Lightweight RFID Authentication Protocol for Cloud Services using PUF Encryption

被引:2
作者
Ye Qiao [1 ]
Sun ZiWen [1 ,2 ]
机构
[1] Jiangnan Univ, Sch Internet Things, Wuxi 214122, Jiangsu, Peoples R China
[2] Minist Educ, Engn Res Ctr Internet Things Technol Applicat, Wuxi 214122, Jiangsu, Peoples R China
来源
PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021) | 2021年
关键词
Radio Frequency Identification (RFID); authentication protocol; Physically Unclonable Function (PUF); lightweight; cloud services; CRYPTOGRAPHY; PRIVACY;
D O I
10.1109/CCDC52312.2021.9602061
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To solve the problem that the existing Radio Frequency Identification (RFID) system authentication protocol is not suitable for large-scale RFID tag system, a lightweight RFID Security Authentication Protocol Based on cloud server is studied. Using physical unclonable function (PUF), permutation, string matching and other lightweight encryption algorithms to reduce hardware resource consumption. Add timestamp data to authentication information transmitted in wireless channel to ensure the freshness of authentication information. Use double index mechanism for data access in cloud server to prevent the system from asynchronous attack. BAN logic detection is used to prove the untraceable privacy security. Security analysis shows that the proposed protocol can effectively resist multiple attacks. Comparative analysis shows that the resource consumption and security performance of this protocol are better than those of the compared RFID authentication protocols.
引用
收藏
页码:5629 / 5634
页数:6
相关论文
共 20 条
[1]  
Abughazalah S., 2015, DATA PRIVACY MANAGEM, P47
[2]   Implementing public-key cryptography on passive RFID tags is practical [J].
Arbit, Alex ;
Livne, Yoel ;
Oren, Yossef ;
Wool, Avishai .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) :85-99
[3]   RFID tag search protocol preserving privacy of mobile reader holders [J].
Chuna, Ji Young ;
Hwang, Jung Yeon ;
Lee, Dong Hoon .
IEICE ELECTRONICS EXPRESS, 2011, 8 (02) :50-56
[4]   User behavior-based resource scheduling mechanism for cloud computing with feedback control [J].
Ding D. ;
Ai L. ;
Luo S. ;
Xu B. .
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2018, 40 (01) :209-216
[5]   Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV [J].
Fan, Kai ;
Jiang, Wei ;
Luo, Qi ;
Li, Hui ;
Yang, Yintang .
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (01) :193-209
[6]   RFID privacy: An overview of problems and proposed solutions [J].
Garfinkel, SL ;
Juels, A ;
Pappu, R .
IEEE SECURITY & PRIVACY, 2005, 3 (03) :34-43
[7]   Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments [J].
Hoque, Md. Endadul ;
Rahman, Farzana ;
Ahamed, Sheikh I. ;
Park, Jong Hyuk .
WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) :65-79
[8]   Server-less RFID authentication and searching protocol with enhanced security [J].
Lee, Chin-Feng ;
Chien, Hung-Yu ;
Laih, Chi-Sung .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (03) :376-385
[9]   A double PUF-based RFID identity authentication protocol in service-centric internet of things environments [J].
Liang, Wei ;
Xie, Songyou ;
Long, Jing ;
Li, Kuan-Ching ;
Zhang, Dafang ;
Li, Keqin .
INFORMATION SCIENCES, 2019, 503 (129-147) :129-147
[10]   Lightweight Cryptography for Embedded Systems - A Comparative Analysis [J].
Manifavas, Charalampos ;
Hatzivasilis, George ;
Fysarakis, Konstantinos ;
Rantos, Konstantinos .
DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 :333-349