MUMAP: Modified Ultralightweight Mutual Authentication protocol for RFID enabled IoT networks
Flawed authentication protocols led to the need for a secured protocol for radio frequency identification (RFID) techniques. In this paper, an authentication protocol named Modified ultralightweight mutual authentication protocol (MUMAP) has been proposed and cryptanalysed by Juel-Weis challenge. The proposed protocol aimed to reduce memory requirements in the authentication process for low-cost RFID tags with limited resources. Lightweight operations like XOR and Left Rotation, are used to circumvent the flaws made in the other protocols. The proposed protocol has three-phase of authentication. Security analysis of the proposed protocol proves its resistivity against attacks like desynchronization, disclosure, tracking, and replay attack. On the other hand, performance analysis indicates that it is an effective protocol to use in low-cost RFID tags. Juel-Weis challenge verifies the proposed protocol where it shows insusceptibility against modular operations.
U. Mujahid, M. Najam-ul Islam, and M. A. Shami, “Rcia: A new ultralightweight rfid authentication protocol using re- cursive hash,” International Journal of Distributed Sensor Networks, vol. 11, no. 1, p. 642180, 2015.
H.-Y. Chien, “Sasi: A new ultralightweight rfid authentica- tion protocol providing strong authentication and strong in- tegrity,” IEEE transactions on dependable and secure com- puting, vol. 4, no. 4, pp. 337–340, 2007.
M. Khalid, U. Mujahid, and M. Najamul Islam, “Crypt- analysis of ultralightweight mutual authentication protocol for radio frequency identification enabled internet of things networks,” International Journal of Distributed Sensor Networks, vol. 14, no. 8, p. 1550147718795120, 2018.
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Este ́vez- Tapiador, and A. Ribagorda, “Lmap: A real lightweight mu- tual authentication protocol for low-cost rfid tags,” in Proc. of 2nd Workshop on RFID Security, p. 06, 2006.
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez- Tapiador, and A. Ribagorda, “M 2 ap: a minimalist mutual- authentication protocol for low-cost rfid tags,” in International conference on ubiquitous intelligence and computing, pp. 912–923, Springer, 2006.
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez- Tapiador, and A. Ribagorda, “Emap: An efficient mutual- authentication protocol for low-cost rfid tags,” in OTM Con- federated International Conferences” On the Move to Mean- ingful Internet Systems”, pp. 352–361, Springer, 2006.
J. C. Hernandez-Castro, J. M. Tapiador, P. Peris-Lopez, and J.-J. Quisquater, “Cryptanalysis of the sasi ultralightweight rfid authentication protocol with modular rotations,” arXiv preprint arXiv:0811.4257, 2008.
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Tapiador, and A. Ribagorda, “Advances in ultralightweight cryptography for low-cost rfid tags: Gossamer protocol,” in International Workshop on Information Security Applications, pp. 56–68, Springer, 2008.
Y. Tian, G. Chen, and J. Li, “A new ultralightweight rfid au- thentication protocol with permutation,” IEEE Communica- tions Letters, vol. 16, no. 5, pp. 702–705, 2012.
G. Avoine and X. Carpent, “Yet another ultralightweight au- thentication protocol that is broken,” in International Work- shop on Radio Frequency Identification: Security and Pri- vacy Issues, pp. 20–30, Springer, 2012.
I.-S. Jeon and E.-J. Yoon, “A new ultra-lightweight rfid authentication protocol using merge and separation oper- ations,” International Journal of Mathematical Analysis, vol. 7, no. 52, pp. 2583–2593, 2013.
W. Shao-hui, H. Zhijie, L. Sujuan, and C. Dan-wei,“Security analysis of rapp an rfid authentication protocol based on permutation,” College of computer, Nanjing University of Posts and Telecommunications, Nanjing, vol. 210046, pp. 293– 308, 2012.
S. Wang, S. Liu, and D. Chen, “Security analysis and im- provement on two rfid authentication protocols,” Wireless Personal Communications, vol. 82, no. 1, pp. 21–33, 2015.
R. Bassil, W. El-Beaino, W. Itani, A. Kayssi, and A. Chehab, “Pumap: A puf-based ultra-lightweight mutual-authentication rfid protocol,” International Journal of RFID Security and Cryptography, vol. 1, no. 1/2, pp. 58–66, 2012.
H. Luo, G. Wen, J. Su, and Z. Huang, “Slap: Succinct and lightweight authentication protocol for low-cost rfid system,” Wireless Networks, vol. 24, no. 1, pp. 69–78, 2018.
A. Tewari and B. Gupta, “Cryptanalysis of a novel ultra- lightweight mutual authentication protocol for iot devices us- ing rfid tags,” The Journal of Supercomputing, vol. 73, no. 3, pp. 1085–1102, 2017.
K.-H. Wang, C.-M. Chen, W. Fang, and T.-Y. Wu, “On the security of a new ultra-lightweight authentication protocol in iot environment for rfid tags,” The Journal of Supercomput- ing, vol. 74, no. 1, pp. 65–70, 2018.
U. Mujahid, M. Najam-ul Islam, and S. Sarwar, “A new ultra- lightweight rfid authentication protocol for passive low cost tags: Kmap,” Wireless Personal Communications, vol. 94, no. 3, pp. 725–744, 2017.
A. A. Alamr, F. Kausar, J. Kim, and C. Seo, “A secure ecc-based rfid mutual authentication protocol for internet of things,” The Journal of Supercomputing, vol. 74, no. 9, pp. 4281–4294, 2018.
M. Naeem, S. A. Chaudhry, K. Mahmood, M. Karuppiah, and S. Kumari, “A scalable and secure rfid mutual authen- tication protocol using ecc for internet of things,” Interna- tional Journal of Communication Systems, p. e3906, 2019.
F.Zhu,P.Li,H.Xu,andR.Wang,“Alightweightrfidmutual authentication protocol with puf,” Sensors, vol. 19, no. 13, p. 2957, 2019.
A. Juels and S. A. Weis, “Defining strong privacy for rfid,” in Fifth Annual IEEE International Conference on Per- vasive Computing and Communications Workshops (Per- ComW’07), pp. 342–347, IEEE, 2007.
M. Ohkubo, K. Suzuki, S. Kinoshita, et al., “Cryptographic approach to “privacy-friendly” tags,” in RFID privacy work- shop, vol. 82, Cambridge, USA, 2003.
K. Ouafi and R. C.-W. Phan, “Privacy of recent rfid au- thentication protocols,” in International Conference on In- formation Security Practice and Experience, pp. 263–277, Springer, 2008.
K. Ouafi and R. C.-W. Phan, “Traceable privacy of recent provably-secure rfid protocols,” in International conference on applied cryptography and network security, pp. 479–489, Springer, 2008.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).