UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems

Abstract The emergence of radio frequency identification (RFID) technology in the era of the Internet of Things represents a remarkable advancement, but also brings its own set of challenges. Low-cost RFID tags, key elements of this ecosystem, face major security and privacy issues due to their limi...

Full description

Saved in:
Bibliographic Details
Main Authors: Ziad Akiirne, Abdellah Sghir, Driss Bouzidi
Format: Article
Language:English
Published: SpringerOpen 2024-12-01
Series:Cybersecurity
Subjects:
Online Access:https://doi.org/10.1186/s42400-024-00252-6
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850085929915514880
author Ziad Akiirne
Abdellah Sghir
Driss Bouzidi
author_facet Ziad Akiirne
Abdellah Sghir
Driss Bouzidi
author_sort Ziad Akiirne
collection DOAJ
description Abstract The emergence of radio frequency identification (RFID) technology in the era of the Internet of Things represents a remarkable advancement, but also brings its own set of challenges. Low-cost RFID tags, key elements of this ecosystem, face major security and privacy issues due to their limited computational and memory capacities. To overcome these issues, we focused on the design of an ultralightweight RFID authentication protocol named UDAP, which incorporates simplified cryptographic techniques such as dot product, XOR, and left rotation. This approach aims to enhance the levels of security and confidentiality while concurrently minimizing the impact on the tag’s limited resources. Both informal and formal analysis of our protocol, including the use of the Scyther simulation tool, has demonstrated its effectiveness in countering the most known security attacks. To measure the efficiency of our proposed protocol, an Field-Programmable Gate Array (FPGA) implementation was carried out, allowing for precise evaluation of the resource consumption of the key function used in our protocol. This implementation has shown that our protocol is not only secure but also utilizes minimal resource consumption, making it particularly suitable for resource constrained RFID tags.
format Article
id doaj-art-9275327d98ae4f4f8eff166324f7b2ef
institution DOAJ
issn 2523-3246
language English
publishDate 2024-12-01
publisher SpringerOpen
record_format Article
series Cybersecurity
spelling doaj-art-9275327d98ae4f4f8eff166324f7b2ef2025-08-20T02:43:36ZengSpringerOpenCybersecurity2523-32462024-12-017112310.1186/s42400-024-00252-6UDAP: ultra-lightweight dot product-based authentication protocol for RFID systemsZiad Akiirne0Abdellah Sghir1Driss Bouzidi2Smart Systems Laboratory (SSL), National Higher School For Computer Science and Systems Analysis (ENSIAS), Mohammed V UniversityNational Higher School For Computer Science and Systems Analysis (ENSIAS), Mohammed V UniversitySmart Systems Laboratory (SSL), National Higher School For Computer Science and Systems Analysis (ENSIAS), Mohammed V UniversityAbstract The emergence of radio frequency identification (RFID) technology in the era of the Internet of Things represents a remarkable advancement, but also brings its own set of challenges. Low-cost RFID tags, key elements of this ecosystem, face major security and privacy issues due to their limited computational and memory capacities. To overcome these issues, we focused on the design of an ultralightweight RFID authentication protocol named UDAP, which incorporates simplified cryptographic techniques such as dot product, XOR, and left rotation. This approach aims to enhance the levels of security and confidentiality while concurrently minimizing the impact on the tag’s limited resources. Both informal and formal analysis of our protocol, including the use of the Scyther simulation tool, has demonstrated its effectiveness in countering the most known security attacks. To measure the efficiency of our proposed protocol, an Field-Programmable Gate Array (FPGA) implementation was carried out, allowing for precise evaluation of the resource consumption of the key function used in our protocol. This implementation has shown that our protocol is not only secure but also utilizes minimal resource consumption, making it particularly suitable for resource constrained RFID tags.https://doi.org/10.1186/s42400-024-00252-6IoTRFIDLow-costAuthenticationUltralightweight protocolsScyther
spellingShingle Ziad Akiirne
Abdellah Sghir
Driss Bouzidi
UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
Cybersecurity
IoT
RFID
Low-cost
Authentication
Ultralightweight protocols
Scyther
title UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
title_full UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
title_fullStr UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
title_full_unstemmed UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
title_short UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
title_sort udap ultra lightweight dot product based authentication protocol for rfid systems
topic IoT
RFID
Low-cost
Authentication
Ultralightweight protocols
Scyther
url https://doi.org/10.1186/s42400-024-00252-6
work_keys_str_mv AT ziadakiirne udapultralightweightdotproductbasedauthenticationprotocolforrfidsystems
AT abdellahsghir udapultralightweightdotproductbasedauthenticationprotocolforrfidsystems
AT drissbouzidi udapultralightweightdotproductbasedauthenticationprotocolforrfidsystems