lightweight RFID mutual authentication protocol is one of the possible solutions in secure authentication of the low-cost RFID system. In this paper, we propose a lightweight RFID mutual authentication protocol with cache in the reader, named LRMAPC, to store the recent visited key of tags in LRMAPC, so that recent visited tags can be authenticated directly in the reader. The LRMAPC can greatly reduce the computational and transmission cost. Especially, it can reduce computational costs greatly when a large number of tags want to be authenticated. We prove the correctness of LRMAPC using GNY Logic. Compared with other existing works, LRMAPC achieves stronger security and higher efficiency.

[1]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[2]  Melanie R. Rieback,et al.  Security and Privacy of Radio Frequency Identification , 2008 .

[3]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[4]  Jianfeng Ma,et al.  A security enhanced authentication and key distribution protocol for wireless networks , 2010, 2010 IEEE Globecom Workshops.

[5]  Jianfeng Ma,et al.  A security enhanced authentication and key distribution protocol for wireless networks , 2010, GLOBECOM 2010.

[6]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[7]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[8]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[9]  Jian Huang,et al.  An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[10]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[11]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[12]  Guang Gong,et al.  Secure and Efficient LCMQ Entity Authentication Protocol , 2013, IEEE Transactions on Information Theory.

[13]  Hui Li,et al.  An Efficient Fast Authentication Protocol , 2009, 2009 International Conference on Computational Intelligence and Security.

[14]  Yong Yu,et al.  Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[15]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .