Review of different classes of RFID authentication protocols

Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.

[1]  Stefanos Gritzalis,et al.  GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol , 2012, ACNS.

[2]  Lejla Batina,et al.  RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.

[3]  Masoumeh Safkhani,et al.  Journal of Computational and Applied Mathematics Cryptanalysis of the Cho Et Al. Protocol: a Hash-based Rfid Tag Mutual Authentication Protocol , 2022 .

[4]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[5]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[6]  Maode Ma,et al.  An ultralightweight RFID authentication protocol with CRC and permutation , 2014, J. Netw. Comput. Appl..

[7]  Aikaterini Mitrokotsa,et al.  A comprehensive RFID solution to enhance inpatient medication safety , 2011, Int. J. Medical Informatics.

[8]  Sasa Radomirovic,et al.  Attacks on RFID Protocols , 2008, IACR Cryptol. ePrint Arch..

[9]  Mehdi Hosseinzadeh,et al.  A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security , 2014 .

[10]  Juan E. Tapiador,et al.  RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.

[11]  Mikhail Nesterenko,et al.  RFID security without extensive cryptography , 2005, SASN '05.

[12]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[13]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[14]  Sijo Joseph,et al.  Secure E-ticketing System based on Mutual Authentication using RFID , 2015, WCI '15.

[15]  Heyoung Lee,et al.  The SAMS: Smartphone Addiction Management System and Verification , 2013, Journal of Medical Systems.

[16]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[17]  Raphael C.-W. Phan,et al.  Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI , 2009, IEEE Transactions on Dependable and Secure Computing.

[18]  Yannick Seurin,et al.  HB#: Increasing the Security and Efficiency of HB+ , 2008, EUROCRYPT.

[19]  Jian Su,et al.  SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system , 2018, Wirel. Networks.

[20]  Jorge Munilla,et al.  HB-MP: A further step in the HB-family of lightweight authentication protocols , 2007, Comput. Networks.

[21]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[22]  Gildas Avoine,et al.  Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols , 2010, RFIDSec.

[23]  Nemai Chandra Karmakar Handbook of Smart Antennas for RFID Systems , 2010 .

[24]  Y. Zhang,et al.  Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems , 2011, IET Commun..

[25]  Mahdi R. Alaghband,et al.  Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard , 2011, ArXiv.

[26]  Chin-Ling Chen,et al.  Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection , 2009, Eng. Appl. Artif. Intell..

[27]  Song Han,et al.  Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor , 2007, ICCSA.

[28]  Robert H. Deng,et al.  Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[29]  KyungOh Lee,et al.  An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems , 2006 .

[30]  Albert Levi,et al.  Providing Resistance against Server Information Leakage in RFID Systems , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.

[31]  Sujuan Liu,et al.  Security Analysis and Improvement on Two RFID Authentication Protocols , 2015, Wirel. Pers. Commun..

[32]  Julien Bringer,et al.  HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[33]  Umar Mujahid,et al.  RCIA: A New Ultralightweight RFID Authentication Protocol Using Recursive Hash , 2015, Int. J. Distributed Sens. Networks.

[34]  Zhen Zhang,et al.  A lightweight anti-desynchronization RFID authentication protocol , 2010, Inf. Syst. Frontiers.

[35]  Eun-Jun Yoon,et al.  Cryptanalysis and improvement of a new ultra-lightweight RFID authentication protocol with permutation , 2013 .

[36]  Basel Alomair,et al.  Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2012, IEEE Trans. Parallel Distributed Syst..

[37]  Eun-Jun Yoon,et al.  A new ultra-lightweight RFID authentication protocol using merge and separation operations , 2013 .

[38]  Ethiopia Nigussie,et al.  An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems , 2014, ANT/SEIT.

[39]  Yannick Seurin,et al.  Good Variants of HB+ Are Hard to Find , 2008, Financial Cryptography.

[40]  Albert Levi,et al.  K-strong Privacy for Radio Frequency Identification Authentication Protocols Based on Physically Unclonable Functions , 2015, Wirel. Commun. Mob. Comput..

[41]  Sang-Soo Yeo,et al.  Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..

[42]  Tassos Dimitriou,et al.  A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[43]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[44]  Gene Tsudik A Family of Dunces: Trivial RFID Identification and Authentication Protocols , 2007, Privacy Enhancing Technologies.

[45]  Liaojun Pang,et al.  Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[46]  Juan E. Tapiador,et al.  Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol , 2009, WISA.

[47]  Mohammad Reza Aref,et al.  Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard , 2011, WISTP.

[48]  Zezhong Zhang,et al.  An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography , 2014, Journal of Medical Systems.

[49]  Ying Zhang,et al.  Tree-LSHB+: An LPN-Based Lightweight Mutual Authentication RFID Protocol , 2013, Wirel. Pers. Commun..

[50]  Mike Burmester,et al.  Universally composable and forward-secure RFID authentication and authenticated key exchange , 2007, ASIACCS '07.

[51]  Hyunsung Kim Enhanced Hash-Based RFID Mutual Authentication Protocol , 2012 .

[52]  Jue-Sam Chou An efficient mutual authentication RFID scheme based on elliptic curve cryptography , 2013, The Journal of Supercomputing.

[53]  Ayman I. Kayssi,et al.  A PUF-based ultra-lightweight mutual-authentication RFID protocol , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[54]  Tzong-Chen Wu,et al.  Two RFID-Based Solutions for Secure Inpatient Medication Administration , 2011, Journal of Medical Systems.

[55]  JaeCheol Ha,et al.  Low-Cost and Strong-Security RFID Authentication Protocol , 2007, EUC Workshops.

[56]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[57]  Huang Shengye,et al.  An enhanced security authentication protocol based on hash-lock for low-cost RFID , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.

[58]  Atsuko Miyaji,et al.  A Secure RFID Authentication Protocol with Low Communication Cost , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.

[59]  L. Batina,et al.  EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol , 2008, 2008 IEEE International Conference on RFID.

[60]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[61]  Yi-Chun Tsai,et al.  Efficient Electronic Toll Collection Protocol for Intelligent Transport System , 2010 .

[62]  Tao Huang,et al.  A Trajectory Privacy Model for Radio-Frequency Identification System , 2016, Wirel. Pers. Commun..

[63]  Zhen Zhang,et al.  Design and Analysis for RFID Authentication Protocol , 2008, 2008 IEEE International Conference on e-Business Engineering.

[64]  Chris J. Mitchell,et al.  RFID authentication protocol for low-cost tags , 2008, WiSec '08.

[65]  Balaji Srinivasan,et al.  Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System , 2012 .

[66]  Jehn-Ruey Jiang,et al.  An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags , 2012, 2012 Fifth International Symposium on Parallel Architectures, Algorithms and Programming.

[67]  Julien Bringer,et al.  Cryptanalysis of EC-RAC, a RFID Identification Protocol , 2008, CANS.

[68]  Matthew J. B. Robshaw,et al.  An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .

[69]  Nai-Wei Lo,et al.  An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System , 2007, EUC Workshops.

[70]  Gökhan Dalkiliç,et al.  An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP , 2017, J. Sensors.

[71]  Umar Mujahid Khokhar,et al.  A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash , 2016, Int. J. Distributed Sens. Networks.

[72]  Zhan Yiju,et al.  A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis , 2008, 2008 ISECS International Colloquium on Computing, Communication, Control, and Management.

[73]  Mohammad Esmaeildoust,et al.  Analysis and Improvement of the Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard , 2014 .

[74]  Ingrid Verbauwhede,et al.  Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware , 2010, Towards Hardware-Intrinsic Security.

[75]  Xu Zhuang,et al.  Security Issues in Ultralightweight RFID Authentication Protocols , 2018, Wirel. Pers. Commun..

[76]  Xu Zhuang,et al.  A New Ultralightweight RFID Protocol for Low-Cost Tags: R$$^{2}$$2AP , 2014, Wirel. Pers. Commun..

[77]  Yu-Yi Chen,et al.  A Design of Tamper Resistant Prescription RFID Access Control System , 2012, Journal of Medical Systems.

[78]  Albert Levi,et al.  An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer , 2013, LightSec.

[79]  Juan E. Tapiador,et al.  Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard , 2009, Comput. Stand. Interfaces.

[80]  Yun Tian,et al.  A New Ultralightweight RFID Authentication Protocol with Permutation , 2012, IEEE Communications Letters.

[81]  R. C. Mittal,et al.  A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System , 2014, Journal of Medical Systems.

[82]  Kazuo Ohta,et al.  A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication , 2011, Financial Cryptography Workshops.

[83]  Serge Vaudenay,et al.  On the Security of HB# against a Man-in-the-Middle Attack , 2008, ASIACRYPT.

[84]  Donghyun Kim,et al.  Strengthening barrier-coverage of static sensor network with mobile sensor nodes , 2016, Wirel. Networks.

[85]  Wang Shaohui,et al.  Analysis of Passive Attack on RFID Authentication Protocol ULAP , 2010 .

[86]  Masoumeh Safkhani,et al.  RFID in eHealth: How to Combat Medication Errors and Strengthen Patient Safety , 2013 .

[87]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[88]  Yue Wu,et al.  An ECDLP-Based Randomized Key RFID Authentication Protocol , 2011, 2011 International Conference on Network Computing and Information Security.

[89]  Juan E. Tapiador,et al.  An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification , 2009, J. Inf. Sci. Eng..

[90]  Jing Li,et al.  Cryptanalysis of the LMAP protocol: A low-cost RFID authentication protocol , 2017, 2017 29th Chinese Control And Decision Conference (CCDC).

[91]  Hyunsung Kim RFID Mutual Authentication Protocol based on Synchronized Secret , 2013 .

[92]  Juan E. Tapiador,et al.  Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations , 2008, ArXiv.

[93]  JaeCheol Ha,et al.  LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System , 2006, ICUCT.

[94]  Adi Botea,et al.  Tractable Multi-Agent Path Planning on Grid Maps , 2009, IJCAI.

[95]  Jens-Peter Kaps,et al.  Chai-Tea, Cryptographic Hardware Implementations of xTEA , 2008, INDOCRYPT.

[96]  Joo Seok Song,et al.  An Improvement in HB-Family Lightweight Authentication Protocols for Practical Use of RFID System , 2013 .

[97]  Behzad Abdolmaleki,et al.  Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags , 2014 .

[98]  Tim Kerins,et al.  Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[99]  Jin-Young Choi,et al.  Formal Verification of Cryptographic Protocol for Secure RFID System , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.

[100]  Young-Sik Jeong,et al.  Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol , 2015, Comput. Math. Appl..

[101]  Srinivas Sampalli,et al.  Technique for preventing DoS attacks on RFID systems , 2010, SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks.

[102]  Juan E. Tapiador,et al.  M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.

[103]  Tao Zhang,et al.  An Enhanced 2-Pass Optimistic Anonymous RFID Authentication Protocol with Forward Security , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[104]  Niu Xin-xin Provable secure mutual authentication protocol for RFID in the standard model , 2013 .

[105]  Kwangjo Kim,et al.  Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .

[106]  Masoumeh Safkhani,et al.  Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems , 2011, IACR Cryptol. ePrint Arch..

[107]  Zhenfu Cao,et al.  Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol , 2008, IACR Cryptol. ePrint Arch..

[108]  Muhammad Torabi Dashti,et al.  A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[109]  Shai Halevi,et al.  Tree-based HB protocols for privacy-preserving authentication of RFID tags , 2011, J. Comput. Secur..

[110]  André Zúquete,et al.  Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags , 2014, RFIDSec.

[111]  Zhuzhong Qian,et al.  ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[112]  Muhammad Khurram Khan,et al.  A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments , 2016, Journal of Medical Systems.

[113]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[114]  Jerry den Hartog,et al.  Formal Verification of Privacy for RFID Systems , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.

[115]  Hung-Yu Chien,et al.  SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.

[116]  Mostafa Belkasmi,et al.  A novel mutual authentication scheme for low-cost RFID systems , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[117]  Jian Huang,et al.  An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[118]  Gökhan Dalkiliç,et al.  Cryptographically Supported NFC Tags in Medication for Better Inpatient Safety , 2014, Journal of Medical Systems.

[119]  Shanlin Yang,et al.  Security and Privacy Analysis of Tree-LSHB+ Protocol , 2014, Wirel. Pers. Commun..

[120]  Kaamran Raahemifar,et al.  HPAP: A novel authentication scheme for RFID systems , 2013, 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[121]  Jie Li,et al.  RSEL: revocable secure efficient lightweight RFID authentication scheme , 2014, Concurr. Comput. Pract. Exp..

[122]  Bo Sheng,et al.  Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.

[123]  Nora Cuppens-Boulahia,et al.  KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems , 2014, J. Netw. Comput. Appl..

[124]  Xuefei Leng,et al.  HB-MP+ Protocol: An Improvement on the HB-MP Protocol , 2008, 2008 IEEE International Conference on RFID.

[125]  Hafize Şen Çakir,et al.  Increasing key space at little extra cost in RFID authentications , 2014 .

[126]  Yanjun Wang,et al.  Securing RFID systems conforming to EPC Class 1 Generation 2 standard , 2010, Expert Syst. Appl..

[127]  Xiaojun Zhang,et al.  A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography , 2015, Journal of Medical Systems.

[128]  Xu Zhuang,et al.  Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement , 2013, J. Inf. Hiding Multim. Signal Process..

[129]  B. B. Gupta,et al.  Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.

[130]  Yingjiu Li,et al.  Protecting RFID communications in supply chains , 2007, ASIACCS '07.

[131]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[132]  Xianghua Xu,et al.  An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol , 2013, J. Comput..

[133]  Manuel Blum,et al.  Secure Human Identification Protocols , 2001, ASIACRYPT.

[134]  Naveen K. Chilamkurti,et al.  Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol , 2014, Journal of Medical Systems.

[135]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[136]  David A. Wagner,et al.  A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..

[137]  Hung-Yu Chien,et al.  Two RFID-based Solutions to Enhance Inpatient Medication Safety , 2011, Journal of Medical Systems.

[138]  Dong Hoon Lee,et al.  Efficient RFID Authentication Protocol for Ubiquitous Computing Environment , 2005, EUC Workshops.

[139]  Zhenguo Zhao,et al.  A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.

[140]  Chih-Ming Hsiao,et al.  A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.

[141]  Paul Müller,et al.  Providing Security and Privacy in RFID Systems Using Triggered Hash Chains , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[142]  Tieyan Li,et al.  Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols , 2007, SEC.

[143]  Lejla Batina,et al.  Untraceable RFID authentication protocols: Revision of EC-RAC , 2009, 2009 IEEE International Conference on RFID.

[144]  Yanfei Liu An Efficient RFID Authentication Protocol for Low-Cost Tags , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[145]  Liaojun Pang,et al.  Secure and efficient lightweight RFID authentication protocol based on fast tag indexing , 2014, Int. J. Commun. Syst..

[146]  Mike Burmester,et al.  Lightweight RFID authentication with forward and backward security , 2011, TSEC.

[147]  Wei Zhang,et al.  An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection , 2017, Wirel. Pers. Commun..

[148]  Jian Shen,et al.  An Efficient RFID Authentication Protocol Providing Strong Privacy and Security , 2016 .