Abstract
Introduction
Radio frequency identification (RFID) is one of the key technologies for Internet of Things (IoT), 1 which has the powerful capabilities in automatic identification, localization, and access control of the objects; 2 thus, RFID-based technologies have been widely used in various daily applications such as payment, access control, ticketing, and e-passport that require strong security and privacy mechanisms. 3 The integration of RFID technology and wireless communication technology makes it superior to the bar code technology. However, the data privacy and the user’s information privacy problems are very serious.
A typical RFID system is composed of a back-end database, readers, and tags. 4 The reader activates the tag by sending the RF signals, communicates with it in a noncontact way, and submits the relevant data to the back-end database. 5 The primary function of the security protocols is identification and authentication which are related to the privacy and security of RFID systems. 6 It is usually assumed that the channel between the back-end database and reader is secure. 7 However, this assumption brings many problems. First, it limits the reader’s mobility, because the back-end server and the reader are wired connected. Second, the computing and storage capability of the back-end database have become a big bottleneck, 8 because the RFID system needs to identify a growing number of objects. Cloud computing emerges as a new computing paradigm that aims to provide reliable, customized, and quality of service guaranteed computation environments for cloud users. 9 With the development of the cloud computing and cloud storage, users can easily access the “virtual” resources stored in cloud server; RFID systems can benefit from cloud databases when thousands of tags are queried at the same time. 10 Users can easily construct their application systems by renting the cloud database, which can also reduce the costs of deployment and maintenance of back-end database. In recent years, the combination of cloud server and RFID technology has become a research focus. C Dabas and JP Gupta 11 designed a cloud computing architecture framework for scalable RFID, Chen et al. 10 proposed an RFID system with a cloud database as a back-end server, and Zhang et al. 12 proposed an efficient RFID search protocol based on clouds.
At present, there are several schemes about cloud-based RFID.5,13–15 However, the cloud server providers are not trusted, and the tag’s data suffer from the privacy invasion. 16 The cloud-based RFID system faces more serious security threats than the traditional one with a back-end database. Therefore, the traditional RFID authentication scheme is no longer suitable for the cloud environment. 8 In cloud-based RFID systems, the connection between the reader and the cloud database is not secure and cloud service provider is not trusted. To solve these problems, W Xie et al. 13 proposed a cloud-based RFID authentication protocol and introduced a virtual private network (VPN) agency to ensure the secure connection between the reader and cloud database. Lin et al. 14 proposed a cloud-based authentication protocol for RFID supply chain systems; a trusted third party is introduced to solve the problems of data sharing among enterprises and authority transfer of tags. Dong et al. 15 proposed a cloud-based RFID mutual authentication; it provides real-time mutual authentication between the reader and the tag and protects the reader’s location privacy by introducing the location privacy cloud. In all the above schemes, the computational complexity of the tag is high and most of them do not protect the reader’s location privacy.
In this article, a cloud-based lightweight RFID authentication protocol is proposed. The protocol is designed based on the hash function, and it considers not only the mutual authentication between the reader and the tag, but also the security of data transmission between the reader and the cloud database. In order to solve the reader’s location privacy problem, our scheme introduces MIPv6 network framework without adding additional infrastructure. AVISPA tool is used to analyze the security of the proposed protocol. Compared with other several cloud-based schemes, the proposed protocol has obvious advantages in deployment cost, scalability, real-time authentication, and the tag’s computational complexity.
The rest of the article is organized as follows: In section “Related work,” several available cloud-based RFID authentication schemes are briefly reviewed; in section “The authentication framework,” the authentication framework is described; In section “Cloud-based RFID mutual authentication protocol,” cloud-based RFID mutual authentication protocol is proposed; in section “Analysis of the proposed scheme,” the security of the proposed protocol is analyzed, and the security and performance are compared with other schemes; section “Conclusion” concludes the article.
Related work
The related schemes
In this section, we will briefly review the cloud-based RFID authentication schemes and point out some disadvantages of them. Usually, the cloud-based RFID system is composed of a cloud server (cloud database), readers, and tags, where the reader is able to move and the RFID data are stored in the cloud database. Up to now, there are several authentication schemes of cloud-based RFID systems.
In 2013, W Xie et al. 13 proposed the first cloud-based RFID authentication scheme. In their scheme, the RFID system is mainly composed of tag, reader, VPN agency, and cloud database; the VPN agency provides a secure link for the communication between the cloud server and the reader, which can protect the reader’s location privacy. The cloud database in the scheme stores an EHT (encrypted hash table) that is used to protect the tag’s identity secret value. But this scheme also has some problems, such as the deployment and maintenance costs of the VPN agency are high that is not suitable for small and medium-sized enterprises, if the VPN agency is maintained by a third party, it may leak reader’s location privacy; the session initiator is the tag, if there is a malicious tag sends authentication request persistently, that’s will cause the denial of service attack on the cloud database.
In 2014, Lin et al.
14
proposed a cloud-based authentication protocol for RFID supply chain systems which is composed of tag, reader, trust party, cloud database. The scheme includes authentication phase, ownership transfer, authority recovery, and data sharing. The trust party is mainly to solve the problem of data sharing among enterprises and ownership transfer of the tag, the back-end database in the scheme stores the tag’s identity information encrypted with reader’s key, so as to ensure the security of data. However, the scheme neither provides mutual authentication between the tag and the reader, nor solves the reader’s location privacy issue. The key update only uses simple XOR operation:
In 2015, Dong et al. 15 proposed an RFID mutual authentication protocol based on location privacy cloud; this system is composed of tags, readers and a cloud server and introduces a public access platform: location privacy cloud. The mutual information between the mobile reader and the cloud server is forwarded via location privacy cloud, the IP address of mobile reader is encrypted when sent to the cloud server, so the cloud server cannot ensure where the data packet comes from, thus the scheme protects the location privacy of the mobile reader. But the scheme needs the support of the public infrastructure, which is not very simple.
In 2017, Xiao et al. 5 proposed a cloud-based RFID authentication protocol with insecure communication channels; the protocol protects the data transmission between the reader and the cloud server without any help from a third party and preserves tag privacy even when the tag does not update its identification. B Surekha et al. 17 proposed a realistic lightweight authentication protocol for securing cloud-based RFID system. The location privacy of the reader in the two protocols is not protected.
In this article, the proposed scheme does not require any additional devices; the MIPv6 protocol is used to protect the location privacy of the mobile reader.
The attacker model
The attacker model in this article is described in the following two aspects:
A detailed discussion on the assumptions of each of the entities. The cloud server can provide the right storage and query services; it is honest but curious. It cannot perform active attacks, but it can view users’ privacy data, so the cloud server can perform passive attacks. The structure of the cloud server is managed by cloud provider; in this article, it is regarded as a logical server. The reader belongs to the user; it is trusted. For the symmetric encryption and hash function, it can provide enough computing support and does not have resource constraints. The reader trusts that the cloud server can provide the right storage and query services; the cloud server trusts that the reader can provide the right calculation. The communication channel between the reader and the cloud server is not secure. The communication channel between the reader and the tag is not secure.
A discussion of the capabilities of the adversary The adversary can intercept any interaction information between the communication entities. The adversary can receive messages from any other entity sent to the communication channel. The adversary cannot obtain the shared authentication key between a reader and the cloud server by any means. The attacker cannot calculate or guess the random number that the entity will use.
The authentication framework
In this section, we will give the authentication framework. This framework can protect the location privacy of the mobile reader.
System components
Tag: the tag needs to store its identity
Reader: the reader needs to store its identity
When the user purchases the cloud service from the cloud service provider, he registers related information, such as the users’ normal identity information, the binding information of the user and the reader. To ensure the security of the protocol, readers need to update the key
3. Cloud server: the cloud server needs to provide the service of on-demand computing and storing, stores
4. MIPv6: this system is based on the MIPv6 protocol, a basic wireless network protocol standard, 18 which has excellent mobility support. In MIPv6 network, mobile node (MN, such as mobile reader) has a permanent home address (HoA) and a temporary care-of address (CoA) in foreign link, correspondent node (CN, such as cloud server) is a node which can communicate with MN, and home agent (HA) is a router located in home network. Access router is responsible for the external communication of IPv6 nodes in the access network. A MN can use a stateful or stateless address auto-configuration protocol to obtain a CoA. We assume that the network transmission between mobile readers and the cloud database is based on MIPv6 protocol.
The authentication framework is illustrated in Figure 1.

The authentication framework.
The location privacy protection mechanism
Once a user has purchased the cloud service, the cloud server will authorize each of his mobile readers and negotiate an authentication key
In MIPv6 protocol, MN and CN have two communication modes, bi-directional tunnel mode and routing optimization mode, in order to protect the location privacy of the mobile reader; in this article, we use the first one. In this mode, the CN does not need to support MIPv6; the packet from CN is routed to the HA and sent to the MN though the tunnel. The packet from MN is sent to the HA and then routed to the CN. The tunnel is implemented using the IPv6 package.
The RFID system works in the MIPv6 network environment. The mobile reader communicates with the cloud server with the help of the HA and the tunnel. In the following, we will describe the process of the tunnel establishment and the message transmission:
When the mobile reader receives a route announcement sent from foreign network, it can determine whether it has been moved to foreign network. If does, the mobile reader gets a CoA in the foreign network.
The mobile reader sends a binding update message to the HA to register the new CoA.
After the HA receives the bind and update message, it binds the reader’s CoA with its HoA and registers the CoA, then returns a binding confirmation message, then it finishes the home registration process. Thus, a tunnel between the HA and the reader is established.
It should be noted that MIPv6 provides “dynamic HA address discovery” mechanism, allows mobile reader to dynamically discover the existing IP address of the home link, thus ensures it to register its CoA.
The message transmission between the reader and the cloud server
The message transmission between the mobile reader and the cloud server is shown as follows:
The reader sends packet to the cloud server
The packet from reader to HA includes the following contents: (The structure of the packet is shown in Figure 2.)
The outer IPv6 header: in the outer IPv6 header, the source address is the CoA of mobile reader; the destination address is IP address of the HA
The inner IPv6 header: in the inner IPv6 header, the source address is the HoA of mobile reader; the destination address is
The upper layer of protocol data unit (PDU): PDU contains application layer data sent from mobile reader to cloud server.

IP packet 1.
After the HA receives the packet from mobile reader, it forwards the packet to cloud server. The packet includes: (The structure of the packet is shown in Figure 3.)
IPv6 basic header: in the IPv6 basic header, the source address is the HoA of mobile reader; the destination address is
The upper layer of PDU: PDU contains application layer data sent from mobile reader to cloud server.
2. The cloud server sends packet to the reader.
The packet includes the following contents: (The structure of the packet is shown in Figure 3.)
IPv6 basic header: in the IPv6 basic header, the source address is
The upper layer of PDU: PDU contains application layer data sent from cloud server to mobile reader.

IP packet 2.
The HA intercepts the packet sent to the HoA of the mobile reader by the neighbor discovery mechanism, then finds the binding cache according to the IP destination address, and acquires the CoA registered by mobile reader, then sends the packet to the CoA of mobile reader though the tunnel. The packet includes: (The structure of the packet is shown in Figure 2.)
The outer IPv6 header: in the outer IPv6 header, the source address is
The inner IPv6 header: in the inner IPv6 header, the source address is
The upper layer of PDU: PDU contains application layer data sent from cloud server to mobile reader.
Through the above process, the cloud server cannot know the CoA of the reader; thus, the location privacy of the mobile reader is protected that is invisible to the following authentication protocol.
Cloud-based RFID mutual authentication protocol
The MIPv6 network framework can protect the reader’s location privacy in the cloud environment. In the section, we propose an RFID mutual authentication protocol based on this framework.
Notations
The notations used in this article are defined in Table 1.
Notations definition.
Initialization
The tags store their own identity
The cloud server stores
The reader stores its identity
The authentication protocol
The proposed protocol is not a traditional three-party protocol, in the authentication phase, the cloud server is only responsible for storing and searching the RFID data, the authentication is between tag and reader.
As shown in Figure 4, the cloud-based RFID mutual authentication protocol is as follows:
The mobile reader generates a random number
2.
After receiving
3.
The reader stores the messages
4.
The cloud server searches
There is no matching hash value, the authentication is failed, and then the protocol stops.
If the cloud server finds
If the cloud server finds
5.
The reader uses
The reader computes
6.
The cloud server checks
7.
When the reader receives the
8. The tag computes

Cloud-based RFID mutual authentication protocol.
Analysis of the proposed scheme
In this section, we will analyze the security and performance of the proposed protocol. We use AVISPA tool to verify the security and compare the security and performance of the proposed protocol with several other cloud-based authentication protocols.
Analysis of the security goals
The proposed RFID authentication scheme not only achieves mutual authentication between the reader and the tag, but also meets the following security goals:
Tag tracking
In each time of the authentication, the reader and tag generate random numbers
Mutual authentication
Mutual authentication means that the reader and the tag could authenticate each other in the execution of the authentication. In the proposed scheme, the reader authenticates the tag by checking the correctness of
Forward security
Forward security means that even if the adversary can decrypt the key in the current session, he cannot calculate the messages of the previous session according to the key. In the proposed protocol, since the use of random number
Location privacy of the reader
The proposed scheme introduces the MIPv6 network framework; the communication messages between the reader and the cloud server all need to be forwarded via the HA; the cloud server cannot know the real direction of the message; thus, the location privacy of the reader is protected.
Replay attack
Having intercepted previous communication, the attacker can replay the same message of the receiver or the sender to pass the verification of the system. In the proposed protocol, both the tag and the reader generate random numbers; in each session, the random numbers and the tag’s secret key are different, and there is no regular pattern to follow for the attacker, so the replay attack will fail.
The desynchronization attack
The desynchronization attack means that the attacker uses some methods, such as interdicting the last message, to make the back-end server and the valid tags share the different secrets.
19
In the proposed protocol, the cloud server updates the secret key earlier than the tag. If the attacker hampers the message sent from the reader to the tag, then the cloud server finishes the update but the tag does not. However, since the cloud server stores
Denial of service attack
The malicious adversary continues to send request, which consumes the resources of link and server, to achieve the purpose of the denial of service. In the proposed protocol, the initiator of the protocol is the reader, and the reader shares authentication key
The formal security verification with the AVISPA tool
In this section, we use a formal verification tool called AVISPA to analyze the proposed protocol. It provides a modular and expressive formal language for specifying protocols and their security properties and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability. 20 AVISPA uses HLPSL (High-Level Protocol Specification Language), the user establishes a secure analysis model by inputting participant identification, operating environment, attacker’s ability, and goals of the protocol.
In this article, we use HLPSL to describe the interactive process of the proposed protocol and define the attacker’s abilities. The participants of the protocol contain three basic roles: the tag, the reader, and the cloud database; each role contains some definitions of variables and functions. The attacker can obtain hash functions and random numbers of the whole process. The HLPSL language description of the protocol is shown in Figure 5. The interactive process of the protocol is shown in Figure 6.

The HLPSL language description of the protocol.

The interactive process of the protocol.
The operation result of the AVISPA is shown in Figure 7, which indicates that the proposed protocol is secure. The complete HLPSL codes are shown in Appendix 1.

The operation result of the AVISPA.
Security comparisons
Security comparisons between the proposed protocol and several other schemes are listed in Table 2.
Security comparisons.
Performance comparisons
Performance comparison between the proposed protocol and several other schemes is listed in Table 3.
Performance comparisons.
The security and performance comparisons show that the proposed protocol satisfies the security requirements and has advantages in tag’s computation cost and deployment cost.
Conclusion
In this article, we proposed an cloud-based RFID mutual authentication protocol, the protocol introduces MIPv6 network framework without adding additional infrastructure, it not only protects the location privacy of the mobile reader, but also realizes the mutual authentication between the tag and the reader, meanwhile, meets the security features of untraceability, forward security, and so on. We also used the AVISPA tool to verify the security of the protocol. Finally, compared with several cloud-based RFID protocols, this protocol has higher security and better performance. In future work, we will continue to improve the performance of cloud-based RFID authentication protocol.
