Abstract
1. Introduction
RFID (radio frequency identification) is a key technology of the IoT for identifying the objects in a noncontact way. It is widely used in the fields of manufacture, retail, medical treatment, transportation, tracking, and location because the RFID tag is low in price, small in size, and easy to take. Besides, massive tags can be read simultaneously compared with bar codes. However, once the object is labeled a tag, the data privacy and the owner's location privacy would be threatened. So the owner's location privacy and security protection are the prerequisites for popularizing the RFID technology.
The traditional RFID system is composed of tags, readers, and a backend database, as seen in Figure 1. The reader activates the tag by sending the RF signals to communicate and exchange information with it in a noncontact way and submits the relevant data to the backend database. There are a lot of authentication schemes under this architecture [1–3]. These authentication schemes always assume that there is a secure backend server and the link between the reader and the backend server is reliable. For instance, Wei et al. [1] proposed a mutual authentication protocol based on hash function and Dong et al. [2] proposed a mutual authentication protocol based on SHA-3. In their schemes, the backend server needs to search the matching records by computing hash function; the computing ability of the backend server will be the bottleneck of the system. He et al. [3] proposed an ECC based authentication scheme in which the tag needs to compute scalar multiplication over the elliptic curve, so it does not satisfy the requirements of the lightweight tag. What is worse is that the backend-server-based architecture limits the mobility of the reader and the cost of deploying and maintaining the backend server is high.

The architecture of the backend-server-based schemes.
The serverless architecture consists of three kinds of entities: readers, tags, and a Certificate Authority (CA). Readers authenticate tags via the help of online CA, as seen in Figure 2. Each tag registers in the CA and each authorized reader downloads the Access List (AL) from the CA through a secure channel during the initialization process. For example, Lee et al. [4] proposed a serverless RFID authentication and search protocol. Hoque et al. [5] proposed enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments. Tan et al. [6] proposed a secure and serverless RFID authentication and search protocol. In the serverless system, the reader is able to move, but it only provides offline authentication and the computing ability of the reader is limited. What is worse is that if the reader is stolen, the AL stored in it could be used to forge tags.

The architecture of the serverless schemes.
With the development of the IoT, massive objects need to be identified by using RFID technology, thus forming big data of RFID applications. In the backend-server-based RFID systems, the computing ability of the backend server will be a bottleneck of the whole system when it receives massive authentication requests simultaneously. In the serverless RFID schemes, all the operations are conducted by the reader; the computing ability and storage capacity are more limited than those of the server-based RFID systems.
With the rapid development of cloud computing, cloud-based RFID systems attract more attention. There are several schemes which addressed the cloud-based RFID system [7–11]. Dabas and Gupta [7] proposed an architecture framework for the existing RFID systems melded with the cloud computing paradigm. Yuan and Li [8] built a cube model of RFID middleware data processing based on cloud computing. Chattopadhyay et al. [9] proposed a web based RFID asset management solution established on cloud services. Chu and Wu [10] designed a hybrid building fire evacuation system (HBFES) on a mobile phone using RFID techniques and cloud computing. However, most of them are focused on their functionalities rather than the security. Actually the security threats of cloud-based RFID systems are more serious than those of traditional RFID systems. In cloud-based RFID systems, the connection between the reader and the cloud database is not secure and cloud service provider is not trusted. To solve these problems, Xie et al. [12] proposed a cloud-based RFID authentication protocol in 2013. Abughazalah et al. [13] proposed a secure improved cloud-based RFID authentication protocol. Lin et al. [14] proposed a cloud-based authentication protocol for RFID supply chain systems. In all the above schemes, the computational complexity of the tag is high and they do not protect the reader's location privacy.
In this paper, a lightweight cloud-based RFID mutual authentication protocol without leaking location privacy to the cloud is proposed. A global encrypted hash table (EHT) corresponding to the encrypted RFID tags' information is stored in the cloud database. It provides real-time mutual authentication between the reader and the tag and protects the reader's location privacy by introducing the location privacy cloud which is not able to read the RFID data. Compared with traditional backend-server-based schemes and serverless schemes, the proposed scheme has obvious advantages in deployment cost, scalability, real-time authentication, and the tag's computational complexity.
The rest of the paper is organized as follows. Section 2 reviews the cloud-based RFID authentication schemes. The proposed authentication framework is given in Section 3. In Section 4, the proposed cloud-based RFID mutual authentication protocol is given. In Section 5, the security and the performance of the proposed protocol are analyzed. Section 6 concludes the paper.
2. Related Work
In this section, we will briefly review the cloud-based RFID authentication schemes and point out some disadvantages of them. Usually, the cloud-based RFID system is composed of a cloud server (cloud database), readers, and tags, where the reader is able to move and the RFID data is stored in the cloud database. There are several cloud-based RFID systems.
Xie et al. [12] proposed a cloud-based RFID authentication protocol. They used a Virtual Private Network (VPN) agency to guarantee the reliable connection between the reader and the cloud database. However, the cost of deploying and maintaining the VPN agency is high and this architecture is not suitable for SMEs (Small and Medium Enterprises). If the VPN agency is not maintained by the user, it is likely to expose the business information of the enterprise to the VPN agency. The protocol works as follows:
The tag sends The reader reads the cipher text The tag calculates The reader verifies The cloud adds the new record into the EHT, computes The reader confirms the updating is successful and computes The tag calculates
The weakness of Wei's cloud-based RFID authentication protocol was pointed out by Abughazalah et al. [13]. The authors find that Wei's authentication protocol suffers from reader impersonate attack and tag's location tracking attack. And the authors proposed a secure improved cloud-based RFID authentication protocol. They assume that the communication channel between the reader and the cloud server is secure, but this assumption is not suitable for the mobile readers.
Lin et al. [14] proposed a cloud-based authentication protocol for RFID supply chain systems. In their scheme, the system is composed of tags, readers, a cloud server, and a trust party. The authentication protocol cannot resist old key compromise attack. Its key update used a simple XOR operation,
Furthermore, all the above schemes do not protect the reader's location privacy; the leakage of the reader's location privacy will expose the business information of the company.
3. Our Authentication Framework
In this section, we describe our authentication framework. It provides the location privacy protection for the reader to access the cloud database.
3.1. System Components
The framework is illustrated in Figure 3.

The authentication framework.
3.2. The Location Privacy Mechanism of the Reader to the Cloud Database
In the following, we suppose the user
The mobile reader belongs to the user and its IP address is denoted by
In order to protect the location privacy of the reader, we design the following message transmission mechanism between the reader and the cloud database.
3.2.1. The Reader Sends Message
to the Cloud Server
As shown in Figure 3, assume that the reader registers to the general access point AP1 (its corresponding IP Address is IP1); it will send the message

IP packet.
Under this structure, the reader's packet can be denoted by
3.2.2. The Cloud Server Sends Message
to the Reader
Firstly, the cloud server sends the response packet
Through the above process, the location privacy of the mobile reader is protected because the cloud server cannot obtain the information which the routing packet comes from. So it provides the location privacy protection transmission for the reader to access the cloud database.
4. The Proposed Cloud-Based RFID Mutual Authentication Protocol
The location privacy mechanism provides a privacy channel for the mobile reader to the cloud server. We propose an RFID mutual authentication protocol based on the above channel.
4.1. Notations
The notations are listed in the Notations.
4.2. Initial Phase
The tag stores its identity,
4.3. The Authentication Phase
The proposed RFID mutual authentication is illustrated in Figure 5. The authentication process is as follows.

The proposed RFID mutual authentication.
(1)
The mobile reader generates a random number
(2)
The tag generates a random number
(3)
The reader stores
(4)
If
(5)
The reader decrypts
(6)
The cloud server checks
(7)
When the reader receives the ACK message, it calculates
(8) The tag extracts
5. Analysis of the Proposed Scheme
In this section, we will analyze the security and performance of the proposed protocol. We use AVISPA tool to verify the security and compare the security and performance of the proposed protocol with those of the other two cloud-based authentication protocols.
5.1. Analysis of the Security Goals
Our protocol provides mutual authentication between the tag and the reader, which achieves the following security goals.
5.2. The Formal Security Verification under the AVISPA Tool
In our analysis, we have used a formal verification tool called AVISPA (Automated Validation of Internet Security Protocols and Applications) [15]. It is considered the best suitable one for verifying security properties [16]. It provides a modular and expressive formal language for specifying protocols and their security properties and integrates different backends that implement a variety of automatic protocol analysis techniques. AVISPA requires the protocol specification to be written in HLPSL (High Level Protocol Specification Language), which is then provided as an input to the tool. User establishes a secure analysis model by inputting participant identification, operating environment, attacker's ability, and goals of the protocol.
We describe the interactive process of the proposed protocol in HLPSL and define the ability of the adversary. The specification of the proposed protocol contains three basic roles: the tag, the reader, and the cloud database. Each role contains a list of global and local variables and it defines transitions that usually describe the receipt of a message and the sending of a reply. Once roles are defined, we have added the protocol session, the environment section, and the list of declarations goals for security properties. The adversary can obtain the hash function and all the random numbers in our definition.
We verify the security of the proposed protocol and the result shows that it is safe. The HLPSL code and the result are shown in the appendix.
5.3. Security Comparisons
Security comparisons between the proposed protocol and the other schemes are listed in Table 1.
Security comparisons.
5.4. Performance and Cost Comparisons
We analyze the performance of our method in terms of tag's computation cost, tag's storage spaces, tag's communication message, the efficiency of the cloud database, and so forth. Performance comparisons between the proposed protocol and the other existing schemes are listed in Table 2.
Performance comparisons.
By analyzing and comparing these schemes in security and performance, our method not only meets the security requirements, but also has advantages in deployment cost, tag's computation cost, and the efficiency of the cloud database.
6. Conclusion
In this paper, we proposed an RFID mutual authentication protocol based on location privacy cloud. Our scheme not only protects the reader's location privacy, but also has advantages in security and performance. Compared with the existing cloud-based RFID systems, our proposed scheme is more efficient in terms of communication overhead and memory requirement while offering higher level of security. We proved that our proposed scheme is secure against the relevant attacks and also ensures a higher security level and good performance compared with the existing similar schemes. In the future work, we will expand the location privacy cloud to an RFID public access platform to provide more services.
