Internet of Things (IoT) is a novel paradigm that connects several physical devices and the cyber world over the Internet. IoT technology is growing rapidly and soon will have an enormous innovation in our daily lives. With the increasing number of connected IoT devices making our daily lives more convenient, it puts personal data at serious risk too. Radio frequency identification (RFID) contributes to IoT applications in the automatic identification of the connected devices. However, the primary concerns with the RFID tag connected devices are their security and privacy. The communication channel is deemed to be wireless or insecure between the tags and the readers, which makes RFID system vulnerable to the various known attacks. To deal with these security flaws, we have put forward a novel vector-space-based lightweight RFID authentication protocol for IoT environment named VLPRAP. The proposed protocol integrates vector space, linear mapping and basis mechanism that achieves secure authentication and improves security and privacy without increasing the computational cost. The correctness of the proposed VLPRAP protocol has been validated using BAN logic inference rules. The formal and informal security analysis demonstrates that our proposed protocol resists various malicious security threats, providing better security and higher efficiency. Furthermore, the performance analysis of our proposed protocol has been measured in terms of computation operations, storage requirement and communication overhead, which shows that better performance as compared to related existing protocols.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
Tax calculation will be finalised during checkout.
Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Industr Inf 14(4):1656–1665
Ma M, He D, Kumar N, Raymond Choo K-K, Chen J (2017) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans Ind Informat. https://doi.org/10.1109/TII.2017.2703922
Hu P, Ning H, Qiu T, Zhang Y, Luo X (2017) Fog computing-based face identification and resolution scheme in internet of things. IEEE Trans Ind Informat 13(4):1910–1920
Wang KH, Chen CM, Fang W, Wu TY (2018) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J Supercomput 74(1):65–70
Rostampour S, Bagheri N, Hosseinzadeh M, Khademzadeh A (2018) A scalable and lightweight grouping proof protocol for internet of things applications. J Supercomput 74(1):71–86
Alamr AA, Kausar F, Kim J, Seo C (2018) A secure ECC-based RFID mutual authentication protocol for internet of things. J Supercomput 74(9):4281–4294
Salem FM, Amin R (2020) A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Inf Sci 527:382–393
Chen X, Geng D, Zhai J, Liu W, Zhang H, Zhu T (2020) Security analysis and enhancement of the most recent RFID protocol for telecare medicine information system. Wireless Person Commun
Juels A (2006) RFID security, and privacy: a research survey. IEEE J Sel Areas Commun 24:381–394
Miorandi D, Sicari S, Pellegrini FD, Chlamtac I (2012) Internet of things: Vision, applications and research challenges. Ad Hoc Netw 10:1497–1516
Doss R, Sundaresan S, Zhou W (2013) A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw 11:383–396
Aghili SF, Mala H, Kaliyar P, Conti M (2019) SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT. Future Gener Comput Syst 101:621–634
Safkhani M, Bendavid Y, Rostampour S, Bagheri (2019) On designing lightweight RFID security protocols for medical IoT. Cryptology ePrint Archive, Report 2019/851, 2019. https://eprint.iacr.org/2019/851
Fan K, Zhu S, Zhang K, Li H, Yang Y (2019) A lightweight authentication scheme for cloud-based RFID healthcare systems. IEEE Netws 33(2):44–49
Safkhani M, Rostampour S, Bendavid Y, Bagheri N (2020) IoT in medical & pharmaceutical: designing lightweight RFID security protocols for ensuring supply chain integrity. Comput Netw 181:107558
Fan K, Wang W, Jiang W, Li H, Yang Y (2018) Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. Peer-to-Peer Netw Appl 11(4):723–734
Fan K, Jiang W, Luo Q, Li H, Yang Y (2019) Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV. J Franklin Inst
Fan K, Kang J, Zhu S, Li H, Yang Y (2019) Permutation matrix encryption based ultralightweight secure RFID scheme in internet of vehicles. Sensors 19(1):152
Kumar V, Ahmad M, Mishra D, Kumari S, Khan MK (2020) RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Vehicul Commun 22:100213
Safkhani M, Camara C, Peris-Lopez P, Bagheri N (2020) RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing. Vehicul Commun, 100311
Lee C-C, Li C-T, Cheng C-L, Lai Y-M (2019) A novel group ownership transfer protocol for RFID systems. Ad Hoc Netw 91:101873
Karmakar NC (2011) Handbook of smart antennas for RFID systems. Wiley
He D, Zeadally S (2015) An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J 2:72–83
Gope P, Hwang T (2015) A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput Secur 55:271–280
Gope P, Amin R, Islam SH, Kumar N, Bhalla VK (2018) Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener Comput Syst 83:629–637
Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems, security in pervasive computing lecture notes in computer science, pp 201–212
Yang J, Park J, Lee H, Ren K, Kim K (2005) Mutual authentication protocol for low-cost RFID. WRLC, In Workshop on RFID and Lightweight Crypto, pp 17–24
Piramuthu S (2011) RFID mutual authentication protocols. Decis Support Syst 50(2):387–393
Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In:Proceedings of 2nd Workshop on RFID Security
Peris-Lopez P, Hernandez-Castro JC, Estevez-TapiadorJM, Ribagorda A (2006) M2AP: a minimalist mutual-authentication protocol for low-cost RFID Tags, ubiquitous intelligence and computing lecture notes in computer science, pp 912–923
Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) EMAP: an efficient mutual-authentication protocol for low-cost RFID tags, on the move to meaningful internet systems 2006: OTM 2006 snce, pp 352–361
Li T, Wang G (2007)Security analysis of two ultra-lightweight RFID authentication protocols, new approaches for security, privacy and trust in complex environments IFIP International federation for information processing, pp 109–120
Chien H-Y (2007) SASI: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secure Comput 4:337–340
Phan R-W (2009) cryptanalysis of a new ultralightweight RFID sol—SASI. IEEE Trans Dependable Secure Comput 6:316–320
Peris-Lopez P, Hernandez-Castro JC, Tapiador JME, Ribagorda A (2009) Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol, Information Security Applications Lecture Notes in Computer Science, pp 56–68
Bilal Z, Masood A, Kausar F (2009) Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol, International Conference on Network-Based Information Systems, pp 260–267
Zuo Y (2009) Secure and private search protocols for RFID systems. Inform Syst Front 12:507–519
Piramuthu S (2012) Vulnerabilities of RFID protocols proposed in ISF. Information Systems Frontiers 14(3):647–651
Tian Y, Chen G, Li J (2012) A New Ultralightweight RFID Authentication Protocol with Permutation. IEEE Commun Lett 16:702–705
Ahmadian Z, Salmasizadeh M, Aref MR (2013) Desynchronization attack on RAPP ultralightweight authentication protocol. Inform Process Lett 113:205–209
Gao L, Ma M, Shu Y, Wei Y (2014) An ultralightweight RFID authentication protocol with CRC and permutation. J Netw Comput Appl 41:37–46
Akgün M, Ҫaǧlayan MU (2013) On the security of recently proposed RFID protocols. IACR Cryptol ePrint Arch, 820
Khan GN, Moessner M (2014) Low-cost authentication protocol for passive, computation capable RFID tags. Wireless Netw 21:565–580
Fan K, Ge N, Gong Y, Li H, Su R, Yang Y (2016) An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Netw Appl 10:368–376
Aghili SF, Mala H (2019) Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce. Int J Commun Syst 32(3):e3837
Safkhani M, Bagheri N, Shariat M (2018) On the security of rotation operation based ultra-lightweight authentication protocols for RFID systems. Future Internet 10(9):82
Lipschutz S, Lipson M (2009) Schaum's outline of theory and problems of linear algebra. Erlangga
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29:198–208
Avoine G (2005) Adversarial model for radio frequency identification. Technical Report, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC)
Alomair B, Clark A, Cuellar J, Poovendran R (2012) Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Trans Parallel Distrib Syst 23:1536–1550
Burrows M, AbadiM, Needham R (1989) A logic of authentication. In: Proceedings of the twelfth ACM symposium on operating systems principles–SOSP 89
This work was carried out in Secure and Computing laboratory, SC&SS, JNU, New Delhi, India, and sponsored by the project entitled “Development of Intelligent Device for Security Enhancement (iEYE)” with sanction order: DST/TDT/DDP12/2017-G.
Conflict of interest
The authors declare that they have no competing interests.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Shariq, M., Singh, K. A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment. J Supercomput (2021). https://doi.org/10.1007/s11227-020-03550-1
- Vector space
- Linear mapping