Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30114
Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni


The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks which limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1402


[1] R. Weinstein "RFID: A technical overview and its application to the enterprise," IEEE IT Prof., vol. 7, no. 3, pp.27 -33, 2005.
[2] Young-Jae Park and Young Beom Kim, “Accelerating RFID Tag Identification Process with Frame Size Constraint Relaxation,” Journal of Information and Communication Convergence Engineering, vol.10, no.3, pp. 242-247, 2012.
[3] Antonio, F.S.; Ramos Jose, L.H., Moreno, M.V. “A decentralized approach for Security and Privacy challenges in the Internet of Things,” In Proceedings of the IEEE World Forum on Internet of Things, Seoul, Korea, pp. 67–72, 2014.
[4] Kim, K., Jeon, J., and Yoo K. “Efficient and secure password authentication schemes for low-power devices,” International Journal of Security Network, vol.2, no.4, pp.77-81, 2006.
[5] Y. Lee, L. Batina, D. Singelee and I. Verbauwhede "Low-cost untraceable authentication protocols for RFID," Proc. of 3rd ACM Conf. Wireless Network Security (WiSec 2010), pp.55 -64, 2010.
[6] Miao, J.; Wang, L., “Rapid Identification Authentication Protocol for Mobile Nodes in Internet of Things with Privacy Protection,” J. Netw, vol.7, no.3, pp. 1099–1105, 2012.
[7] Liu and A. Bailey "A privacy and authentication protocol for passive RFID tags,” Computer Communication, vol. 32, no. 7, pp.1194 -1199, 2009.
[8] Y. Tian, G.L. Chen, and J.H. Li, “A new ultra lightweight RFID authentication protocol with permutation,” IEEE Communications Letters, vol. 16, no. 5, pp. 702–705, May 2012.
[9] Tagra, D., Rahman, M., and Sampalli, “Technique for preventing DoS attacks on RFID systems,” In 18th international conference on software telecommunications and computer networks (SoftCOM’10), IEEE Computer Society, 2010.
[10] T. Eisenbarth, S. Kumar and C. Paar "A survey of lightweightcryptography implementations," IEEE Des. Test Comput., vol. 24, no. 6, pp.522 -533, 2007.
[11] J. Lim, H. Oh and S. Kim, "A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection,” Proc. of 4th Int. Conf. Inf. Secur. Pract. Exper. (ISPEC), pp.278 -289, 2008.
[12] S. Kang, D. Lee and I. Lee "A study on secure RFID mutual authentication scheme in pervasive,” Computer Communication., vol. 31, no. 18, pp.4248-4254, 2008.
[13] Stallings W., “Cryptography and network security, principles and practices”, Practice Hall., 2006.
[14] Y. Liao and C. Hsiao “Advances in Intelligent Systems and Applications,” Springer-Verlag, pp.1 -13, 2013.
[15] Shen J, Choi D, Moh S, Chung I. “A novel anonymous RFID authentication protocol providing strong privacy and security. In Multimedia Information Networking and Security (MINES),” International Conference on., pp. 584-588., 2010.