{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T04:30:34Z","timestamp":1775622634980,"version":"3.50.1"},"reference-count":29,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T00:00:00Z","timestamp":1519948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of P. R. China","award":["No.: 61572260, No.: 61572261, No.: 61672296, No.: 61602261"],"award-info":[{"award-number":["No.: 61572260, No.: 61572261, No.: 61672296, No.: 61602261"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["No.: BK20140888"],"award-info":[{"award-number":["No.: BK20140888"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Natural Science Foundation for Excellent Young Scholars","award":["No.: BK20160089"],"award-info":[{"award-number":["No.: BK20160089"]}]},{"name":"Scientific &amp; Technological Support Project of Jiangsu Province","award":["No.: BE2015702, BE2016185, No.: BE2016777"],"award-info":[{"award-number":["No.: BE2015702, BE2016185, No.: BE2016777"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["No.: 2014M561696"],"award-info":[{"award-number":["No.: 2014M561696"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010242","name":"Jiangsu Planned Projects for Postdoctoral Research Funds","doi-asserted-by":"publisher","award":["No.: 1401005B"],"award-info":[{"award-number":["No.: 1401005B"]}],"id":[{"id":"10.13039\/501100010242","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postgraduate Research and Practice Innovation Program of Jiangsu Province","award":["No.: SJLX16_0326, No.: KYCX17_0798"],"award-info":[{"award-number":["No.: SJLX16_0326, No.: KYCX17_0798"]}]},{"name":"Project of Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks","award":["No.: WSNLBZY201509"],"award-info":[{"award-number":["No.: WSNLBZY201509"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.<\/jats:p>","DOI":"10.3390\/s18030760","type":"journal-article","created":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T11:53:40Z","timestamp":1519991620000},"page":"760","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2809-2237","authenticated-orcid":false,"given":"He","family":"Xu","sequence":"first","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jie","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5026-5347","authenticated-orcid":false,"given":"Peng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Feng","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ruchuan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2018,3,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"183","DOI":"10.4236\/cn.2010.23026","article-title":"An Introduction to RFID Technology","volume":"2","author":"Ahuja","year":"2010","journal-title":"Commun. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Zomorrodi, M., Karmakar, N.C., and Bansal, S.G. (2013, January 2\u20135). Introduction of electromagnetic image-based chipless RFID system. Proceedings of the IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Melbourne, Australia.","DOI":"10.1109\/ISSNIP.2013.6529831"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.aei.2006.09.001","article-title":"Radio-Frequency Identification (RFID) applications: A brief introduction","volume":"21","author":"Domdouzis","year":"2007","journal-title":"Adv. Eng. Inform."},{"key":"ref_4","first-page":"79","article-title":"A Basic Introduction to RFID Technology and its Use in the Supply Chain","volume":"136","author":"Laran","year":"2009","journal-title":"J. Control. Release"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1546","DOI":"10.1109\/JPROC.2010.2053871","article-title":"Guest Editors Introduction: RFID\u2014A Unique Radio Innovation for the 21st Century","volume":"98","author":"Gadh","year":"2010","journal-title":"Proc. IEEE"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1108\/01443570910993483","article-title":"A quantitative model for the introduction of RFID in the fast moving consumer goods supply chain: Are there any profits","volume":"29","author":"Miragliotta","year":"2009","journal-title":"Int. J. Oper. Prod. Manag."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3390\/jtaer3010002","article-title":"RFID and Supply Chain Management: Introduction to the Special Issue","volume":"3","author":"Coltman","year":"2008","journal-title":"J. Theor. Appl. Electron. Commer. Res."},{"key":"ref_8","first-page":"44","article-title":"RFID Principle and Its Application in Vehicle","volume":"30","author":"Shen","year":"2008","journal-title":"Storage Transp. Preserv. Commod."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ferrero, R., Gandino, F., Montrucchio, B., Rebaudengo, M., and Zhang, L. (2015, January 22\u201323). A novel simulator for RFID reader-to-reader anti-collision protocols. Proceedings of the International EURASIP Workshop on RFID Technology, Rosenheim, Germany.","DOI":"10.1109\/EURFID.2015.7332386"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Want, R. (2006). An Introduction to RFID Technology, IEEE Educational Activities Department.","DOI":"10.1109\/MPRV.2006.2"},{"key":"ref_11","unstructured":"Ha, J.C., Moon, S.J., Nieto, J.M.G., and Boyd, C. (2012). Low-Cost and Strong-Security RFID Authentication Protocol. Emerging Directions in Embedded and Ubiquitous Computing, Proceedings of the EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, 17\u201320 December 2007, Springer."},{"key":"ref_12","first-page":"4265","article-title":"The Simulation and Analysis of RC4 and 3DES Algorithm for Data Encryption in RFID Credit Card","volume":"10","author":"Sharma","year":"2015","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2581","DOI":"10.1002\/sec.1488","article-title":"Efficient identity authentication and encryption technique for high throughput RFID system","volume":"9","author":"Hsu","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"G\u00f3dor, G., and Imre, S. (2012). Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems. Information and Communication Technologies, Springer.","DOI":"10.1007\/978-3-642-32808-4_8"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s10916-015-0362-8","article-title":"A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety","volume":"40","author":"Jin","year":"2016","journal-title":"J. Med. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Dehkordi, M.H., and Farzaneh, Y. (2014). Improvement of the Hash-Based RFID Mutual Authentication Protocol, Kluwer Academic Publishers.","DOI":"10.1007\/s11277-013-1358-7"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1007\/s11277-016-3513-4","article-title":"Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol","volume":"91","author":"Sun","year":"2016","journal-title":"Wirel. Pers. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1109\/TDSC.2010.75","article-title":"On Ultralightweight RFID Authentication Protocols","volume":"8","author":"Santis","year":"2011","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"4455","DOI":"10.1109\/TIE.2015.2389759","article-title":"A Low-Cost UHF RFID System with OCA Tag for Short-Range Communication","volume":"62","author":"Peng","year":"2015","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.jnca.2013.10.014","article-title":"An ultralightweight RFID authentication protocol with CRC and permutation","volume":"41","author":"Gao","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Tewari, A., and Gupta, B.B. (2017). Cryptanalysis of a Novel Ultra-Lightweight Mutual Authentication Protocol for IoT Devices Using RFID Tags, Kluwer Academic Publishers.","DOI":"10.1007\/s11227-016-1849-x"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Lehtonen, M., Michahelles, F., and Fleisch, E. (2009, January 27\u201328). How to Detect Cloned Tags in a Reliable Way from Incomplete RFID Traces. Proceedings of the IEEE International Conference on RFID, Orlando, FL, USA.","DOI":"10.1109\/RFID.2009.4911190"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Zanetti, D., Fellmann, L., and Capkun, S. (2010, January 14\u201316). Privacy-preserving Clone Detection for RFID-enabled Supply Chains. Proceedings of the IEEE International Conference on RFID, Orlando, FL, USA.","DOI":"10.1109\/RFID.2010.5467257"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Ray, B., Chowdhury, M., and Abawaiy, J. (2015, January 26\u201328). PUF-based secure checker protocol for Networked RFID Systems. Proceedings of the IEEE Conference on Open Systems, Subang, Malaysia.","DOI":"10.1109\/ICOS.2014.7042633"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Gao, Y., Li, G., Ma, H., Al-Sarawi, S.F., Kavehei, O., Abbott, D., and Ranasinghe, D.C. (2016, January 14\u201318). Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices. Proceedings of the IEEE International Conference on Pervasive Computing and Communication Workshops, Sydney, Australia.","DOI":"10.1109\/PERCOMW.2016.7457162"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., and Khandelwal, V. (2008, January 16\u201317). Design and Implementation of PUF-Based \u201cUnclonable\u201d RFID ICs for Anti-Counterfeiting and Security Applications. Proceedings of the IEEE International Conference on RFID, Las Vegas, NV, USA.","DOI":"10.1109\/RFID.2008.4519377"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Kulseng, L., Yu, Z., Wei, Y., and Guan, U. (2010, January 14\u201319). Lightweight mutual authentication and ownership transfer for RFID systems. Proceedings of the IEEE Conference on INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462233"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Kardas, S., Akgun, M., Kiraz, M.S., and Demirci, H. (2011, January 14\u201315). Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. Proceedings of the Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications, Istanbul, Turkey.","DOI":"10.1109\/LightSec.2011.10"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., and Yahalom, R. (1990, January 7\u20139). Reasoning about belief in cryptographic protocols. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/RISP.1990.63854"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/3\/760\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:57:19Z","timestamp":1760194639000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/3\/760"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,2]]},"references-count":29,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,3]]}},"alternative-id":["s18030760"],"URL":"https:\/\/doi.org\/10.3390\/s18030760","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,2]]}}}