High-efficient RFID Authentication Protocol Based on Physical Unclonable Function

被引:0
作者
He, ZhangQing [1 ]
Zou, Ling [1 ]
机构
[1] Hubei Univ Technol, Sch Elect & Elect Engn, Wuhan, Peoples R China
来源
2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM) | 2012年
关键词
Radio Frequency Identification; authentication protocol; Physical Unclonable Functions; Linear Feedback Shift Register;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID(Radio Frequency Identification) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised many privacy and security concerns. Known privacy and security cryptographic defenses are too hardware-expensive to incorporate into low-cost RFID tags. This paper presents a low-cost and efficiency security protocol based on Physical Unclonable Functions(PUF), which solved the problems of existing security authentication protocol and can resist eavesdropping attack, replay attack, physical attack and tracking attack, with forward-security and backward-security.
引用
收藏
页数:4
相关论文
共 10 条
  • [1] SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    Chien, Hung-Yu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 337 - 340
  • [2] [丁振华 Ding Zhenhua], 2009, [计算机研究与发展, Journal of Computer Research and Development], V46, P583
  • [3] Feldhofer M, 2004, LECT NOTES COMPUT SC, V3156, P357
  • [4] Gassend B, 2002, P COMP COMM SEC C LA
  • [5] Juels A, 2005, LECT NOTES COMPUT SC, V3621, P293
  • [6] Karygiannis T., 2007, Guidelines for Securing Radio Frequency Identification 'Special Publication 800-98 NIST
  • [7] Ruhrmair U., 2010, P 17 ACM C COMP COMM
  • [8] Physical unclonable functions for device authentication and secret key generation
    Suh, G. Edward
    Devadas, Srinivas
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 9 - +
  • [9] Yuksel K., 2004, Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications
  • [10] Zhou Yong-Bin, 2006, Chinese Journal of Computers, V29, P581