A provably secure authentication scheme for RFID-enabled UAV applications

被引:40
作者
Gope, Prosanta [1 ]
Millwood, Owen [1 ]
Saxena, Neetesh [2 ]
机构
[1] Univ Sheffield, Dept Comp Sci, 211 Portobello, Sheffield S1 4DP, S Yorkshire, England
[2] Cardiff Univ, Sch Comp Sci & Informat, Cardiff, Wales
关键词
Unmanned aerial vehicle; PHysically Uncloneable Functions; Fuzzy extractor; Realistic anonymous authentication; FUZZY EXTRACTORS;
D O I
10.1016/j.comcom.2020.11.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advantages of Physically Uncloneable Functions (PUFs) have led to appearing a substantial number of novel identification and authentication based systems such as Radio frequency identification (RFID), which is expected to replace the conventional bar-code identification system due to its advantages such as real-time recognition of a considerable number of objects. For example, RFID can be used to identify an unmanned aerial vehicle (UAV) when it is attached with a tag. In this article, we propose a novel anonymous authentication scheme for RFID-enabled UAV applications using Physically Unclonable Functions. Security and the performance analyses demonstrate that our proposed scheme is secure and efficient. Hence, it can be useful for several RFID-based secure application systems.
引用
收藏
页码:19 / 25
页数:7
相关论文
共 28 条
[1]  
Akgun M., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P473, DOI 10.1109/ARES.2011.73
[2]  
[Anonymous], 2001, THESIS MIT
[3]  
Aysu A., 2015, LNCS, V9293, P555
[4]  
Banks J, 2007, RFID APPLIED, P1, DOI 10.1002/9780470168226
[5]  
Bösch C, 2008, LECT NOTES COMPUT SC, V5154, P181, DOI 10.1007/978-3-540-85053-3_12
[6]  
Bringer J, 2008, LECT NOTES COMPUT SC, V5229, P77, DOI 10.1007/978-3-540-85855-3_6
[7]   Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications [J].
Delvaux, Jeroen ;
Gu, Dawu ;
Verbauwhede, Ingrid ;
Hiller, Matthias ;
Yu, Meng-Day .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 :412-431
[8]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[9]  
Dodis Y, 2006, LECT NOTES COMPUT SC, V4117, P232
[10]   An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones [J].
Gope, Prosanta ;
Sikdar, Biplab .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) :13621-13630