{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T22:15:34Z","timestamp":1776464134684,"version":"3.51.2"},"reference-count":25,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the National Key R&amp;D Program of China","award":["No. 2018YFB1003201"],"award-info":[{"award-number":["No. 2018YFB1003201"]}]},{"name":"the National Natural Science Foundation of P. R. China","award":["No. 61672296, No. 61602261, No. 61872196, No. 61872194 and No. 61902196"],"award-info":[{"award-number":["No. 61672296, No. 61602261, No. 61872196, No. 61872194 and No. 61902196"]}]},{"name":"Scientific and Technological Support Project of Jiangsu Province","award":["No. BE2017166, and No. BE2019740"],"award-info":[{"award-number":["No. BE2017166, and No. BE2019740"]}]},{"name":"Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province","award":["No. 18KJA520008"],"award-info":[{"award-number":["No. 18KJA520008"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the rapid development of the Internet of Things and the popularization of 5G communication technology, the security of resource-constrained IoT devices such as Radio Frequency Identification (RFID)-based applications have received extensive attention. In traditional RFID systems, the communication channel between the tag and the reader is vulnerable to various threats, including denial of service, spoofing, and desynchronization. Thus, the confidentiality and integrity of the transmitted data cannot be guaranteed. In order to solve these security problems, in this paper, we propose a new RFID authentication protocol based on a lightweight block cipher algorithm, SKINNY, (short for LRSAS). Security analysis shows that the LRSAS protocol guarantees mutual authentication and is resistant to various attacks, such as desynchronization attacks, replay attacks, and tracing attacks. Performance evaluations show that the proposed solution is suitable for low-cost tags while meeting security requirements. This protocol reaches a balance between security requirements and costs.<\/jats:p>","DOI":"10.3390\/s20051366","type":"journal-article","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T13:06:23Z","timestamp":1583240783000},"page":"1366","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["SKINNY-Based RFID Lightweight Authentication Protocol"],"prefix":"10.3390","volume":"20","author":[{"given":"Liang","family":"Xiao","sequence":"first","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2809-2237","authenticated-orcid":false,"given":"He","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7129-1082","authenticated-orcid":false,"given":"Feng","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ruchuan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5026-5347","authenticated-orcid":false,"given":"Peng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2020,3,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/2377677.2377685","article-title":"Efficient and reliable low-power backscatter networks","volume":"42","author":"Wang","year":"2012","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Shahzad, M., and Liu, A.X. (May, January 26). Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild. Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China.","DOI":"10.1109\/INFOCOM.2015.7218577"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Qi, S., Zheng, Y., Li, M., Lu, L., and Liu, Y. (May, January 27). COLLECTOR: A secure RFID-enabled batch recall protocol. Proceedings of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada.","DOI":"10.1109\/INFOCOM.2014.6848086"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Xiao, Q., Chen, M., Chen, S., and Zhou, Y. (2015, January 22\u201325). Temporally or Spatially Dispersed Joint RFID Estimation Using Snapshots of Variable Lengths. Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hangzhou, China.","DOI":"10.1145\/2746285.2746289"},{"key":"ref_5","unstructured":"(2020, February 02). RFID Report. Available online: https:\/\/www.idtechex.com\/en\/research-report\/rfid-forecasts-players-and-opportunities-2019-2029\/700."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","article-title":"SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity","volume":"4","author":"Chien","year":"2007","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/s10916-015-0213-7","article-title":"A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography","volume":"39","author":"Jin","year":"2015","journal-title":"J. Med. Syst."},{"key":"ref_8","first-page":"583","article-title":"Research on RFID security authentication protocol based on hash function","volume":"46","author":"Ding","year":"2009","journal-title":"J. Comput. Res. Dev."},{"key":"ref_9","first-page":"581","article-title":"Design and analysis of RFID security protocol","volume":"29","author":"Zhou","year":"2006","journal-title":"Chin. J. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1007\/s11859-013-0964-2","article-title":"A lightweight authentication protocol scheme for RFID security","volume":"18","author":"Wei","year":"2013","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.cose.2015.05.004","article-title":"A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system","volume":"55","author":"Gope","year":"2015","journal-title":"Comput. Secur."},{"key":"ref_12","first-page":"60","article-title":"Lightweight RFID two-way authentication protocol with constant time","volume":"39","author":"Zhou","year":"2016","journal-title":"J. Beijing Univ. Posts Telecommun."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., and Ribagorda, A. (November, January 29). EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France.","DOI":"10.1007\/11915034_59"},{"key":"ref_14","first-page":"56","article-title":"advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol","volume":"5379","author":"Tapiador","year":"2009","journal-title":"Int. Workshop Inf. Secur. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"6220","DOI":"10.1007\/s11227-018-2538-8","article-title":"Implementation of secret disclosure attack against two IoT lightweight authentication protocols","volume":"74","author":"Safkhani","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s11276-016-1323-y","article-title":"SLAP: Succinct and lightweight authentication protocol for low-cost RFID system","volume":"24","author":"Luo","year":"2018","journal-title":"Wirel. Netw."},{"key":"ref_17","first-page":"905","article-title":"Generalized desynchronization attack on UMAP: Application to RCIA, KMAP, SLAP and SASI+ protocols","volume":"2016","author":"Safkhani","year":"2016","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Liu, B., Yang, B., and Su, X. (2018). An improved two-way security authentication protocol for RFID system. Information, 9.","DOI":"10.3390\/info9040086"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Gao, X., Lv, S., Zhang, H., Li, X., Ji, W., He, Y., and Li, X. (2018, January 10\u201312). A kind of RFID security protocol based on the algorithm of present. Proceedings of the 5th International Conference on Systems and Informatics, Nanjing, China.","DOI":"10.1109\/ICSAI.2018.8599339"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Xu, H., Ding, J., Li, P., Zhu, F., and Wang, R. (2018). A lightweight RFID mutual authentication protocol based on physical unclonable function. Sensors, 18.","DOI":"10.3390\/s18030760"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Bendavid, Y., Safkhani, M., and Rostampour, S. (2018). IoT device security: Challenging a lightweight RFID mutual authentication protocol based on physical unclonable function. Sensors, 18.","DOI":"10.3390\/s18124444"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1215","DOI":"10.1007\/s11277-017-4232-1","article-title":"An efficient lightweight RFID authentication protocol with strong trajectory privacy protection","volume":"96","author":"Zhang","year":"2017","journal-title":"Wirel. Pers. Commun."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Gholami, V., and Alagheband, M. (2019). Provably privacy analysis and improvements of the lightweight RFID authentication protocols. Wirel. Netw., 1\u201317.","DOI":"10.1007\/s11276-019-02037-z"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Beierle, C., Jean, J., K\u00f6lbl, S., Leander, G., Moradi, A., Peyrin, T., Sasaki, Y., Sasdrich, P., and Sim, S.M. (2016, January 14\u201318). The SKINNY family of block ciphers and its low-latency variant MANTIS. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., and Yahalom, R. (1990, January 7\u20139). Reasoning about belief in cryptographic protocols. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/RISP.1990.63854"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/5\/1366\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:03:25Z","timestamp":1760173405000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/5\/1366"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,2]]},"references-count":25,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2020,3]]}},"alternative-id":["s20051366"],"URL":"https:\/\/doi.org\/10.3390\/s20051366","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,2]]}}}