A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning

被引:47
|
作者
Liang, Wei [1 ]
Xie, Songyou [1 ]
Zhang, Dafang [1 ]
Li, Xiong [2 ]
Li, Kuan-ching [3 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Inst Cyber Secur, Chengdu 611731, Peoples R China
[3] Providence Univ, Dept Comp Sci & Informat Engn CSIE, Taichung, Taiwan
基金
中国国家自然科学基金;
关键词
Industrial internet of things (IIoT); arbiter physical unclonable function (APUF); deep learning (DL); radio frequency identification (RFID); SMART CARD; PROTOCOL; INTERNET; SCHEME;
D O I
10.1145/3426968
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) is designed to refine and optimize the process controls, thereby leveraging improvements in economic benefits, such as efficiency arid productivity. However, the Radio Frequency Identification (RFID) technology in an IIoT environment has problems such as low security and high cost. To overcome such issues, a mutual authentication scheme that is suitable for RFID systems, wherein techniques in Deep Learning (DL) are incorporated onto the Arbiter Physical Unclonable Function (APUF) for the secured access authentication of the IC circuits on the IoT, is proposed. The design applies the APUF-MPUF mutual authentication structure obtained by DL to generate essential real-time authentication information, thereby taking advantage of the feature that the tag in the PUF circuit structure does not need to store any essential information and resolving the problem of key storage. The proposed scheme also uses a bitwise comparison method, which hides the PUF response information and effectively reduces the resource overhead of the system during the verification process, to verify the correctness of the two strings. Security analysis demonstrates that the proposed scheme has high robustness and security against different conventional attack methods, and the storage and communication costs are 95.7% and 42.0% lower than the existing schemes, respectively.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] An Improved Security Authentication Protocol for Lightweight RFID Based on ECC
    Wei, Guo-heng
    Qin, Yan-lin
    Fu, Wei
    JOURNAL OF SENSORS, 2022, 2022
  • [32] Trust and Security in RFID-Based Product Authentication Systems
    Lehtonen, Mikko O.
    Michahelles, Florian
    Fleisch, Elgar
    IEEE SYSTEMS JOURNAL, 2007, 1 (02): : 129 - 144
  • [33] RFID security authentication protocol based on key update mechanism
    Wei, Ruidong
    Jiang, Lei
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1395 - 1401
  • [34] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
    Akram, Muhammad Arslan
    Mian, Adnan Noor
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (02) : 1881 - 1894
  • [35] On the Security of a Mutual Authentication and Key Agreement Protocol based on Chaotic Maps
    Chen, Chien-Ming
    Xu, Linlin
    Zhang, Xiaojie
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2015, : 143 - 146
  • [36] A New PUF-Based Protocol for Mutual Authentication and Key Agreement Between Three Layers of Entities in Cloud-Based IoMT Networks
    Modarres, Amir Masoud Aminian
    Anzabi-Nezhad, Nima S.
    Zare, Maryam
    IEEE ACCESS, 2024, 12 : 21807 - 21824
  • [37] A security enhanced mutual authentication scheme based on nonce and smart cards
    Shi, Wenbo
    He, Debiao
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2014, 37 (08) : 1090 - 1095
  • [38] On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks
    Fatima, Sumbal
    Akram, Muhammad Arslan
    Mian, Adnan Noor
    Kumari, Saru
    Chen, Chien-Ming
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 136 (02) : 1079 - 1106
  • [40] A quadratic residue-based RFID authentication protocol with enhanced security for TMIS
    Zhou, Zhiping
    Wang, Ping
    Li, Zhicong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (09) : 3603 - 3615