A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems

Author(s):  
Muhammad Ikram ◽  
Md. Aminul Haque Chowdhury ◽  
Hassen Redwan ◽  
Jong-Bin Koh ◽  
Ki-Hyung Kim ◽  
...  
2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


2020 ◽  
Vol 16 (10) ◽  
pp. 155014772096789
Author(s):  
Liqian Zhang ◽  
Xueliang Fu ◽  
Honghui Li

In order to guarantee the tag identification accuracy and efficiency in mobile radio frequency identification system, it is necessary to estimate the tags’ arrival rate before performing identification. This research aims to develop a novel estimation method based on improved grey model(1,1) and sliding window mechanism. By establishing tags’ dynamic arrival model, this article emphasizes the importance of tags’ arrival rate estimation in mobile radio frequency identification system. Using sliding window mechanism and weighted coefficients method, weighted grey model(1,1) with sliding window (WGMSW(1,1)) is proposed based on traditional grey model(1,1). For experimental verification, three kinds of data are used as original data in WGMSW(1,1). The experimental results show that the proposed method has lower estimation error rate, lower computation complexity, and high system stability.


Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2957 ◽  
Author(s):  
Feng Zhu ◽  
Peng Li ◽  
He Xu ◽  
Ruchuan Wang

Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers. To solve these issues, lots of authentication protocols are proposed based on physical unclonable functions that can ensure an anti-counterfeiting feature. However, most of the existing schemes require secret parameters to be stored in tags, which are vulnerable to physical attacks that can further lead to the breach of forward secrecy. Furthermore, as far as we know, none of the existing schemes are able to solve the security and privacy problems with good scalability. Since many existing schemes rely on exhaustive searches of the backend server to validate a tag and they are not scalable for applications with a large scale database. Hence, in this paper, we propose a lightweight RFID mutual authentication protocol with physically unclonable functions (PUFs). The performance analysis shows that our proposed scheme can ensure security and privacy efficiently in a scalable way.


Sign in / Sign up

Export Citation Format

Share Document