PUF-enhanced offline RFID security and privacy

被引:49
|
作者
Kardas, Suleyman [1 ,2 ]
Celik, Serkan [1 ,2 ]
Yildiz, Muhammet [1 ,2 ]
Levi, Albert [2 ]
机构
[1] TUBITAK BILGEM UEKAE, Kocaeli, Turkey
[2] Sabanci Univ, Fac Engn & Nat Sci, Istanbul, Turkey
关键词
RFID; PUF; Security; Privacy; Compromise of reader; AUTHENTICATION;
D O I
10.1016/j.jnca.2012.08.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
RFID (Radio Frequency IDentification) based communication solutions have been widely used nowadays for mobile environments such as access control for secure system, ticketing systems for transportation. and sport events. These systems usually depend on readers that are not continuously connected to a secure backend system. Thus, the readers should be able to perform their duties even in offline mode, which generally requires the management by the readers of the susceptible data. The use of RFID may cause several security and privacy issues such as traceability of tag owner, malicious eavesdropping and cloning of tags. Besides, when a reader is compromised by an adversary, the solution to resolve these issues getting worse. In order to handle these issues, several RFID authentication protocols have been recently proposed: but almost none of them provide strong privacy for the tag owner. On the other hand, several frameworks have been proposed to analyze the security and privacy but none of them consider offline RFID system. Motivated by this need, in this paper, we first revisit Vaudenay's model, extend it by considering offline RFID system and introduce the notion of compromise reader attacks. Then, we propose an efficient RFID mutual authentication protocol. Our protocol is based on the use of physically unclonable functions (PUFs) which provide cost-efficient means to the fingerprint chips based on their physical properties. We prove that our protocol provides destructive privacy for tag owner even against reader attacks. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2059 / 2067
页数:9
相关论文
共 50 条
  • [1] Proxy framework for enhanced RFID security and privacy
    Dimitriou, Tassos
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 843 - 847
  • [2] Practical Schemes for Privacy and Security Enhanced RFID
    Hoepman, Jaap-Henk
    Joosten, Rieks
    INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 138 - 153
  • [3] A RFID Privacy Protocol Based on PUF
    Xie Yumin
    MATERIALS, MECHATRONICS AND AUTOMATION, PTS 1-3, 2011, 467-469 : 554 - 560
  • [4] RFID Security and Privacy
    1600, Morgan and Claypool Publishers (04):
  • [5] PUF Protected Variables: A Solution to RFID Security and Privacy Under Corruption With Temporary State Disclosure
    Tiplea, Ferucio Laurentiu
    Hristea, Cristian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 999 - 1013
  • [6] Privacy and security enhanced offline oblivious transfer for massive data distribution
    Lee, Ickjai
    Ghodosi, Hossein
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 159 - 160
  • [7] Privacy Enhanced Authentication Protocol for RFID Tag System Security
    Yeo, Sang-Soo
    Kwak, Jin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 1 - 6
  • [8] Privacy Model for Threshold RFID System Based on PUF
    Sonam Devgan Kaul
    Amit K. Awasthi
    Wireless Personal Communications, 2017, 95 : 2803 - 2828
  • [9] Privacy Model for Threshold RFID System Based on PUF
    Kaul, Sonam Devgan
    Awasthi, Amit K.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 2803 - 2828
  • [10] A Study on Security and Privacy in RFID
    Zarmehi, Sadegh
    Elyasi, Iman
    Kowsar, Zohreh
    2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), 2012, : 22 - 25