Next Article in Journal
Nonlinear Errors Resulting from Ghost Reflection and Its Coupling with Optical Mixing in Heterodyne Laser Interferometers
Next Article in Special Issue
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information
Previous Article in Journal
A Modified Distributed Bees Algorithm for Multi-Sensor Task Allocation
Previous Article in Special Issue
SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing
Article Menu

Export Article

Open AccessArticle
Sensors 2018, 18(3), 760; doi:10.3390/s18030760

A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function

1,2,* , 1,2
School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China
Author to whom correspondence should be addressed.
Received: 9 January 2018 / Revised: 19 February 2018 / Accepted: 22 February 2018 / Published: 2 March 2018
(This article belongs to the Special Issue Security, Trust and Privacy for Sensor Networks)
View Full-Text   |   Download PDF [1057 KB, uploaded 9 March 2018]   |  


With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security. View Full-Text
Keywords: RFID technology; Physical Unclonable Function; lightweight cryptography; mutual verification RFID technology; Physical Unclonable Function; lightweight cryptography; mutual verification

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Xu, H.; Ding, J.; Li, P.; Zhu, F.; Wang, R. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function. Sensors 2018, 18, 760.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top