A Lightweight RFID Mutual Authentication Protocol with PUF

被引:36
作者
Zhu, Feng [1 ,2 ]
Li, Peng [1 ,2 ]
Xu, He [1 ,2 ]
Wang, Ruchuan [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Jiangsu, Peoples R China
[2] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
基金
国家重点研发计划;
关键词
lightweight; radio frequency identification; authentication; physical unclonable function; security; privacy; SMART CARD; SECURITY; CRYPTOGRAPHY; SCHEME; SYSTEMS; SASI; TAGS;
D O I
10.3390/s19132957
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers. To solve these issues, lots of authentication protocols are proposed based on physical unclonable functions that can ensure an anti-counterfeiting feature. However, most of the existing schemes require secret parameters to be stored in tags, which are vulnerable to physical attacks that can further lead to the breach of forward secrecy. Furthermore, as far as we know, none of the existing schemes are able to solve the security and privacy problems with good scalability. Since many existing schemes rely on exhaustive searches of the backend server to validate a tag and they are not scalable for applications with a large scale database. Hence, in this paper, we propose a lightweight RFID mutual authentication protocol with physically unclonable functions (PUFs). The performance analysis shows that our proposed scheme can ensure security and privacy efficiently in a scalable way.
引用
收藏
页数:22
相关论文
共 53 条
[1]   Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce [J].
Aghili, Seyed Farhad ;
Mala, Hamid .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (03)
[2]   Providing destructive privacy and scalability in RFID systems using PUFs [J].
Akgun, Mete ;
Caglayan, M. Ufuk .
AD HOC NETWORKS, 2015, 32 :32-42
[3]   Implementing public-key cryptography on passive RFID tags is practical [J].
Arbit, Alex ;
Livne, Yoel ;
Oren, Yossef ;
Wool, Avishai .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) :85-99
[4]   End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol [J].
Aysu, Aydin ;
Gulcan, Ege ;
Moriyama, Daisuke ;
Schaumont, Patrick ;
Yung, Moti .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :556-576
[5]   IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function" [J].
Bendavid, Ygal ;
Bagheri, Nasour ;
Safkhani, Masoumeh ;
Rostampour, Samad .
SENSORS, 2018, 18 (12)
[6]   Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol [J].
Bilal, Zeeshan ;
Masood, Ashraf ;
Kausar, Firdous .
2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, :260-267
[7]  
Bogdanov A, 2011, LECT NOTES COMPUT SC, V6917, P312, DOI 10.1007/978-3-642-23951-9_21
[8]   HB++:: a lightweight authentication protocol secure against some attacks [J].
Bringer, Julien ;
Chabanne, Herve ;
Dottax, Emmanuelle .
SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, :28-+
[9]  
Burmester M., 2008, International Journal of Applied Cryptography, V1, P79, DOI 10.1504/IJACT.2008.021082
[10]   Security Analysis of the SASI Protocol [J].
Cao, Tianjie ;
Bertino, Elisa ;
Lei, Hong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) :73-77