RFID-MA XTEA: Cost-Effective RFID-Mutual Authentication Design using XTEA Security on FPGA Platform

R. Anusha, V. Veena Devi Shastrimath


RFID systems are one of the essential technologies and used many diverse applications. The security and privacy are the primary concern in RFID systems which are overcome by using suitable authentication protocols. In this manuscript, the cost-effective RFID-Mutual Authentication (MA) using a lightweight Extended Tiny encryption algorithm (XTEA) is designed to overcome the security and privacy issues on Hardware Platform. The proposed design provides two levels of security, which includes secured Tag identification and mutual authentication.  The RFID-MA mainly has Reader and Tag along with the backend Server. It establishes the secured authentication between Tag and Reader using XTEA. The XTEA with Cipher block chaining (CBC) is incorporated in RFID for secured MA purposes. The authentication process completed based on the challenge and response between Reader and Tag using XTEA-CBC. The present work is designed using Verilog-HDL on the Xilinx environment and implemented on Artix-7 FPGA.  The simulation and synthesis results discussed with hardware constraints like Area, power, and time. The present work is compared with existing similar approaches with hardware constraints improvements.

Full Text:



A. Ibrahim and G. Dalkılıc, “Review of different classes of RFID authentication protocols”, Wireless Networks, Vol.25, No. 3, pp.961-974, 2019, DOI: 10.1007/s11276-017-1638-3

G. Hatzivasilis, K. Fysarakis, I. Papaefstathiou and C. Manifavas. "A review of lightweight block ciphers," Journal of Cryptographic Engineering, Vol. 8, No. 2, pp.141-184, 2018, https://doi.org/10.1007/s13389-017-0160-y

J. Kaur, A. Kumar, M. Bansal. "Lightweight cipher algorithms for smart cards security: A survey and open challenges", 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 541-546, 2017, DOI: 10.1109/ISPCC.2017.8269738

X. Chen, K. Ma, D. Geng, J. Zhai, W. Liu, H. Zhang, T. Zhu, and X. Piao. "Untraceable Analysis of Scalable RFID Security Protocols." Wireless Personal Communications, pp.1-21,2019, DOI: https://doi.org/10.1007/s11277-019-06650-1

M.G. Samaila, M. Neto, D. AB. Fernandes, M. M. Freire, and P. RM. Inácio. "Security challenges of the Internet of Things." Beyond the Internet of Things, pp. 53-82, 2017.

M. M-Kermani, K. Tian, R. Azarderakhsh, and S. B-Sarmadi, "Fault-resilient lightweight cryptographic block ciphers for secure embedded systems", IEEE Embedded Systems Letters, Vol. 6, No. 4, pp.89-92, 2014, DOI: 10.1109/LES.2014.2365099

Y.S. Kang, E.O. Sullivan, D. Choi, and M. O’Neill, "Security Analysis on RFID Mutual Authentication Protocol", In International Workshop on Information Security Applications, Springer, Cham, pp. 65-74, 2015, DOI: https://doi.org/10.1007/978-3-319-31875-2_6

M. Feldhofer and J. Wolkerstorfer, "Hardware implementation of symmetric algorithms for RFID security”, In RFID security, Springer, Boston, MA, pp. 373-415, 2008, DOI: https://doi.org/10.1007/978-0-387-76481-8_15

B. Toiruul and K.O. Lee, “An advanced mutual-authentication algorithm using AES for RFID systems”, International Journal of Computer Science and Network Security, Vol. 6, No. 9B, pp.156-162, 2006

M. Feldhofer, S. Dominikus and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm”, In International Workshop on Cryptographic Hardware and Embedded Systems, Springer, Berlin, Heidelberg, pp. 357-370, 2004.

R. Baashirah, A. Kommareddy, S. K. Batchu, V. Sunku, R. S. Ginjupalli, and S. Abuzneid”, Security implementation using present-puffin protocol in RFID devices”, In IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1-5, 2018, DOI: 10.1109/LISAT.2018.8378024

N. Dinarvand and H. Barati, “An efficient and secure RFID authentication protocol using elliptic curve cryptography”, Wireless Networks, Vol. 25, No. 1, pp.415-428, 2019, DOI: https://doi.org/10.1007/s11276-017-1565-3

J. Kang, “Lightweight mutual authentication RFID protocol for secure multi-tag simultaneous authentication in ubiquitous environments”, The Journal of Supercomputing, Vol. 75, No. 8, pp. 4529-4542, 2019, DOI: https://doi.org/10.1007/s11227-016-1788-6

J. Yu, G. Khan, and F. Yuan, “XTEA encryption based novel RFID security protocol”, In 24th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 000058-000062, 2011, DOI: 10.1109/CCECE.2011.6030408

G.N. Khan, X. Yu, and F. Yuan, "A novel XTEA based authentication protocol for RFID systems." In URSI General Assembly and Scientific Symposium, pp. 1-4, 2011, DOI: 10.1109/URSIGASS.2011.6050584

G.N. Khan and G. Zhu, “Secure RFID authentication protocol with key updating technique”, In22nd International Conference on Computer Communication and Networks (ICCCN), pp. 1-5, 2013, DOI: 10.1109/ICCCN.2013.6614192

G. Zhu and G. N. Khan, “Symmetric key based RFID authentication protocol with a secure key-updating scheme”, In 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1-5, 2013, DOI: 10.1109/CCECE.2013.6567741

G.N. Khan and M. Moessner, "Low-cost authentication protocol for passive, computation capable RFID tags”, Wireless Networks, Vol. 21, No. 2, pp. 565-580, 2015, DOI: https://doi.org/10.1007/s11276-014-0803-1

S. Seshabhattar, S. K. Jagannatha, and D. W. Engels, "Security

implementation within GEN2 protocol”, In IEEE International Conference on RFID-Technologies and Applications, pp. 402-407, 2011, DOI: 10.1109/RFID-TA.2011.6068669

M. Saxena, R. N. Shaw, and J.K. Verma. "A Novel Hash-Based Mutual RFID Tag Authentication Protocol", In Data and Communication Networks, pp. 1-12, 2019, DOI: https://doi.org/10.1007/978-981-13-2254-9_1

K. Zang, H. Xu, F. Zhu, and P. Li, “Analysis and Design of Group RFID Tag Security Authentication Protocol", In Conference on Complex, Intelligent, and Software Intensive Systems, Springer, Cham, pp. 637-645, 2019, DOI: https://doi.org/10.1007/978-3-030-22354-0_57

F. Zhu, P. Li, H. Xu, and R. Wang, “A Lightweight RFID Mutual Authentication Protocol with PUF”, Sensor, Vol. 19, No. 13, pp. 2957, 2019, DOI: 10.3390/s19132957.

R. Jain , K. G. Maradiab, "Comparative Analysis of SEA and XTEA for Resource Constrained Embedded Systems," International Journal of Innovative and Emerging Research in Engineering, Vol. 3 No.4, pp. 78-82, 2016

R. Anusha and V.V. D.Shastrimath "LCBC-XTEA: High Throughput Lightweight Cryptographic Block Cipher Model for Low-Cost RFID Systems", In Computer Science On-line Conference, Springer, Cham, pp. 185-196, 2019, DOI: https://doi.org/10.1007/978-3-030-19813-8_20


  • There are currently no refbacks.

International Journal of Electronics and Telecommunications
is a periodical of Electronics and Telecommunications Committee
of Polish Academy of Sciences

eISSN: 2300-1933