• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science ›› 2023, Vol. 45 ›› Issue (1): 77-84.

• Computer Network and Znformation Security • Previous Articles     Next Articles

Overview of RFID security authentication protocols

KOU Guang-yue1,WEI Guo-heng1,PING Yuan2,LIU Peng3   

  1. (1.Department of Information Security,Naval University of Engineering,Wuhan 430000;
    2.School of Information Engineering,Xuchang University,Xuchang 461000;
    3.Naval Staff,Beijing 100000,China)
  • Received:2022-09-14 Revised:2022-10-29 Online:2023-01-25 Published:2023-01-25

Abstract: In the development of the Internet of Things, RFID technology with its lightweight advantage plays an important role in the Internet of Things (IoT) system. At the same time, RFID authentication protocols are also subject to security threats due to physical limitations. By sorting out the current mainstream RFID authentication protocols, they are divided into ultra-lightweight, lightweight, middleweight, and heavyweight security authentication protocols according to the magnitude of the encryption algorithm. The security problems of typical security authentication protocols are analyzed, and the security performance and performance indicators of the improved protocols proposed in recent years are discussed and compared according to the magnitude. Finally, the possible development direction of RFID authentication protocols is discussed. 

Key words: Internet of Things(IoT), RFID, authentication, security authentication protocol