Computer Science ›› 2017, Vol. 44 ›› Issue (7): 111-115.doi: 10.11896/j.issn.1002-137X.2017.07.021

Previous Articles     Next Articles

Ultra-lightweight Mutual Authentication Protocol for Mobile Radio Frequency Identification

HUANG Qi and LING Jie   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Aiming at the security problem between the reader and back-end server of mobile radio frequency identification caused by wireless transmission,an ultra-lightweight mutual authentication protocol for mobile radio frequency identification are proposed.In the protocol,the tag pseudonyms and key label are dynamically updated by cascade operation,which can effectively hide the true identity of the tag.And the cyclic check function is used for identity authentication between the tag,reader and back-end server,which can achieve the system mutual authentication.Security analysis shows that the proposed protocol can resist many kinds of malicious attacks,such as tracking attack, impersona-tion attack,replay attack,man-in-the-middle attack and so on.Compared with several existing protocol,the protocol reduces the computational and communication costs of the label,which are of high security and low cost.

Key words: Radio frequency identification,Cyclic check function,Mutual authentication,Ultra-lightweight

[1] ZHOU S J,ZHANG W Q,Luo J Q.Overview of radio frequency identification(RFID) privacy protection technology [J].Journal of Software,2015,6(4):960-976.(in Chinese) 周世杰,张文清,罗嘉庆.射频识别(RFID)隐私保护技术综述[J].软件学报,2015,26(4):960-976.
[2] MAMUN M S I,MIYAJI A,RAHMAN M S.A secure and private RFID authentication protocol under SLPN problem[C]∥Proc of the 6th Int Conf on Network and System Security.Berlin:Springer,2012:476-489.
[3] ALOMAIR B,CUELLAR J,POOVENDRAN R.Scalable RFID systems:A privacy-preserving protocol with constant time identification[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(8):1536-1550.
[4] JIN Y M,WU Q Y,SHI Z Q,et al.RFID Lightweight Authentication Protocol Based on PRF[J].Journal of Computer Research and Development,2014,51(7):1506-1514.(in Chinese) 金永明,吴棋滢,石志强,等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,51(7):1506-1514.
[5] SHEN J W,LING J.An improved ultra lightweight RFID authentication protocol[J].Computer Applications and Software,2015,2(2):304-306.(in Chinese) 沈金伟,凌捷.一种改进的超轻量级RFID认证协议[J].计算机应用与软件,2015,2(2):304-306.
[6] GODOR G,IMRE S.Hash-based mutual authentication protocol for low-cost RFID systems[C]∥Proc of the 18th EUNICE Conf on Information and Communications Technologies.Berlin:Springer,2012:76-87.
[7] SURESH T,M R.Mutual authentication protocol for RFID security using NFSR[C]∥IEEE International Conference on Communication Software & Networks.Chengdu,2015:255-259.
[8] PENG P,ZHAO Y M,HAN W L,et al.An ultra-lightweight RFID mutual authentication protocol[J].Computer Enginee-ring,2011,37(16):140-142.(in Chinese) 彭朋,赵一鸣,韩伟力,等.一种超轻量级RFID双向认证协议[J].计算机工程,2011,7(16):140-142.
[9] DU Z Y,ZHANG G A,YUAN H L.Crossover Based Ultra-lightweight RFID Authentication Protocol[J].Computer Science,2013,40(11):35-37.(in Chinese) 杜宗印,章国安,袁红林.基于交叉位运算的超轻量RFID认证协议[J].计算机科学,2013,0(11):35-37.
[10] LIU P,ZHANG C H,Ou Q Y.Authentication security protocol of mobile RFID based on Hash function [J].Journal of Compu-ter Applications,2013,33(5):1350-1352.(in Chinese) 刘鹏,张昌宏,欧庆于.基于Hash函数的移动射频识别互认证安全协议设计[J].计算机应用,2013,33(5):1350-1352.
[11] FU X,GUO Y.A lightweight RFID mutual authentication protocol with ownership transfer [J].Communications in Computer and Information Science,2012,334:68-74.
[12] NIU B,ZHU X,CHI H,et al.Privacy and authentication protocol for mobile RFID systems [J].Wireless Personal Communications,2014,77(3):1-19.
[13] TAO Y,ZHOU X,MA Y P,et al.Mutual authentication protocol of mobile RFID based on Hash function[J].Journal of Computer Applications,2016,36(3):657-660.(in Chinese) 陶源,周喜,马玉鹏,等.基于Hash函数的移动双向认证协议 [J].计算机应用,2016,36(3):657-660.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .