Efficient and Timely Mutual Authentication Scheme for RFID Systems
Abstract:The Radio Frequency Identification (RFID) technology
has a diverse base of applications, but it is also prone to security
threats. There are different types of security attacks which limit the
range of the RFID applications. For example, deploying the RFID
networks in insecure environments could make the RFID system
vulnerable to many types of attacks such as spoofing attack, location
traceability attack, physical attack and many more. Therefore, security
is often an important requirement for RFID systems. In this paper,
RFID mutual authentication protocol is implemented based on mobile
agent technology and timestamp, which are used to provide strong
authentication and integrity assurances to both the RFID readers and
their corresponding RFID tags. The integration of mobile agent
technology and timestamp provides promising results towards
achieving this goal and towards reducing the security threats in RFID
 R. Weinstein "RFID: A technical overview and its application to the
enterprise," IEEE IT Prof., vol. 7, no. 3, pp.27 -33, 2005.
 Young-Jae Park and Young Beom Kim, “Accelerating RFID Tag
Identification Process with Frame Size Constraint Relaxation,” Journal
of Information and Communication Convergence Engineering, vol.10,
no.3, pp. 242-247, 2012.
 Antonio, F.S.; Ramos Jose, L.H., Moreno, M.V. “A decentralized
approach for Security and Privacy challenges in the Internet of Things,”
In Proceedings of the IEEE World Forum on Internet of Things, Seoul,
Korea, pp. 67–72, 2014.
 Kim, K., Jeon, J., and Yoo K. “Efficient and secure password
authentication schemes for low-power devices,” International Journal of
Security Network, vol.2, no.4, pp.77-81, 2006.
 Y. Lee, L. Batina, D. Singelee and I. Verbauwhede "Low-cost
untraceable authentication protocols for RFID," Proc. of 3rd ACM Conf.
Wireless Network Security (WiSec 2010), pp.55 -64, 2010.
 Miao, J.; Wang, L., “Rapid Identification Authentication Protocol for
Mobile Nodes in Internet of Things with Privacy Protection,” J. Netw,
vol.7, no.3, pp. 1099–1105, 2012.
 Liu and A. Bailey "A privacy and authentication protocol for passive
RFID tags,” Computer Communication, vol. 32, no. 7, pp.1194 -1199,
 Y. Tian, G.L. Chen, and J.H. Li, “A new ultra lightweight RFID
authentication protocol with permutation,” IEEE Communications
Letters, vol. 16, no. 5, pp. 702–705, May 2012.
 Tagra, D., Rahman, M., and Sampalli, “Technique for preventing DoS
attacks on RFID systems,” In 18th international conference on software
telecommunications and computer networks (SoftCOM’10), IEEE
Computer Society, 2010.
 T. Eisenbarth, S. Kumar and C. Paar "A survey of lightweightcryptography
implementations," IEEE Des. Test Comput., vol. 24, no. 6,
pp.522 -533, 2007.
 J. Lim, H. Oh and S. Kim, "A new hash-based RFID mutual
authentication protocol providing enhanced user privacy protection,”
Proc. of 4th Int. Conf. Inf. Secur. Pract. Exper. (ISPEC), pp.278 -289,
 S. Kang, D. Lee and I. Lee "A study on secure RFID mutual
authentication scheme in pervasive,” Computer Communication., vol.
31, no. 18, pp.4248-4254, 2008.
 Stallings W., “Cryptography and network security, principles and
practices”, Practice Hall., 2006.
 Y. Liao and C. Hsiao “Advances in Intelligent Systems and
Applications,” Springer-Verlag, pp.1 -13, 2013.
 Shen J, Choi D, Moh S, Chung I. “A novel anonymous RFID
authentication protocol providing strong privacy and security. In
Multimedia Information Networking and Security (MINES),”
International Conference on., pp. 584-588., 2010.