Abstract
RFID is one of the most protuberant systems in the field of ubiquitous computing. Since RFID tags have limited computation capabilities, numerous ultralightweight authentication protocols have been proposed to provide privacy and security. However all the previously proposed ultralightweight mutual authentication protocols have some security apprehensions and are vulnerable to various desynchronization and full disclosure attacks. This paper proposes a new ultralightweight mutual authentication protocol to provide robust confidentiality, integrity, and authentication (RCIA) in a cost effective manner. RCIA introduces a new ultralightweight primitive recursive hash, which efficiently detects the message tempering and also avoids all possible desynchronization attacks. RCIA involves only bitwise operations such as XOR, AND, left rotation, and recursive hash. Performance evaluation illustrates that RCIA requires less resources on tag in terms of on-chip memory, communication cost, and computational operations.
1. Introduction
Radio frequency identification (RFID) is a rapidly growing identification scheme; nonline of sight capability makes RFID systems superior and dominant than their contending systems. Cost effectiveness and miniaturization are the two rudimentary tools which have increased its commercialization and transformed its deployment into massive deployment. Unlike bar codes, in RFID systems each object is labeled with a miniaturized integrated circuit (IC) equipped with antenna and other memory blocks [1]. The demand for low cost RFID tags limits using only a few and cost effective computational operations on the tag side. Practically, the low cost RFID systems can store only hundreds of bits and can have 5 to 10 K gates. However only 250 to 3 K gates can be allocated to security related operations for EPC (electronic product code) class-1 generation 2 passive RFID tags [2].
In 2006, Peris-Lopez et al. [3, 4] proposed a family of lightweight authentication protocols for such low cost RFID systems. These protocols provide the basic security using only simple bitwise operations (XOR, AND, and OR). Later on, some security vulnerabilities of these protocols were reported in different articles [5–7]. In 2007, Chien [8] classified the security protocols into four types: full-fledged, simple, lightweight, and ultralightweight.
Full-fledged protocols can incorporate the traditional cryptographical algorithms and solutions, like one way hash functions, public or private key cryptography, and so forth. Simple authentication protocols can support random number generator and one-way hash functions only. Lightweight protocols can support only random number generators and simple functions such as cyclic redundancy check (CRC) but cannot use hash functions. Ultralightweight protocols can incorporate only simple bitwise logical operations and even random number generator cannot be used at the tag's side.
In this paper, a new ultralightweight mutual authentication protocol has been proposed: introduction of novel ultralightweight primitive “recursive hash” makes it much more robust than its contending protocols [3, 4, 8–14] against various desynchronization and full disclosure attacks. We have named the protocol “RCIA” to highlight its main features of robust confidentiality, integrity, and authentication.
The rest of the paper is organized as follows: Section 2 discusses the related works. Section 3 introduces the novel protocol which is followed by the security analysis in Section 4. Section 5 shows the performance evaluation of the proposed protocol and finally conclusion will be highlighted in Section 6.
2. Related Work
Nowadays, RFID systems are becoming an integral part of various commercial and industrial applications because of their enriched features and functional haste. On the other hand, the enormous deployment of such systems also alters the espionage to salvage the communicated data so conjecture secret data can be retrieved. In order to secure RFID systems in cost effective way, several ultralightweight mutual authentication protocols have already been proposed. However, all previously proposed protocols have some vulnerabilities and serious security flaws. A detailed survey of ultralightweight protocols and their vulnerabilities is described as follows.
In 2006, Peris-Lopez et al. [3, 4] proposed a family of ultralightweight protocols: LMAP (lightweight mutual authentication protocol) and EMAP (efficient mutual authentication protocol). These protocols use simple bitwise logical operations (triangular functions) to provide basic security and rudimentary working of these protocols involving three steps: tags identification, mutual authentication, and variables (pseudonyms and keys) updating. The randomness of the exchanged messages has been tested with ENT [15], NIST [16], and Diehard [17] randomness test suites. However, Li and Wang [18] exploited the inherent poor diffusion properties of triangular functions and proposed two attacks (desynchronization and full disclosure) on LMAP and EMAP. These attacks successfully challenged the security claims of both protocols.
In 2007, Chien [8] proposed a new ultralightweight RFID authentication protocol to provide strong authentication and strong integrity (SASI). A new left rotation (Rot) function has been extensively used in SASI in addition to simple bitwise logical operations to avoid the full disclosure and desynchronization attacks. However Avoine et al. [19] highlighted the poor designing of the messages in SASI and presented a practical passive attack on SASI. The proposed attack requires 217 eavesdrop sessions to launch full disclosure attack. In 2013 Avoine et al. [20] improved the full disclosure attack from 217 eavesdropped sessions to a few sessions. Sun et al. [21] found two desynchronization attacks on SASI and thus put the SASI among vulnerable ultralightweight mutual authentication protocols.
In 2008, Peris-Lopez et al. [12] proposed a more sophisticated ultralightweight authentication protocol named GOASSMER. Peris introduced a new primitive: MixBits (using genetic programming) in GOASSMER. MixBits function enhanced the diffusion properties of the exchanged messages; however, the confrontation between protocol developers and cryptanalysts continued. In 2009, Bilal et al. [22] highlighted few vulnerabilities in GOASMER protocol. They proposed denial of service (DoS) and desynchronization attacks on GOASSMER protocol. These attacks raised the question mark on GOASSMER security litigations. In 2012, Zubair et al. proposed a counter based methodology in [23] to augment the performance of GOASSMER protocol. Integration of the counter in GOASSMER makes it resilient against DOS and desynchronization attacks.
David and Prasad [10] presented a new ultralightweight authentication protocol using only AND and XOR operations in 2009. David-Prasad protocol introduced a concept of day certificate “C” for reader to eradicate the threat of reader impersonation. The protocol requires extremely less computational power at tag side thanks to inclusion of simple bitwise logical operations. However Hernandez-Castro et al. [24] proposed traceability and full disclosure attack (Tango) on the David-Prasad protocol. Tango attack requires GA (good approximations) equations based on hamming distance with unknown variable. Then Barrero et al. in [25] modified the Tango attack and presented genetic tango attack; the later one resolved the exhaustive searching of GA equations.
In 2012, Tian et al. [9] proposed a new ultralightweight authentication protocol: RAPP. RAPP introduced a new ultralightweight nontriangular primitive “Permutation” to enhance the diffusion properties of the secret variables. RAPP involves simple bitwise XOR, left rotation (Rot), and permutation
In [3, 4, 8–14] ultralightweight authentication mutual protocols for RFID systems have been proposed with several variations in design and primitives but cryptanalysis performed in [5–7, 19–30] highlighted the security loop holes and vulnerabilities in the abovementioned protocols. This raises the need of a new secure and robust ultralightweight mutual authentication protocol to combat against all types of malicious activities.
3. RCIA: A New Ultralightweight RFID Authentication Protocol
In RCIA, tags involve only three main operations: bitwise AND, XOR, and left rotation
Computation of Recursive Hash Function Decimate the string A into “K” number of chunks (memory blocks) with equal number of bits “l” per memory block ( For EPC class-1 generation-2 ultralightweight tags [2]: After extracting random numbers
Compute Seed (index of memory block) Seed calculated in step 2 will select the corresponding memory block
Take XOR between selected memory block Left rotate the
To better understand the concept of recursive hash function consider the following example.
Example. Given
Then we have
Assume:
Step 2. As, seed = 3, so Step 3. Take XOR between
The rotation function used in RCIA is explained as follows.
RCIA mainly involves three entities: tag, reader, and backend database. Usually, it is assumed that communication channel between reader and backend database is secure since both reader and tag can incorporate traditional cryptographical algorithms for secure communications [3]. The channel between tag and reader is wireless and susceptible to all types of adverse attacks because of limited computational power at tag side. Each tag has unique static ID and preshares a pseudonym IDS and two keys Reader sends a “ Upon receiving the reader's query, tag responds with its “IDS.” On receiving IDS, the reader will use it as a matching index in the database. If it is an old one, IDSold, then the reader will use The tag first extracts random nonces Upon receiving message D, the reader will compute a local value of D and if match occurs, then reader will also update its pseudonym (IDS) and keys
The statistical properties of the messages
Randomness test with ENT, Diehard, and NIST.

RCIA protocol.
4. Security Analysis
We analyze the security of RCIA in two aspects: basic functionality of the protocol and resistance to the various cryptanalysis attacks. As the name suggests, confidentiality, integrity, and authentication are the basic functionalities of the RCIA protocol, and these functionalities will be evaluated first. We have considered desynchronization, replay attack, traceability, impersonation, full disclosure, and recently proposed formal structural cryptanalysis such as Tango and recursive linear and differential cryptanalysis. Brief description of security analysis is presented in Figure 2.

Security analysis model.
4.1. Functionality of the Protocol
4.1.1. Confidentiality
RCIA ensures the data confidentiality by encrypting the publically disclosed messages
4.1.2. Integrity
The messages
4.1.3. Mutual Authentication
The genuine readers and genuine tags can authenticate each other. The messages
4.2. Security Model/Attacks
4.2.1. Desynchronization Attack
In RCIA, both reader and tag update their shared secret keys
(a) Attacker Interrupts Message C. Since tag does not receive message C from reader, it will not update its values and will keep the tuple
(b) Attacker Interrupts Message D. Since reader does not receive message D from tag, it will make the tag update its values but nothing happens at reader's end. As both tag and reader keep two entries of keys and
4.2.2. Replay Attack
In RCIA, for each new session: reader generates new random numbers
Suppose a reader initiates the protocol session with a particular tag. The attacker sniffs and records IDS and the messages
4.2.3. Traceability Attack
In RCIA, tag uses its IDS for interaction with reader instead of its original ID while the IDS will be updated after each successful session. Secondly, the updating operation involves pseudorandom numbers
4.2.4. Full Disclosure Attack
RCIA protocol has extensively incorporated nontriangular functions such as recursive hash (
4.2.5. Formal Structural Cryptanalysis
Most of the attacks proposed on UMAP protocols are based on ad hoc or probabilistic methods which are not extendible to a broader class of ultralightweight protocols for their security analysis. To the best of our knowledge, only two formal structural cryptanalysis methods (frameworks) with certain limitations, namely, Tango and recursive linear and differential cryptanalysis, exist to evaluate the security analysis of UMAP protocols. RCIA evades these formal structured cryptanalysis in the following manner.
(a) Tango Attack. Tango attack [24] mainly exploits the inherent poor diffusion properties of triangular functions and improper designing of the protocol messages (equations). The attack is divided into two phases: (a) selection of good approximations (GA) for secrets (keys and ID) and (b) comparison of combination of GA to reveal the desired secret (for various iterative sessions) with optimal precomputed threshold value
GA that are used in Tango attack to retrieve the conjecture secrets are linear approximations. Tango attack cannot be applied to UMAP protocols which incorporate nontriangular functions abundantly. This limitation of Tango attack has also been highlighted by the Hernandez-Castro et al. [24]. However, in RCIA none of the unbalanced operations is used and as recursive hash comprises one left rotation (for one memory chunk
(b) Recursive Linear and Differential Attacks [28]. recursive linear cryptanalysis (RLC) also exploits the T-functions and constructs the system of linear equations for each bit of the secret values (Keys and ID). The RLC then solves the linear equations recursively (bitwise) starting from least significant bit (LSB) to retrieve all concealed secret variables. RLC is passive and deterministic and requires only one authentication session. However RLC completely fails to retrieve the secret variables of UMAP protocols which incorporate nontriangular functions (
Recursive differential cryptanalysis (RDC) is more powerful attack than RLC and evidently has some more requirements. RDC is an active attack and requires more than one authentication sessions to construct the set of linear equations. In RDC, the attacker tends to limit both the reader and tag to run their new authentication sessions in previous state (Old), so that both parties will not update their variables (Keys and IDS). For each new session, all the dynamic secret variables will remain the same except random numbers
5. Performance Evaluation
In this section, the performance analysis of RCIA protocol in terms of computational operations, memory storage requirement, communication cost, and security for each tag is presented. As far as computational operations are concerned, the tag involves simple bitwise operations: XOR, AND, left rotation, and recursive hash. Recursive hash is basically composed of three basic ultralightweight operations: grouping, left rotation, and XORing. These operations are extremely lightweight in nature and can easily be implemented on low cost passive tags. Regarding storage requirement, each tag requires a ROM memory of 7L bits to store L bits of its static ID and 6L bits rewritable memory (two entries) of its pseudonyms (IDS,
RCIA provides robust security as compared to its contending previously proposed ultralightweight mutual authentication protocols [3, 4, 8–13]. None of these protocols completely satisfies the proposed security model presented in Section 4. The existing ultralightweight mutual authentication protocols fail to provide the basic functionalities (confidentiality, integrity, and authentication) which are the unavoidable requirement for any security protocol. On the other hand, as discussed in Section 4, RCIA can withstand all the security attacks mentioned in the security model, as shown in Figure 1. A simple comparison of some ultralightweight protocols is listed in Table 2. The analysis depicts that RCIA outperforms the others while using minimal resources.
Performance analysis of several ultralightweight mutual authentication protocols (tag side).
6. Conclusion
In this paper, we have proposed a novel ultralightweight mutual authentication protocol using recursive hash. The proposed scheme provides robust confidentiality, integrity of the transmitted messages, and authentication in optimal and cost effective way. In RCIA, there are only three computational operations at the tag's end: XOR, AND, and left rotation (Rot). A new ultralightweight primitive recursive hash has also been introduced in this paper which makes the proposed algorithm more secure and robust against various attacks. These tremendous features make RCIA the best choice for low cost and very low cost RFID tags.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
