AUTHENTICATION PROTOCOL FOR INTERNET OF THINGS DEVICES USING RFID TAGS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2026.32.1205

Keywords:

IoT, RFID tag, authentication protocol, one-time parameters, data integrity, hash function, cryptography.

Abstract

The rapid growth of the Internet of Things and the widespread adoption of RFID tags have intensified the need for authentication protocols that also ensure data integrity. Most existing RFID authentication protocols provide mutual authentication and resistance to common network attacks, but they generally do not address the integrity of the data stored on and transmitted by the RFID tag. In many practical scenarios, tag authentication must be complemented by verification of the integrity of the transmitted data, which creates the need for a specialized protocol capable of solving both tasks simultaneously under severe hardware constraints. This paper proposes a mutual authentication protocol for communication between an RFID tag and a system server. On the tag side, the protocol requires only a cryptographic hash function with hardware complexity not exceeding 2000 GE, a simple pseudo-random number update function, and a concatenation operation. Mutual authentication is achieved using one-time parameters that are updated independently after each session, with their initial values distributed between the RFID tag and the system during the initialization phase. A single authentication session on the RFID tag side requires only three hash computations and one execution of the pseudo-random number update function, while the number of message exchanges between the RFID tag and the system is reduced to two. The paper shows that the proposed protocol is resistant to reader impersonation, tag impersonation, replay, active man-in-the-middle, and desynchronization attacks, while also providing forward secrecy and RFID tag data integrity control. The obtained results indicate that the proposed protocol is suitable for systems in which RFID tag data are not confidential but require integrity assurance, particularly in logistics, supply chain management, and related IoT applications.

Downloads

Download data is not yet available.

References

Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805. https://doi.org/10.1016/j.comnet.2010.05.010

Want, R. (2006). An introduction to RFID technology. IEEE Pervasive Computing, 5(1), 25–33. https://doi.org/10.1109/MPRV.2006.2

Scott, D. (2024). A survey of RFID authentication protocols. TechRxiv. https://doi.org/10.36227/techrxiv.171216642.23764824/v1

Zhu, F., Li, P., Xu, H., & Wang, R. (2019). A lightweight RFID mutual authentication protocol with PUF. Sensors, 19(13), 2957. https://doi.org/10.3390/s19132957

Baashirah, R., & Abuzneid, A. (2018). Survey on prominent RFID authentication protocols for passive tags. Sensors, 18(10), 3584. https://doi.org/10.3390/s18103584

EPCglobal. (2015). EPC radio-frequency identity protocols Class-1 Generation-2 UHF RFID specification (Version 2.0.1). GS1. https://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf

Caballero-Gil, P., Caballero-Gil, C., & Molina-Gil, J. (2022). RFID authentication protocol based on a novel EPC Gen2 PRNG. arXiv. https://doi.org/10.48550/arXiv.2208.05345

Abd Alhasan, A. Q., Rohani, M. F., & Abuali, M. S. (2024). Ultra-lightweight mutual authentication protocol to prevent replay attacks for low-cost RFID tags. IEEE Access, 12. https://doi.org/10.1109/ACCESS.2024.3386100

Mudra, G., Cui, H., & Johnstone, M. N. (2023). Survey: An overview of lightweight RFID authentication protocols suitable for the maritime Internet of Things. Electronics, 12(13), 2990. https://doi.org/10.3390/electronics12132990

Shariq, M., Singh, K., Maurya, P. K., Ahmadian, A., & Ariffin, M. R. K. (2021). URASP: An ultralightweight RFID authentication scheme using permutation operation. Peer-to-Peer Networking and Applications, 14, 3737–3757. https://doi.org/10.1007/s12083-021-01192-5

Shariq, M., Singh, K., Lal, C., Conti, M., & Khan, T. (2022). ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags. Computer Networks, 217, 109360. https://doi.org/10.1016/j.comnet.2022.109360

Chien, H.-Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340. https://doi.org/10.1109/TDSC.2007.70226

Hernandez-Castro, J. C., Tapiador, J. M. E., Peris-Lopez, P., & Quisquater, J.-J. (2008). Cryptanalysis of the SASI ultralightweight RFID authentication protocol with modular rotations. arXiv. https://doi.org/10.48550/arXiv.0811.4257

Phan, R. C. W. (2009). Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Transactions on Dependable and Secure Computing, 6(4), 316–320. https://doi.org/10.1109/TDSC.2008.33

Sun, H.-M., Ting, W.-C., & Wang, K.-H. (2011). On the security of Chien’s ultralightweight RFID authentication protocol. IEEE Transactions on Dependable and Secure Computing, 8(2), 315–317. https://doi.org/10.1109/TDSC.2009.26

Lim, T.-L., Li, T., & Gu, T. (2008). Secure RFID identification and authentication with triggered hash chain variants. In 2008 IEEE International Conference on Parallel and Distributed Systems (ICPADS) (pp. 583–590). https://doi.org/10.1109/ICPADS.2008.46

Dass, P., & Om, H. (2016). A secure authentication scheme for RFID systems. Procedia Computer Science, 78, 100–106. https://doi.org/10.1016/j.procs.2016.02.017

Kumar, V., Kumar, R., Khan, A. A., Kumar, V., Chen, Y.-C., & Chang, C.-C. (2022). RAFI: Robust authentication framework for IoT-based RFID infrastructure. Sensors, 22(9), Article 3110. https://doi.org/10.3390/s22093110

Seleznov, V., & Luzhetskyi, V. (2023). Method of low-resource hashing type “data–generator”. Cybersecurity: Education, Science, Technique, 28, 84–95. https://doi.org/10.28925/2663-4023.2023.22.8495

Luzhetskyi, V., & Seleznov, V. (2025). Hardware implementation of the HDG hash function. Bulletin of Cherkasy State Technological University, 30(2), 10–21. https://doi.org/10.62660/bcstu/2.2025.22

Downloads


Abstract views: 54

Published

2026-03-26

How to Cite

Luzhetskyi, V., Seleznov, V., & Khokhlachova, Y. (2026). AUTHENTICATION PROTOCOL FOR INTERNET OF THINGS DEVICES USING RFID TAGS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(32), 987–1001. https://doi.org/10.28925/2663-4023.2026.32.1205