Analysis and Design of Group RFID Tag Security Authentication Protocol

Aiming at solving the defects of security and privacy of conventional RFID authentication protocols and low authentication efficiency, this paper proposes a group tag security authentication protocol. In the group authentication protocol, it needs to prove that certain tags belong to the same group and exist at the same time. The applicability of RFID authentication protocol is introduced in low-cost tag applications, and an improved scalable lightweight RFID authentication protocol is proposed. The tags only generate pseudo-random numbers and perform join (||) and exclusive-OR (XOR) operations. The response message of the tag is identified by using an existing bit arbitration query tree based on grouping mechanism algorithm. Keeping update to the encrypted information in the tag is synchronized with the server throughout the group certification process. Based on these improvements, this protocol improves the efficiency and security of RFID system.

[1]  Behnam Bahrak,et al.  Security analysis of an RFID tag search protocol , 2016, Inf. Process. Lett..

[2]  Masoud Hadian Dehkordi,et al.  Improvement of the Hash-Based RFID Mutual Authentication Protocol , 2014, Wirel. Pers. Commun..

[3]  Jie Wu,et al.  Fast Identification of Blocked RFID Tags , 2018, IEEE Transactions on Mobile Computing.

[4]  Mohammad Reza Aref,et al.  Traceability Analysis of Recent RFID Authentication Protocols , 2015, Wirel. Pers. Commun..

[5]  Mohammad Mardani Shahrbabak,et al.  SRMAP and ISLAP Authentication Protocols: Attacks and Improvements , 2016, IACR Cryptol. ePrint Arch..

[6]  M. Ufuk Çaglayan,et al.  Providing destructive privacy and scalability in RFID systems using PUFs , 2015, Ad Hoc Networks.

[7]  Yuguang Fang,et al.  Lightweight Anonymous Authentication Protocols for RFID Systems , 2017, IEEE/ACM Transactions on Networking.

[8]  Wanlei Zhou,et al.  Secure Tag Search in RFID Systems Using Mobile Readers , 2015, IEEE Transactions on Dependable and Secure Computing.

[9]  Chen Liang,et al.  Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G , 2016, Secur. Commun. Networks.

[10]  Maede Ashouri-Talouki,et al.  DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT , 2017, The Journal of Supercomputing.

[11]  Rasoul Ramezanian,et al.  An Improvement over a Server-less RFID Authentication Protocol , 2014 .

[12]  Muhammad Khurram Khan,et al.  A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments , 2016, Journal of Medical Systems.

[13]  Yang Xiang,et al.  A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment , 2017, Multimedia Tools and Applications.