{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:50:53Z","timestamp":1775073053258,"version":"3.50.1"},"reference-count":37,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T00:00:00Z","timestamp":1650326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["109-2628-E-155-001-MY3"],"award-info":[{"award-number":["109-2628-E-155-001-MY3"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have a significant impact on our daily lives. While the growing number of linked IoT devices makes our daily lives easier, it also puts our personal data at risk. In IoT applications, Radio Frequency Identification (RFID) helps in the automatic identification of linked devices, and the dataflow of the system forms a symmetry in communication between the tags and the readers. However, the security and privacy of RFID-tag-connected devices are the key concerns. The communication link is thought to be wireless or insecure, making the RFID system open to several known threats. In order to address these security issues, we propose a robust authentication framework for IoT-based RFID infrastructure. We use formal security analysis in the random oracle model, as well as information analysis to support the claim of secure communication. Regarding the desirable performance characteristics, we describe and analyze the proposed framework\u2019s performance and compare it to similar systems. According to our findings, the proposed framework satisfies all security requirements while also improving the communication.<\/jats:p>","DOI":"10.3390\/s22093110","type":"journal-article","created":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:22:43Z","timestamp":1650414163000},"page":"3110","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure"],"prefix":"10.3390","volume":"22","author":[{"given":"Vikas","family":"Kumar","sequence":"first","affiliation":[{"name":"Department of Mathematics, SSV College, Hapur 245101, Uttar Pradesh, India"}]},{"given":"Rahul","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Mathematics, SSV College, Hapur 245101, Uttar Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7525-8864","authenticated-orcid":false,"given":"Akber Ali","family":"Khan","sequence":"additional","affiliation":[{"name":"B. S. Anangpuria Institute of Technology and Management, Faridabad 121004, Haryana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2939-1100","authenticated-orcid":false,"given":"Vinod","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Mathematics, PGDAV College, University of Delhi, New Delhi 110065, Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5577-0016","authenticated-orcid":false,"given":"Yu-Chi","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Yuan Ze University, Taoyuan 320, Taiwan"},{"name":"Department of Computer Science and Information Engineering, National Taipei University of Technology, Taipei 106, Taiwan"}]},{"given":"Chin-Chieh","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Accounting Information, National Taipei University of Business, Taipei 100, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2022,4,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Finkenzeller, K. (2010). RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication, John Wiley & Sons.","DOI":"10.1002\/9780470665121"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MPRV.2006.2","article-title":"An introduction to RFID technology","volume":"5","author":"Want","year":"2006","journal-title":"IEEE Pervasive Comput."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"107661","DOI":"10.1016\/j.cie.2021.107661","article-title":"The healthcare supply chain network design with traceability: A novel algorithm","volume":"161","author":"Hajipour","year":"2021","journal-title":"Comput. Ind. Eng."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Cerciello, E., Massei, G., and Paura, L. (2014, January 12\u201315). Optimization of tag anti-collision algorithm for EPC Gen2 RFID. Proceedings of the 2014 Euro Med Telco Conference (EMTC), Naples, Italy.","DOI":"10.1109\/EMTC.2014.6996631"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Marino, F., Massei, G., and Paura, L. (2013, January 7\u20138). Modeling and performance simulation of EPC Gen2 RFID on OPNET. Proceedings of the 2013 IEEE International Workshop on Measurements & Networking (M&N), Naples, Italy.","DOI":"10.1109\/IWMN.2013.6663782"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","article-title":"RFID security and privacy: A research survey","volume":"24","author":"Juels","year":"2006","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1016\/j.future.2017.06.023","article-title":"Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment","volume":"83","author":"Gope","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2581","DOI":"10.1002\/sec.1488","article-title":"Efficient identity authentication and encryption technique for high throughput RFID system","volume":"9","author":"Hsu","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Kitsos, P. (2016). Security in RFID and Sensor Networks, CRC Press.","DOI":"10.1201\/9781420068405"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"7273","DOI":"10.1109\/ACCESS.2018.2890389","article-title":"Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains","volume":"7","author":"Sidorov","year":"2019","journal-title":"IEEE Access"},{"key":"ref_11","unstructured":"Yang, J., Park, J., Lee, H., Ren, K., and Kim, K. (2005, January 14\u201315). Mutual authentication protocol for low-cost RFID. Proceedings of the Workshop on RFID and Lightweight Crypto, Graz, Austria."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/CCCM.2008.305","article-title":"A minimalist mutual authentication protocol for RFID system & BAN logic analysis","volume":"Volume 2","author":"Qingling","year":"2008","journal-title":"Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.camwa.2012.02.025","article-title":"Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol","volume":"69","author":"Cho","year":"2015","journal-title":"Comput. Math. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.dss.2010.09.005","article-title":"RFID mutual authentication protocols","volume":"50","author":"Piramuthu","year":"2011","journal-title":"Decis. Support Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.cam.2013.09.073","article-title":"Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol","volume":"259","author":"Safkhani","year":"2014","journal-title":"J. Comput. Appl. Math."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1400","DOI":"10.1109\/TWC.2008.061012","article-title":"Secure and serverless RFID authentication and search protocols","volume":"7","author":"Tan","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Cai, S., Li, Y., Li, T., and Deng, R.H. (2009, January 16\u201318). Attacks and improvements to an RIFD mutual authentication protocol and its extensions. Proceedings of the Second ACM Conference on Wireless Network Security, Zurich, Switzerland.","DOI":"10.1145\/1514274.1514282"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ayaz, U., Haq, T.A., Taimour, S., Mansoor, K., and Mahmood, S. (2018, January 21\u201322). An enhanced biometric based rfid authentication scheme defending against illegitimate access. Proceedings of the 2018 14th International Conference on Emerging Technologies (ICET), Islamabad, Pakistan.","DOI":"10.1109\/ICET.2018.8603650"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Liu, B., Yang, B., and Su, X. (2018). An improved two-way security authentication protocol for RFID system. Information, 9.","DOI":"10.3390\/info9040086"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Mansoor, K., Ghani, A., Chaudhry, S.A., Shamshirband, S., Ghayyur, S.A.K., and Mosavi, A. (2019). Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography. Sensors, 19.","DOI":"10.20944\/preprints201907.0298.v1"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.cose.2015.05.004","article-title":"A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system","volume":"55","author":"Gope","year":"2015","journal-title":"Comput. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Gao, M., and Lu, Y. (2022). URAP: A new ultra-lightweight RFID authentication protocol in passive RFID system. J. Supercomput., 1\u201313.","DOI":"10.1587\/transcom.2020EBP3022"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.comcom.2022.01.014","article-title":"A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living","volume":"186","author":"Wang","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_24","first-page":"79","article-title":"Proving Mutual Authentication Property of RCIA Protocol in RFID Based on Logic of Events","volume":"31","author":"Zhong","year":"2022","journal-title":"Chin. J. Electron."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"8577","DOI":"10.1007\/s11227-021-04232-2","article-title":"AnonSURP: An anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems","volume":"78","author":"Shariq","year":"2022","journal-title":"J. Supercomput."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"7516010","DOI":"10.1155\/2022\/7516010","article-title":"An Improved Security Authentication Protocol for Lightweight RFID Based on ECC","volume":"2022","author":"Wei","year":"2022","journal-title":"J. Sens."},{"key":"ref_27","unstructured":"Arslan, A., and Bing\u00f6l, M.A. (2022). Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes, International Association for Cryptologic Research. Cryptology ePrint Archive: Report 2022\/044."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Canetti, R., and Krawczyk, H. (2001, January 6\u201310). Analysis of key-exchange protocols and their use for building secure channels. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Innsbruck, Austria.","DOI":"10.1007\/3-540-44987-6_28"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2831","DOI":"10.1109\/TIFS.2018.2832849","article-title":"Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions","volume":"13","author":"Gope","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s10623-005-6344-y","article-title":"Some observations on the theory of cryptographic hash functions","volume":"38","author":"Stinson","year":"2006","journal-title":"Des. Codes Cryptogr."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"102053","DOI":"10.1016\/j.sysarc.2021.102053","article-title":"LAKAF: Lightweight authentication and key agreement framework for smart grid network","volume":"116","author":"Khan","year":"2021","journal-title":"J. Syst. Archit."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s11235-021-00826-6","article-title":"A secure and efficient key agreement framework for critical energy infrastructure using mobile device","volume":"78","author":"Khan","year":"2021","journal-title":"Telecommun. Syst."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Izabachene, M., and Pointcheval, D. (2008, January 2\u20134). Anonymous and transparent gateway-based password-authenticated key exchange. Proceedings of the International Conference on Cryptology and Network Security, Hong Kong, China.","DOI":"10.1007\/978-3-540-89641-8_10"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s12083-015-0404-5","article-title":"A new and secure authentication scheme for wireless sensor networks with formal proof","volume":"10","author":"Wu","year":"2017","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"e4103","DOI":"10.1002\/dac.4103","article-title":"SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing","volume":"34","author":"Kumar","year":"2019","journal-title":"Int. J. Commun. Syst."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12083-015-0400-9","article-title":"An improved and provably secure privacy preserving authentication protocol for SIP","volume":"10","author":"Chaudhry","year":"2017","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1109\/SURV.2013.091513.00050","article-title":"A survey of SIP authentication and key agreement schemes","volume":"16","author":"Kilinc","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/9\/3110\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:56:31Z","timestamp":1760136991000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/9\/3110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,19]]},"references-count":37,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["s22093110"],"URL":"https:\/\/doi.org\/10.3390\/s22093110","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,19]]}}}