Self-adaptive RFID Authentication for Internet of Things

  • Bacem Mbarek
  • Mouzhi GeEmail author
  • Tomas Pitner
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 926)


With the development of wireless Internet of Things (IoT) devices, Radio frequency identification (RFID) has been used as a promising technology for the proliferation and communication in IoT networks. However, the RFID techniques are usually plagued with security and privacy issues due to the inherent weaknesses of underlying wireless radio communications. Although several RFID authentication mechanisms have been proposed to address the security concerns in RFID, most of them are still vulnerable to some active attacks, especially the jamming attack. This paper therefore proposes a novel self-adaptive authentication mechanism with a robust key updating, in order to tackle the security vulnerabilities of key updating algorithms and their inability to jamming attacks. Furthermore, we assess the performance and applicability of our solution with a thorough simulation by taking into account the energy consumption and authentication failure rate.


Internet of Things RFID Authentication Jamming attack Security 


  1. 1.
    Ge, M., Bangui, H., Buhnova, B.: Big data for internet of things: a survey. Future Gener. Comput. Syst. 87, 601–614 (2018)CrossRefGoogle Scholar
  2. 2.
    Mbarek, B., Meddeb, A., Ben Jaballah, W., Mosbah, M.: A secure electric energy management in smart home. Int. J. Commun. Syst. 30(17) (2017)Google Scholar
  3. 3.
    Memos, V.A., Psannis, K.E., Ishibashi, Y., Kim, B.-G., Gupta, B.B.: An efficient algorithm for media-based surveillance system (EAMSUS) in IoT smart city framework. Future Gener. Comput. Syst. 83, 619–628 (2018)CrossRefGoogle Scholar
  4. 4.
    Luo, H., Wen, G., Su, J., Huang, Z.: SLAP: succinct and lightweight authentication protocol for low-cost RFID system. Wirel. Netw. 24(1), 69–78 (2018)CrossRefGoogle Scholar
  5. 5.
    Adame, T., Bel, A., Carreras, A., Melià-Seguí, J., Oliver, M., Pous, R.: CUIDATS: an RFID-WSN hybrid monitoring system for smart health care environments. Future Gener. Comput. Syst. 78, 602–615 (2018)CrossRefGoogle Scholar
  6. 6.
    Bangui, H., Ge, M., Buhnova, B.: Exploring big data clustering algorithms for internet of things applications. In: Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security, IoTBDS 2018, Madeira, Portugal, pp. 269–276 (2018)Google Scholar
  7. 7.
    Stepanek, P., Ge, M.: Validation and extension of the smart city ontology. In: Proceedings of the 20th International Conference on Enterprise Information Systems, ICEIS 2018, Madeira, Portugal, pp. 406–413 (2018)Google Scholar
  8. 8.
    Naija, Y., Beroulle, V., Machhout, M.: Security enhancements of a mutual authentication protocol used in a HF full-fledged RFID tag. J. Electron. Test. 34(3), 291–304 (2018)CrossRefGoogle Scholar
  9. 9.
    Dimitriou, T.: A secure and efficient RFID protocol that could make big brother (partially) obsolete. In: Pervasive Computing and Communications (2006)Google Scholar
  10. 10.
    Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219 (2004)Google Scholar
  11. 11.
    Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Security in Pervasive Computing, pp. 201–212 (2004)Google Scholar
  12. 12.
    Lu, L., Han, J., Hu, L., Liu, Y., Ni, L.M.: Dynamic key-updating: privacy-preserving authentication for RFID systems. In: Pervasive Computing and Communications, pp. 13–22 (2007)Google Scholar
  13. 13.
    Ohkubo, M., Suzuki, K., Kinoshita, S., et al.: Cryptographic approach to “privacy-friendly” tags. In: RFID Privacy Workshop, vol. 82 (2003)Google Scholar
  14. 14.
    Tewari, A., Gupta, B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for iot devices using RFID tags. J. Supercomput. 73(3), 1085–1102 (2017)CrossRefGoogle Scholar
  15. 15.
    Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: International Workshop on Selected Areas in Cryptography, pp. 276–290 (2005)Google Scholar
  16. 16.
    Baashirah, R., Abuzneid, A.: Survey on prominent RFID authentication protocols for passive tags. Sensors 18(10) (2018)Google Scholar
  17. 17.
    Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y.: Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106, 117–123 (2018)CrossRefGoogle Scholar
  18. 18.
    Liu, B., Su, X.: An anti-collision algorithm for rfid based on an array and encoding scheme. Information 9(3), 63 (2018)CrossRefGoogle Scholar
  19. 19.
    Downard, I.T.: Simulating sensor networks in ns-2. Technical reportGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Faculty of InformaticsMasaryk UniversityBrnoCzech Republic

Personalised recommendations