Exploring Authentication Protocols for RFID Systems in the Internet of Things
Keywords:
RFID authentication, Internet of Things, lightweight protocols, elliptic curve cryptographyAbstract
The integration of Radio Frequency Identification (RFID) systems into Internet of Things (IoT) networks has significantly expanded opportunities for real-time tracking, monitoring, and communication across domains such as healthcare, logistics, transportation, and smart cities. However, the resource-constrained nature of RFID devices combined with the dynamic, large-scale, and heterogeneous nature of IoT environments exposes these systems to critical security threats. Authentication, as the first line of defense, becomes essential in ensuring confidentiality, integrity, and trustworthiness. This study critically examines existing RFID authentication schemes tailored for IoT networks, focusing on approaches such as elliptic curve cryptography (ECC)-based methods, ultralightweight protocols, domain-specific frameworks, and novel paradigms including Physical Unclonable Functions (PUFs) and user-assisted authentication mechanisms. A structured evaluation framework was applied to analyze resilience against common attacks, computational and energy efficiency, scalability, and the presence of mutual authentication. Simulated experiments further validated performance under varying network sizes and adversarial conditions. The results indicate that ECC-based schemes offer strong security assurances but introduce computational overhead unsuitable for low-end tags, while ultralightweight protocols excel in efficiency but face resilience challenges under advanced attacks. Application-specific solutions demonstrated superior performance in targeted domains, and emerging paradigms such as RF-Rhythm and PUFs introduced innovative alternatives that extend security beyond conventional cryptographic design. Hybrid approaches integrating blockchain and machine learning also showed potential in enhancing resilience, though practical limitations remain in constrained environments. The study concludes that adaptive, context-aware, and multi-layered authentication schemes will be critical to protecting RFID systems in IoT networks, ensuring secure and sustainable growth of these interconnected infrastructures.
References
Avoine, G., Bingöl, M. A., Kardaş, S., Lauradoux, C., & Önen, M. (2011). A framework for analyzing RFID distance bounding protocols. Journal of Computer Security, 19(2), 289–317.
Chien, H. Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.
Dimitriou, T. (2005). A lightweight RFID protocol to protect against traceability and cloning attacks. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005) (pp. 59–66). IEEE.
Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–394.
Juels, A., & Weis, S. A. (2005). Authenticating pervasive devices with human protocols. In Advances in Cryptology – CRYPTO 2005 (pp. 293–308). Springer.
Kulseng, L., Yu, Z., Wei, Y., & Hu, W. (2010). Lightweight secure RFID protocol using bitwise operations. In 2010 IEEE Conference on Communications and Network Security (pp. 1–9). IEEE.
Lehtonen, M., Staake, T., Michahelles, F., & Fleisch, E. (2007). From identification to authentication – A review of RFID product authentication techniques. In Networked RFID Systems and Lightweight Cryptography (pp. 169–187). Springer.
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In RFIDSec 2006 Workshop on RFID Security (pp. 37–48).
Tan, C. C., Sheng, B., & Li, Q. (2008). Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 7(4), 1400–1407.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2015 International Journal of Engineering, Science and Humanities

This work is licensed under a Creative Commons Attribution 4.0 International License.