Skip to main content

RETRACTED ARTICLE: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data

This article was retracted on 10 May 2024

This article has been updated

Abstract

The development of big data has epromoted the development of Internet technology, but it has brought more network security and privacy problems. Therefore, how to solve network security problems is the main research direction of current network technology development. In order to deal with the harm of network attacks to personal privacy security, this paper studies and proposes an RFID mutual authentication protocol against exhaustive attacks based on improved Hash function, and proposes a security proof based on BAN logic rules. At the same time, to enhance the computing resources of the improved protocol, this paper proposes an improved authentication query protocol for multi-source RFID tags. In the performance analysis, when the distance between the reader and the tag reaches 10 m, the improved protocol can still be higher than 90%. The application test shows that the improved protocol proposed in the study is capable of resisting exhaustive attacks, its execution time is short, and it is less affected by the number of tags. The above results show that in the context of big data, the improved RFID mutual authentication protocol proposed by the research against network exhaustive attacks has a more significant defense effect, can effectively protect user privacy, and has a greater reference value in network security research.

1 Introduction

Radio Frequency Identification (RFID) is a technology that can read specific object data. With the continuous development of high-tech, RFID has ushered in a broader world of RFID technology. As a new type of automatic identification technology with high identification and high accuracy, RFID can realize non-contact communication with the help of RF signals, and automatically manage the identified object information [1, 2]. A complete RFID usually includes three main modules: tag, reader, and database. The wireless data exchange between objects and machines can be realized through the three modules, and the data exchange in this process has high security [3]. From the current application status of RFID, this technology has a wide range of applications. At present, it is gradually widely used in education, industry, and service industries. With the strong promotion of government agencies, its application in medical care, security, and anti-counterfeiting has gradually deepened, significantly improving the national social and economic benefits [4]. As people pay more attention to data information security, using communication protocols to ensure data information security between wireless exchanges has become the main way to solve information security [5]. However, with the continuous improvement of social needs, the security problems exposed by RFID technology have become increasingly obvious. The main reason is that the growing evolution of network attacks and a large number of violent attacks make it increasingly difficult for RFID authentication protocols to identify legal and illegal communicators. Therefore, how to make RFID authentication protocols able to deal with exhaustive attacks is crucial. Therefore, this research proposes an innovative mutual RFID authentication protocol that specifically addresses the main security vulnerability in current RFID technology-exhaustive attacks. The new protocol is improved using Hash functions and Burrows-Abadi-Needham (BAN) logic rules to ensure the reliability and security of RFID technology in a wider and more complex application environment. The use of the new protocol is not only applicable to existing RFID systems but also provides a new direction for the future development and application of RFID technology and promotes the development of the whole field.

2 Related works

In the research of RFID technology, a number of scholars have conducted in-depth discussions. Khan and others proposed to use RFID technology to realize the intellectualization of the medical Internet of Things, combine RFID technology with steganography, and ensure the safety of users’ personal data information while conducting health analysis [6]. Raad has developed a VTS combining RFID technology and a mobile data network. With this system, parents and teachers could understand the real-time situation of children on bus routes, and empirical tests showed that school bus activities can be obtained in real time between various monitoring points [7]. Bergquist et al. used active RFID technology to record the iron ore ball distribution chain, and the experiment showed that the particles and dust and other data obtained in the field measurement can effectively improve the understanding of stress, thereby improving product quality and reducing the impact of dust on the environment [8]. Jung and others put forward a promotion method combining RFID technology and 6W1H context awareness in view of the existing imperfect modern promotion structure, so as to realize the rapid collection and safe storage of user data [9]. Podguturi et al. proposed a P2P network technology to enhance RFID technology, which can avoid language barriers between different language information. However, the improvement scheme proposed in this study has the defect of poor scalability and is prone to common single point of failure in the calculation [10].

The security research of RFID technology is a key topic in the world at present, and there are countless researchers involved in it. To solve the harm of insecure communication channels to the healthcare system, Fang proposed a secure mutual authentication protocol and verified the compatibility and security of the proposed protocol through experiments [11]. Xie et al. proposed a security-enhanced protocol in the medical and health field, which can detect sensitive data to prevent it from leaking from the back end, and finally verified the practicability of the RFID authentication protocol in comparative experiments [12]. Agrahari et al. evaluated the security and privacy of patient detection and medical information and proposed an authentication protocol based on an elliptic curve. Through experimental analysis, the protocol had higher security and privacy [13]. Najib et al. designed an intelligent door lock based on RFID technology to improve family security and carried out identity recognition through a real-time database. Finally, the experiment showed that the proposed method has a large data throughput and a high safety factor [14]. Fan et al. proposed a cloud-based mutual authentication protocol to ensure user information security in the Internet of Vehicles system. In addition, the authentication protocol proposed by the research could protect privacy while avoiding malicious tracking of users, which proved the logical security and reliability of the proposed method [15].

To sum up, with the development of the intelligent era, the application of RFID technology is showing a trend of gradual expansion. Therefore, a large number of studies have expanded the application field of RFID according to the current social development situation and put forward corresponding improvement strategies for its security. However, from the current security attacks, brute force attacks, that is, exhaustive attacks, are frequent, and their harm is greater. However, the research on RFID authentication protocol for exhaustive attacks is not deep enough. For this reason, to achieve the anti-exhaustive attack in the context of big data, an RFID Mutual Authentication Protocol (RFIDMAP) based on an improved Hash function is proposed, and a passive RFID-oriented authentication query protocol is proposed at the same time, to reduce or avoid the harm caused by exhaustive attacks.

3 Security performance analysis of RFID mutual authentication protocol against exhaustive attacks

3.1 Application analysis of improved Hash functions in RFID secure authentication protocols

As for improved RFIDMAP in the context of big data, in addition to privacy protection, the core of its RFID research includes secure authentication. As an important method to ensure system security, security authentication has attracted more and more researchers [16]. In the wireless channel, after mutual authentication, the communication between the two parties can prevent other entities from violating personal privacy. Therefore, optimizing the RFID authentication protocol is an important means to improve privacy security [17]. With the continuous miniaturization of RFID tags, their computing power and data storage capacity are decreasing. However, the current encryption algorithm cannot be applied to low-cost RFID tags. Finding a suitable algorithm and applying it to RFID authentication protocols is the focus of current research [18].

As an open function, Hash function can convert any length of input information into fixed-length data. It has easy-to-calculate, anti-collision, and other characteristics, and is applicable to variable information. Therefore, the Hash function can perform information authentication to ensure information security [19]. In the application of the traditional Hash function in RFID authentication protocol, the user ID will remain unchanged, which enables attackers to create false tags. Therefore, it is difficult for traditional Hash function to improve RFIDMAP to cope with increasing exhaustive attacks [20, 21]. To reduce the harmfulness of exhaustive attacks, the typical Hash function is improved. The improvement method is shown in Fig. 1.

Fig. 1
figure 1

A mutual authentication protocol with an improved Hash function

Figure 1 shows that the mutual authentication protocol with improved Hash function includes three phases, namely initialization, query, authentication, and data update. In the initialization phase, the reader is used to set the communication delay, and a pseudo-random number generation device is added to the reader, which can realize Hash calculation and complete data forwarding [22, 23]. In the initialization phase, the reader is connected to the back-end database and can obtain all legal label information in real time. In the query and authentication stage, the random value generated by the pseudo-random generation device is used to broadcast in the magnetic field, receive the RF signal and respond, and set the pseudo-random label value for all tags to avoid the leakage of the real ID. In the process of query and authentication, the reader is required to authenticate the legal identity of the communication counterpart. Within the magnetic field range of the reader, it is necessary to judge whether the communication is within the time delay, and then determine whether to authenticate. For the tag after successful authentication, an additional authentication is added as a record to facilitate subsequent communication. In the data update phase, the second synchronization strategy is used to dynamically update the tag's authentication value. The second synchronization strategy is to broadcast in the magnetic field again using the random number of the pseudo-random generator, receive RF signals, and respond. During the communication with the reader, the new and old pseudo-label values are matched to match the tag with the back-end database [24, 25].

3.2 Security proof based on BAN logic rules

In the research, an RFIDMAP based on an improved Hash function is proposed. To guarantee the security of the mutual authentication protocol, BAN is a logical approach for analyzing and verifying the security of network protocols. Its core is a set of logical rules for representing and reasoning about trust and trust transfer. These rules help analysts understand how parties establish trust in message content at different stages of a protocol. The key to BAN logic is that it provides a formal approach to analyzing authentication protocols, especially when dealing with complex network environments and multi-step protocols. It can help designers and analysts identify potential weaknesses and vulnerabilities in protocol design. However, BAN logic has its limitations. It may not be able to handle certain types of attacks, such as man-in-the-middle attacks, or it may be limited in the face of the complexity of the actual protocol. Nevertheless, BAN logic remains a valuable tool in understanding and analyzing network security protocols. Therefore this research introduces BAN logic rules to prove the security of protocols. The steps are shown in Fig. 2.

Fig. 2
figure 2

BAN logic rules

Figure 2 shows that in BAN logical reasoning, starting from the protocol description, protocol initialization and assumptions are proposed, protocol targets are set, and session messages are logically reasoned. Secondly, it analyzes whether the protocol achieves the protocol goal. If it does, the protocol is considered safe. If it cannot, the current authentication protocol is considered unsafe. The BAN logic inference rule is first the message meaning rule, as shown in Formula (1).

$${f}_1=\frac{P\left|\equiv \right.P\overset{K}{\to }Q,P\vartriangleleft {\left\{X\right\}}_K}{P\left|\equiv \right.Q\left|\sim X\right.}$$
(1)

In Formula (1), P and Q represent the main body; K represents the key; X represents the formula; {X}K represents the formula X obtained after key K encryption; \(P\overset{K}{\to }Q\) indicates that the shared key of the two entities is K; P|≡Q means that subject P fully trusts subject Q. For the public key, the rules are shown in Formula (2).

$${f}_2=\frac{P\left|\equiv \right.P\overset{K}{\to }Q,P\vartriangleleft {\left\{X\right\}}_{K-1}}{P\left|\equiv \right.Q\left|\sim X\right.}$$
(2)

For shared secret, the inference rule is shown in Formula (3).

$${f}_3=\frac{P\left|\equiv \right.P\overset{Y}{\iff }Q,P\vartriangleleft {\left\{X\right\}}_Y}{P\left|\equiv \right.Q\left|\sim X\right.}$$
(3)

In Formula (3), Y represents a message; \(P\overset{Y}{\iff }Q\) means that only the subject P and Q know the secret Y, and they can use Y to mutually verify their identities; {X}Y represents formula X generated secretly. After the message meaning rule, there are also random number verification rules, as shown in Formula (4).

$${f}_4=\frac{P\left|\equiv \right.\#(X),P\left|\equiv \right.Q\left|\sim X\right.}{P\left|\equiv \right.Q\left|\equiv X\right.}$$
(4)

In Formula (4), #(X) represents a new formula generated in the communication process, and Formula (4) represents a new formula for the complete information of the subject P, which is considered to be related to Q, and then infers that P trusts Q. In addition, BAN logic inference rules also include arbitration rules, as shown in Formula (5).

$${f}_5=\frac{P\left|\equiv \right.Q\Rightarrow X,P\left|\equiv \right.Q\left|\equiv X\right.}{P\left|\equiv \right.X}$$
(5)

In Formula (5), QX means that the subject Q can decide X, that is, Q has the right to arbitrate, and both the subject P and Q trust X. In addition, Formula (6) shows the belief rules.

$${f}_6=\frac{P\left|\equiv \right.Q\left|\sim \left(X,Y\right)\right.}{P\left|\equiv \right.Q\left|\sim X\right.}$$
(6)

In Formula (6), (X, Y) means that the message is composed of Formula X and secret Y. In the belief rules, it is believed that subject P trusts that the message sent by subject Q contains X and Y. Formula (7) indicates the freshness rules.

$${f}_7=\frac{P\left|\equiv \right.\#(X)}{P\left|\equiv \right.\#\left(X,Y\right)}$$
(7)

In Formula (7), #(X, Y) represents the newly generated message containing Formula X and secret Y. The reasoning rule of the freshness rule is that the subject P believes that a new X is generated, which means that a new combined message containing Formula X and secret Y is generated. Finally, the rules for receiving messages are shown in Formula (8).

$${f}_8=\left\{\begin{array}{c}\begin{array}{l}\frac{P\vartriangleleft \left(X,Y\right)}{P\vartriangleleft X}\\ {}\end{array}\\ {}\frac{P\vartriangleleft {\left\{X\right\}}_Y}{P\vartriangleleft X}\end{array}\right.$$
(8)

Formula (8) indicates that the subject P receives the formula. If the subject P knows the relevant key, the message acceptance rule is expressed as Formula (9).

$${f}_9=\frac{P\left|\equiv P\overset{K}{\leftrightarrow }Q\right.,P\vartriangleleft {\left\{X\right\}}_K}{P\vartriangleleft X}$$
(9)

Formula (9) indicates that there is a key between the subject P and Q, and the message encrypted by the key is received. With the help of BAN logic rule reasoning, the authentication of readers and tags is realized, and the security of the protocol is proved so as to realize the security evaluation of mutual authentication protocol.

3.3 Passive RFID tag authentication query analysis

Aiming at the mutual authentication protocol for passive RFID tags, the security of tags cannot be guaranteed by using an improved Hash function. Therefore, a passive RFID tag authentication query protocol is further proposed in the research. This protocol can achieve the authentication of readers and tags on the basis of reducing the cost of tags, and at the same time, it can use the improved Hash function to lower the exhaustion attack. The mutual authentication protocol for passive RFID tags includes three steps, namely initialization, protocol authentication, and protocol security vulnerability analysis, as shown in Fig. 3.

Fig. 3
figure 3

Passive RFID tag authentication query process

Figure 3 shows that in the initialization process, for the insecurity of the wireless channel, a third-party trusted entity is used to determine the ID and the shared key of the reader and label. In ID confirmation, Formula (10) is used to calculate the tag pseudo-identity.

$$TPID=h(ID)\left\Vert {E}_{key}(ID)\right.$$
(10)

In Formula (10), h() represents Hash operation, and its length is n; Ekey(ID) means ID encryption with key; indicates the two data before and after the connection. The lock password is calculated, as shown in Formula (11).

$$TPSW=h\left({E}_{key}(ID)\right)$$
(11)

The lock password calculation in Formula (11) is to Hash the encrypted ID and encrypt the user data using Formula (8) and Formula (9), as shown in Formula (12).

$${key}^{\hbox{'}}= key\oplus TPSW$$
(12)

In Formula (12), represents the bitwise XOR of the front and rear data, that is, the bitwise XOR of the key and the lock password, and the tag data is obtained as shown in Formula (13).

$$Date=E{\hbox{'}}_{key}\left(h(UserDate)\left\Vert UserDate\right.\right)$$
(13)

In Formula (13), UserDate represents user data. The created tag is stored in the reader to complete protocol initialization. The second is the query phase of protocol authentication. In protocol authentication, Formula (14) is used to calculate user data.

$$UserDate= Get\left(n+1:\infty, D{\hbox{'}}_{key}(Date)\right)$$
(14)

In Formula (14), Get(n + 1 : ∞, D'key(Date)) represents the decrypted data of the user data after intercepting n + 1 bits, and then the Hash value of the user data is calculated, as shown in Formula (15).

$${UserDate}_H= Get\left(1:n,D{\hbox{'}}_{key}(Date)\right)$$
(15)

In Formula (15), Get(1 : n, D'key(Date)) represents the first to nth bits of the decrypted user data intercepted. If the Hash value and the intercepted Hash value show significant consistency, the data is considered reliable. Otherwise, the data is considered unreliable. Finally, the security vulnerabilities of the protocol are analyzed, and BAN logic rules are used to prove the security of the protocol. In the security certification, for each round of authentication query, the reader will analyze the legitimacy of the other's tag through the ID, and obtain user data from the database, and the other's tag can also determine the identity of the reader. Finally, the application of the proposed improved RFID mutual authentication protocol is drawn as shown in Fig. 4.

Fig. 4
figure 4

Improve the application process of the RFID mutual authentication protocol

4 Improvement of RFID mutual authentication protocol results analysis

4.1 Performance analysis of the improved protocol

This research proposed an RFIDMAP based on improved Hash functions and also proposed a passive RFID authentication query protocol to face exhaustive attacks in the context of big data. To understand the performance of research protocols in exhaustive attacks, the user database was built based on the network’s big data, and the RFID system was built in the Linux system. First, the tag search speed simulation of the improved protocol was carried out in MATLAB2018b, as shown in Fig. 5.

Fig. 5
figure 5

Label search speed simulation

From Fig. 5, the number of cycles of both protocols decreased with the increase of threshold. In addition, it can be found that with the increase of the word length, the number of cycles of the non-improved RFIDMAP under the same threshold had a significant difference, and the larger the word length, the higher the number of cycles of the non-improved RFID authentication protocol. However, the number of cycles of RFIDMAP based on improved Hash function was not significantly different under different word lengths, and they were all below 4. Compared with the non-improved RFIDMAP, the improved RFIDMAP under the same word length had fewer cycles to different thresholds, indicating that the improved RFIDMAP had a faster tag search speed than the non-improved RFIDMAP under the same word length. Secondly, it analyzed the difference in the change of the error acceptance rate between the RFIDMAP based on the improved Hash function and the non-improved authentication protocol, as shown in Fig. 6.

Fig. 6
figure 6

Error acceptance rate change difference

From Fig. 6, the error acceptance rate of the two authentication protocols was expressed by logarithmic operation results, and the error acceptance rate of the two RFID protocols decreased gradually with the increase in the number of rounds. Comparing the changing trend of the error acceptance rate of the two authentication protocols, the error acceptance rate of the unimproved RFIDMAP decreased slowly. After 80 rounds, the logarithm of the error acceptance rate decreased to less than − 4, that is, the error rate decreased to less than 10-4. Finally, after 100 rounds, the error acceptance rate decreased to 10-5. However, the error acceptance rate of the improved RFIDMAP decreased rapidly. After 50 rounds, the error acceptance rate decreased to less than 10-4. From the change in the error acceptance rate of the improved RFIDMAP, the number of rounds required to reduce the error acceptance rate to less than 10-5 was 60, and when the number of rounds reached 100, the error acceptance rate of the authentication protocol decreased to less than 10-14. The above results showed that the error acceptance rate of RFID authentication protocol based on improved Hash function is low, so its security is also high. Then it analyzed the tag recognition success rate at different distances of the improved RFIDMAP, as shown in Fig. 7.

Fig. 7
figure 7

Label recognition success rate

From Fig. 7, the success rate of each protocol decreased with the increasing distance. Among them, the recognition rate of the unimproved RFID authentication protocol decreased faster. When the distance between the tag and the reader reached 5 m, the recognition success rate of the protocol tag decreased to less than 98%. When the distance between the two was greater than 5 m, the recognition success rate of the protocol tag showed a rapid downward trend, and when the distance reached 8 m, the success rate decreased to less than 90%. The RFIDMAP based on the improved Hash function proposed in the study decreased the tag recognition success rate gradually when the distance between the tag and the reader increased, and when the distance reached 10 m, the recognition success rate decreased to less than 90%. The proposed passive RFID authentication query protocol was further improved on the basis of the improved Hash function RFIDMAP. Therefore, from the change in its tag recognition rate compared with the improved Hash function RFIDMAP, the recognition accuracy of the protocol decreased to less than 90% after the distance between the tag and the reader increased to 11 m. The above results showed that the success rate of RFIDMAP with improved Hash function in tag recognition has been significantly improved, and the authentication query protocol for RFID with no chance has further improved the success rate of tag recognition on the basis of RFIDMAP with improved Hash function. Finally, based on the large database, it evaluated the difference in false label recognition success rate between the unimproved authentication protocol and the improved protocol proposed in the research, as shown in Fig. 8.

Fig. 8
figure 8

Recognition success rate of false labels

From Fig. 8, in the process of comparing the authentication success rate of multiple protocols, the number of false tags identified by the proposed improved Hash function RFIDMAP and passive RFID mutual authentication query protocol was significantly different from the identification success rate of the unmodified RFID authentication protocol. The number of false tags identified in the database of the improved RFIDMAP proposed by the research showed a high consistency with the total number of false tags, which meant that the improved RFIDMAP can effectively identify false tags and has a high authentication success rate.

4.2 Comparison of application testing of improved protocols

The research proposed an RFIDMAP based on the improved Hash function. To understand the security of the protocol, the improved protocol was compared with the existing related protocols. The comparison results are shown in Table 1. In Table 1, the Hash chain protocol, Hash-based ID change protocol, LCAP protocol, Hu protocol, Cho protocol, and Zheng protocol were introduced. The response effect of the above protocols to exhaustive attacks was compared with that of RFIDMAP based on improved Hash function and passive RFID mutual authentication query protocol.

Table 1 Differences in attack mitigation effects of protocols

From Table 1, the protection effects of various protocols in response to different exhaustive attacks were significantly different. In addition, the Hash chain protocol could resist data privacy attacks and tracking attacks in attack protection, but could not resist eavesdropping, counterfeiting, replay, and desynchronization attacks. Hash-based ID change protocol and LCAP protocol could resist most external attacks in attack protection, but neither could resist desynchronization attacks. In addition, the Hu protocol, Cho protocol, and Zheng protocol could only resist most external attacks in attack defense. The RFIDMAP based on improved Hash function and passive RFID mutual authentication query protocol proposed by the research could completely resist all types of attacks. The above results showed that the RFIDMAP with improved Hash function and the passive RFID mutual authentication query protocol proposed by the research showed a higher defense effect in the protection against exhaustive attacks, and provided more comprehensive protection against different attacks.

To better understand the application effect of the improved authentication protocol proposed in the research, the research compared the better RFID authentication protocols in the current market as the comparison object and analyzed the time cost between different protocols as shown in Fig. 9.

Fig. 9
figure 9

Protocol time cost difference

From Fig. 9, the time cost of the improved RFIDMAP proposed in the study was lower than that of the others. With the increasing number of tests, the time cost of each protocol showed a continuous fluctuation. However, the improved RFIDMAP proposed by the research had a small fluctuation range, and its time cost was always kept within 7 ms. The main reason was that the improved RFID mutual authentication protocol proposed by the research could realize passive tag authentication query, so compared with other authentication protocols, the overhead time of the improved RFID mutual authentication protocol in passive search was significantly reduced. Finally, the implementation time changes and differences of each protocol were evaluated, as shown in Fig. 10.

Fig. 10
figure 10

Agreement execution time difference

From Fig. 10, the execution time of the protocol showed a growing trend. From the comparison of multiple protocols, the execution time of the improved RFIDMAP was growing slowly. When the number of tags reached 100, the execution time was only 221.36 ms, while the execution time of the other two protocols was more than 400 ms when the number of tags reached 100. The above results showed that in application, the proposed RFID mutual authentication protocol takes less time to execute, and is more efficient than the authentication protocols widely used in the market. Combined with the analysis of protocol security obtained from research and tests, the improved RFID mutual authentication protocol met the basic requirements of practical applications, and its security could be guaranteed.

5 Conclusion

The continuous expansion of network data scale brings challenging network data security protection problems. In the existing network attacks, exhaustive attacks are increasingly fierce, so how to propose an authentication protocol against exhaustive attacks in the context of big data is crucial. In the research, an RFID mutual authentication protocol based on an improved Hash function was proposed, and a passive RFID-oriented authentication query protocol was also proposed. The performance analysis of the protocol showed that the number of cycles of the proposed improved RFIDMAP in tag search was less than − 4, indicating that the improved protocol has a faster search speed. From the analysis of the tag recognition success rate of the protocol, the success rate of the improved RFIDMAP proposed in the study was significantly lower than that of the improved protocol due to the influence of distance, and its false tag recognition success rate was higher. In the application test, it is shown that the improved protocol could produce a more significant mitigation effect against different exhaustive attacks, and the time cost of the improved protocol in attack mitigation was within 7 ms, while the execution time of the improved protocol showed a slow increase trend with the increase of the number of tags, which is significantly lower than other protocols. The above results showed that the research on RFIDMAP based on improved Hash function can resist exhaustive attacks in the context of big data, with high security, high practicality, and great significance for network security protection. This research has improved the performance of the protocol, but there are still some shortcomings, such as this research has only analyzed and improved the security of the protocol, but the protocol also has the problem of labeling the communication channel, so the subsequent research will also analyze the problem of labeling of the communication channel. At the same time, the Hash function used in this research was only tested and analyzed for software, so the hardware will also be analyzed and tested in the follow-up, and finally, the data set used in the research is small, so a larger data set will also be analyzed in the follow-up.

Availability of data and materials

The data for this study are available from the corresponding author.

Change history

References

  1. S. Zhang, X. Liu, Y. Liu, B. Ding, S. Guo, J. Wang, Accurate respiration monitoring for mobile users with commercial RFID devices. IEEE J. Sel. Areas Commun. 39(2), 513–525 (2020)

    Article  Google Scholar 

  2. D. Dobrykh, I. Yusupov, S. Krasikov, A. Mikhailovskaya, D. Shakirova, A. Bogdanov, A. Slobozhanyuk, D. Filonov, P. Ginzburg, Long-range miniaturized ceramic RFID tags. IEEE Trans. Antennas Propag. 69(6), 3125–3131 (2020)

    Article  Google Scholar 

  3. J. Zhang, Z. Yu, X. Wang, Y. Lyu, S. Mao, S.G.G. Periaswamy, J. Patton, X. Wang, RFHUI: An RFID based human-unmanned aerial vehicle interaction system in an indoor environment. Digit. Commun. Netw. 6(1), 14–22 (2020)

    Article  Google Scholar 

  4. D. Won, S. Chi, M.W. Park, UAV-RFID integration for construction resource localization. KSCE J. Civ. Eng. 24(6), 1683–1695 (2020)

    Article  Google Scholar 

  5. C. Yang, X. Wang, S. Mao, Respiration monitoring with RFID in driving environments. IEEE J. Sel. Areas Commun. 39(2), 500–512 (2020)

    Article  Google Scholar 

  6. H.A. Khan, R. Abdulla, S.K. Selvaperumal, A. Bathich, IoT based on secure personal healthcare using RFID technology and steganography. Int. J. Electr. Comput. Eng. 11(4), 3300–3309 (2021)

    Google Scholar 

  7. M.W. Raad, M. Deriche, T. Sheltami, An IoT-based school bus and vehicle tracking system using RFID technology and mobile data networks. Arab. J. Sci. Eng. 46(4), 3087–3097 (2021)

    Article  Google Scholar 

  8. B. Bergquist, E. Vanhatalo, In-situ measurement in the iron ore pellet distribution chain using active RFID technology. Powder Technol. 361, 791–802 (2020)

    Article  Google Scholar 

  9. S. Jung, S. Kim, A study of promoting method a traditional market by implementing RFID technology and 6W1H context awareness. J. Converg. Inf. Technol. 10(10), 9–14 (2020)

    Google Scholar 

  10. P.R. Podduturi, T. Maco, P. Ahmadi, K. Islam, RFID implementation in supply chain management. Int. J. Interdiscip. Telecommun. Netw. 12(2), 34–45 (2020)

    Google Scholar 

  11. F. Zhu, SecMAP: a secure RFID mutual authentication protocol for healthcare systems. IEEE Access 8, 192192–192205 (2020)

    Article  Google Scholar 

  12. S. Xie, F. Zhang, R. Cheng, Security enhanced RFID authentication protocols for healthcare environment. Wirel. Pers. Commun. 117(1), 71–86 (2021)

    Article  Google Scholar 

  13. A.K. Agrahari, S. Varma, A provably secure RFID authentication protocol based on ECQV for the medical internet of things. Peer Peer Netw. Appl. 14(3), 1277–1289 (2021)

    Article  Google Scholar 

  14. A.A. Najib, R. Munadi, N.B.A. Karna, Security system with RFID control using E-KTP and internet of things. Bull. Electr. Eng. Inform 10(3), 1436–1445 (2021)

    Google Scholar 

  15. K. Fan, W. Jiang, Q. Luo, H. Li, Y.T. Yang, Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV. J. Frank. Inst. 358(1), 193–209 (2021)

    Article  Google Scholar 

  16. R. Colella, M.R. Tumolo, S. Sabina, C.G. Leo, P. Mincarone, R. Guarino, C. Luca, Design of UHF RFID sensor-tags for the biomechanical analysis of human body movements. IEEE Sensors J. 21(13), 14090–14098 (2021)

    Article  Google Scholar 

  17. R. Xu, J. Liu, K. Wei, W. Hu, Z. Xing, J.Y. Li, S.S. Gao, Dual-band circularly polarized antenna with two pairs of crossed-dipoles for RFID reader. IEEE Trans. Antennas Propag. 69(12), 8194–8203 (2021)

    Article  Google Scholar 

  18. M. Usama, A. Ramish, Towards a sustainable reverse logistics framework/typologies based on radio frequency identification (RFID). Oper. Supply Chain Manag 13(3), 222–232 (2020)

    Google Scholar 

  19. C. Yang, X. Wang, S. Mao, Unsupervised drowsy driving detection with RFID. IEEE Trans. Veh. Technol. 69(8), 8151–8163 (2020)

    Article  Google Scholar 

  20. M. Wagih, J. Shi, Wireless ice detection and monitoring using flexible UHF RFID tags. IEEE Sensors J. 21(17), 18715–18724 (2021)

    Article  Google Scholar 

  21. S.Y. Chiou, An Efficient RFID Authentication Protocol Using Dynamic Identity. Int. J. Netw. Secur. 21(5), 728–734 (2019)

    Google Scholar 

  22. S.F. Aghili, H. Mala, P. Kaliyar, et al., SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT. Futur. Gener. Comput. Syst. 101, 621–634 (2019)

    Article  Google Scholar 

  23. S.A. Jesudurai, A. Senthilkumar, An improved energy efficient cluster head selection protocol using the double cluster heads and data fusion methods for IoT applications. Cogn. Syst. Res. 57, 101–106 (2019)

    Article  Google Scholar 

  24. J. Zhao, H. Wu, D.A. Li, et al., LILAC: computable capabilities based high performance protocol for CRFID. IET Commun. 13(10), 1348–1355 (2019)

    Article  Google Scholar 

  25. X. Xie, X. Liu, X. Zhao, et al., Implementation of Differential Tag Sampling for COTS RFID Systems. IEEE Trans. Mob. Comput. 19(8), 1848–1861 (2020)

    Google Scholar 

Download references

Acknowledgements

None.

Funding

The research is supported by the Department of Education of Guangdong Province “Research on improved RFID bidirectional authentication protocol against exhaustive attacks” (2020KTSCX347).

Author information

Authors and Affiliations

Authors

Contributions

Kongze Li wrote the manuscript and drew the diagrams. The author read and approved the final manuscript.

Corresponding author

Correspondence to Kongze Li.

Ethics declarations

Competing interests

The author declares no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1186/s13635-024-00163-6

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, K. RETRACTED ARTICLE: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data. EURASIP J. on Info. Security 2024, 3 (2024). https://doi.org/10.1186/s13635-024-00151-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13635-024-00151-w

Keywords