A Study on Lightweight Mutual Authentication Protocol Based on Simple Operation

  • Yong-Woon Hwang
  • Im-Yeong LeeEmail author
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)


In recent years, RFID technology has been widely applied to various fields in everyday life, and many research on RFID application technology are continuously being carried out in domestically and internationally. However, RFID technology has various security threats, and various security technologies are needed to solve them. One of them is mutual authentication between RFID components. Until now, various mutual authentication scheme have been studied in RFID systems. Especially a lightweight mutual authentication protocol suitable for a low-cost tag environment has been proposed. In this paper, we propose a lightweight RFID mutual authentication protocol that compares and analyzes existing RFID mutual authentication scheme, satisfies various security requirements, and reduces computation.


RFID Mutual authentication scheme Security lightweight 



This research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2017-2015-0-00403) supervised by the IITP (Institute for Information & communications Technology Promotion).


  1. 1.
    Kang, B.J., Im, E.G.: RFID mutual authentication protocol for an RFID system. J. Secur. Eng. 5(5), 371–380 (2008)Google Scholar
  2. 2.
    Bae, W.S.: Design of an authentication protocol for privacy protection in RFID systems. J. Digit. Policy Manag. 10(3), 155–160 (2012)Google Scholar
  3. 3.
    Oh, S., Lee, C., Yun, T., Chung, K., Ahn, K.: Improved authentication protocol for privacy protection in RFID systems. J. KICS 38(1), 12–18 (2013)CrossRefGoogle Scholar
  4. 4.
    Kim, J.Y., Won, D.H.: Security analysis and improvements of authentication protocol for privacy protection in RFID systems. J. KICS 41(5), 581–591 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer Science EngineeringSoonchunhyang UniversityAsanSouth Korea
  2. 2.Department of Computer Software EngineeringSoonchunhyang UniversityAsanSouth Korea

Personalised recommendations