PUF-enhanced offline RFID security and privacy

被引:49
作者
Kardas, Suleyman [1 ,2 ]
Celik, Serkan [1 ,2 ]
Yildiz, Muhammet [1 ,2 ]
Levi, Albert [2 ]
机构
[1] TUBITAK BILGEM UEKAE, Kocaeli, Turkey
[2] Sabanci Univ, Fac Engn & Nat Sci, Istanbul, Turkey
关键词
RFID; PUF; Security; Privacy; Compromise of reader; AUTHENTICATION;
D O I
10.1016/j.jnca.2012.08.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
RFID (Radio Frequency IDentification) based communication solutions have been widely used nowadays for mobile environments such as access control for secure system, ticketing systems for transportation. and sport events. These systems usually depend on readers that are not continuously connected to a secure backend system. Thus, the readers should be able to perform their duties even in offline mode, which generally requires the management by the readers of the susceptible data. The use of RFID may cause several security and privacy issues such as traceability of tag owner, malicious eavesdropping and cloning of tags. Besides, when a reader is compromised by an adversary, the solution to resolve these issues getting worse. In order to handle these issues, several RFID authentication protocols have been recently proposed: but almost none of them provide strong privacy for the tag owner. On the other hand, several frameworks have been proposed to analyze the security and privacy but none of them consider offline RFID system. Motivated by this need, in this paper, we first revisit Vaudenay's model, extend it by considering offline RFID system and introduce the notion of compromise reader attacks. Then, we propose an efficient RFID mutual authentication protocol. Our protocol is based on the use of physically unclonable functions (PUFs) which provide cost-efficient means to the fingerprint chips based on their physical properties. We prove that our protocol provides destructive privacy for tag owner even against reader attacks. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2059 / 2067
页数:9
相关论文
共 38 条
[1]  
[Anonymous], 2006, SECURECOMM
[2]  
[Anonymous], 2005, ARCH CITESEER
[3]  
[Anonymous], 2008, P 2008 ACM S INFORM
[4]  
[Anonymous], 2010, 2010405 CRYPT EPRINT
[5]  
Avoine G., 2012, P 5 ACM C SEC PRIV W, P63
[6]  
Avoine G, 2009, LECT NOTES COMPUT SC, V5932, P36, DOI 10.1007/978-3-642-10838-9_4
[7]  
Baudron O, 2001, GPS ASYMMETRIC IDENT
[8]  
Deng RH, 2010, LECT NOTES COMPUT SC, V6345, P1, DOI 10.1007/978-3-642-15497-3_1
[9]   Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications [J].
Devadas, Srinivas ;
Suh, Edward ;
Paral, Sid ;
Sowell, Richard ;
Ziola, Tom ;
Khandelwal, Vivek .
2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, :58-+
[10]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139