Skip to main content

2018 | OriginalPaper | Buchkapitel

A Novel Lightweight PUF-Based RFID Mutual Authentication Protocol

verfasst von : Wei Liang, Songyou Xie, Xiong Li, Jing Long, Yong Xie, Kuan-Ching Li

Erschienen in: Frontier Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The widespread use of radio frequency identification (RFID) in IoTs makes authentication of RFID systems be widely concerned. In existing encryption schemes (e.g., Hash function) in electronic products, secure chip is hard to be used in high performance RFID system due to high computation complexity and cost. In this work, we consider problems in these performances and propose a PUF-GIMAP protocol by combining GIMAP protocol and physically unclonable functions (PUFs). The response of PUF is added into protocol. The mutual authentication between label and reader is realized by transmitting information such as secret key and dynamical pseudonym, which greatly ensures data security in transmission. After authentication, the reserved data is updated in time. The protocol analysis shows that the proposed scheme has the advantages of high security and high reliability.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pagnin, E., Yang, A., Hu, Q., et al.: HB + DB math container loading Mathjax: distance bounding meets human based authentication. Future Gener. Comput. Syst. 6(11), 6–21 (2016) Pagnin, E., Yang, A., Hu, Q., et al.: HB + DB math container loading Mathjax: distance bounding meets human based authentication. Future Gener. Comput. Syst. 6(11), 6–21 (2016)
2.
Zurück zum Zitat Liang, W., Liao, B., Jiang, Y., Long, J., Peng, L.: Study on PUF based secure protection for IC design. Microprocess. Microsyst. 8(45), 56–66 (2016)CrossRef Liang, W., Liao, B., Jiang, Y., Long, J., Peng, L.: Study on PUF based secure protection for IC design. Microprocess. Microsyst. 8(45), 56–66 (2016)CrossRef
3.
Zurück zum Zitat Manifavas, C., Hatzivasilis, G., Fysarakis, K., et al.: Lightweight cryptography for embedded systems–a comparative analysis. In: Data Privacy Management and Autonomous Spontaneous Security, pp. 333–349. Springer, Heidelberg (2014)CrossRef Manifavas, C., Hatzivasilis, G., Fysarakis, K., et al.: Lightweight cryptography for embedded systems–a comparative analysis. In: Data Privacy Management and Autonomous Spontaneous Security, pp. 333–349. Springer, Heidelberg (2014)CrossRef
4.
Zurück zum Zitat Arbit, A., Livne, Y., Oren, Y., et al.: Implementing public-key cryptography on passive RFID tags is practical. Int. J. Inf. Secur. 14(1), 85–99 (2015)CrossRef Arbit, A., Livne, Y., Oren, Y., et al.: Implementing public-key cryptography on passive RFID tags is practical. Int. J. Inf. Secur. 14(1), 85–99 (2015)CrossRef
5.
Zurück zum Zitat Li, H., Deng, G.: PUF-HB#: a lightweight RFID mutual authentication protocol. J. Beijing Univ. Posts Telecommun. 36(6), 13–17 (2013) Li, H., Deng, G.: PUF-HB#: a lightweight RFID mutual authentication protocol. J. Beijing Univ. Posts Telecommun. 36(6), 13–17 (2013)
6.
Zurück zum Zitat Rührmair, U., Sölter, J., Sehnke, F., et al.: PUF modeling attacks on simulated and silicon data. IEEE Trans. Inf. Forensics Secur. 8(11), 1876–1891 (2013)CrossRef Rührmair, U., Sölter, J., Sehnke, F., et al.: PUF modeling attacks on simulated and silicon data. IEEE Trans. Inf. Forensics Secur. 8(11), 1876–1891 (2013)CrossRef
7.
Zurück zum Zitat Nilsson, E., Svensson, C.: Ultra-low power wake-up radio using envelope detector and transmission line voltage transformer. IEEE J. Emerg. Sel. Topics Circ. Syst. 3(1), 5–12 (2013)CrossRef Nilsson, E., Svensson, C.: Ultra-low power wake-up radio using envelope detector and transmission line voltage transformer. IEEE J. Emerg. Sel. Topics Circ. Syst. 3(1), 5–12 (2013)CrossRef
9.
Zurück zum Zitat Ding, Z., Li, J., Feng, B.: Research on hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009) Ding, Z., Li, J., Feng, B.: Research on hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009)
10.
Zurück zum Zitat Maiti, A., Gunreddy, V., Schaumont, P.: A systematic method to evaluate and compare the performance of physical unclonable functions. In: Embedded Systems Design with FPGAs, pp. 245–267. Springer, New York (2013) Maiti, A., Gunreddy, V., Schaumont, P.: A systematic method to evaluate and compare the performance of physical unclonable functions. In: Embedded Systems Design with FPGAs, pp. 245–267. Springer, New York (2013)
11.
Zurück zum Zitat Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J.: A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment. Math. Comput. Model. 58(12), 85–95 (2013)CrossRef Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J.: A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment. Math. Comput. Model. 58(12), 85–95 (2013)CrossRef
12.
Zurück zum Zitat Li, X., Niu, J., Khan, M.K., Liao, J.: An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5), 1365–1371 (2013)CrossRef Li, X., Niu, J., Khan, M.K., Liao, J.: An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5), 1365–1371 (2013)CrossRef
13.
Zurück zum Zitat Pappu, R.S.: Physical One-way Functions. Massachusetts Institute of Technology, Boston (2001) Pappu, R.S.: Physical One-way Functions. Massachusetts Institute of Technology, Boston (2001)
14.
Zurück zum Zitat Zhang, Z., Guo, Y.: Survey of physically unclonable function. J. Comput. Appl. 32(1), 3115–3120 (2012)MathSciNet Zhang, Z., Guo, Y.: Survey of physically unclonable function. J. Comput. Appl. 32(1), 3115–3120 (2012)MathSciNet
15.
Zurück zum Zitat Igier, M., Vaudenay, S.: Distance bounding based on PUF. In: International Conference on Cryptology and Network Security, pp. 701–710. Springer International Publishing (2016)CrossRef Igier, M., Vaudenay, S.: Distance bounding based on PUF. In: International Conference on Cryptology and Network Security, pp. 701–710. Springer International Publishing (2016)CrossRef
16.
Zurück zum Zitat Gurubani, J.B., Thakkar, H., Patel, D.R.: Improvements over extended LMAP+: RFID authentication protocol. In: IFIP Advances in Information and Communication Technology, pp. 225–231 (2012) Gurubani, J.B., Thakkar, H., Patel, D.R.: Improvements over extended LMAP+: RFID authentication protocol. In: IFIP Advances in Information and Communication Technology, pp. 225–231 (2012)
17.
Zurück zum Zitat Wang, C.: Heuristic attack strategy for improving LMAP+ protocol. Comput. Sci. 41(5), 143–149 (2014) Wang, C.: Heuristic attack strategy for improving LMAP+ protocol. Comput. Sci. 41(5), 143–149 (2014)
18.
Zurück zum Zitat Zhu, F.: New lightweight RFID bidirectional authentication protocol: PUF-LMAP+. Microcomput. Appl. 35(1), 1–4 (2016) Zhu, F.: New lightweight RFID bidirectional authentication protocol: PUF-LMAP+. Microcomput. Appl. 35(1), 1–4 (2016)
19.
Zurück zum Zitat Zheng, J., Chen, B., Zhou, Y.: A RFID lightweight authentication protocol GIMAP. J. Chin. Comput. Syst. 34(3), 530–534 (2013) Zheng, J., Chen, B., Zhou, Y.: A RFID lightweight authentication protocol GIMAP. J. Chin. Comput. Syst. 34(3), 530–534 (2013)
20.
Zurück zum Zitat Herder, C., Yu, M.D., Koushanfar, F., et al.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126–1141 (2014)CrossRef Herder, C., Yu, M.D., Koushanfar, F., et al.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126–1141 (2014)CrossRef
Metadaten
Titel
A Novel Lightweight PUF-Based RFID Mutual Authentication Protocol
verfasst von
Wei Liang
Songyou Xie
Xiong Li
Jing Long
Yong Xie
Kuan-Ching Li
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7398-4_36

Premium Partner