Skip to main content
Erschienen in: Wireless Personal Communications 2/2018

21.05.2018

A Secure PUF-Based Unilateral Authentication Scheme for RFID System

verfasst von: Pramod Kumar Maurya, Satya Bagchi

Erschienen in: Wireless Personal Communications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy and security concerns are significant barrier for RFID deployment in many applications in modern day world. The implementation of authentication schemes which provide reasonable security under the resource constraints of tiny-powered RFID tags are an efficient way to avoid these concerns. In this paper, we present physical unclonable function based unilateral authentication protocol for RFID system. In addition, we use error-correcting code properties to enhance security of the proposed scheme. Use of error-correcting code also reduces computational cost of the proposed scheme drastically. Security and privacy analysis indicates that the proposed scheme resists various attacks. Cost analysis shows that the scheme outshines the existing protocols in terms of storage requirement, computational operations, and communication cost.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aghili, S. F., & Mala, H. (2017). On the security of another CRC based ultralightweight RFID authentication protocol. Cryptology ePrint Archive, Report 2017/1054. Aghili, S. F., & Mala, H. (2017). On the security of another CRC based ultralightweight RFID authentication protocol. Cryptology ePrint Archive, Report 2017/1054.
2.
Zurück zum Zitat Akgün, M., & Çaǧlayan, M. U. (2016). Towards scalable identification in RFID systems. Wireless Personal Communications, 86(2), 403–421.CrossRef Akgün, M., & Çaǧlayan, M. U. (2016). Towards scalable identification in RFID systems. Wireless Personal Communications, 86(2), 403–421.CrossRef
3.
Zurück zum Zitat Akgün, M., & Çaǧlayan, M. U. (2015). Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Networks, 32, 32–42.CrossRef Akgün, M., & Çaǧlayan, M. U. (2015). Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Networks, 32, 32–42.CrossRef
4.
Zurück zum Zitat Bassil, R., El-Beaino, W., Kayssi, A., & Chehab, A. (2011). A PUF-based ultra-lightweight mutual-authentication RFID protocol. In 2011 international conference for internet technology and secured transactions (pp. 495–499). Bassil, R., El-Beaino, W., Kayssi, A., & Chehab, A. (2011). A PUF-based ultra-lightweight mutual-authentication RFID protocol. In 2011 international conference for internet technology and secured transactions (pp. 495–499).
5.
Zurück zum Zitat Gope, P., & Hwang, T. (2015). A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Computers and Security, 55, 271–280.CrossRef Gope, P., & Hwang, T. (2015). A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Computers and Security, 55, 271–280.CrossRef
6.
Zurück zum Zitat Jung, S. W., & Jung, S. (2013). HRP: A HMAC-based RFID mutual authentication protocol using PUF. In The international conference on information networking 2013 (ICOIN) (pp. 578–582). Jung, S. W., & Jung, S. (2013). HRP: A HMAC-based RFID mutual authentication protocol using PUF. In The international conference on information networking 2013 (ICOIN) (pp. 578–582).
7.
Zurück zum Zitat Kardas, S., Akgün, M., Kiraz, M. S., & Demirci, H. (2011). Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems. In 2011 workshop on lightweight security privacy: devices, protocols, and applications (pp. 20–25). Kardas, S., Akgün, M., Kiraz, M. S., & Demirci, H. (2011). Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems. In 2011 workshop on lightweight security privacy: devices, protocols, and applications (pp. 20–25).
8.
Zurück zum Zitat Kardas, S., Celik, S., Yildiz, M., & Levi, A. (2012). PUF-enhanced offline RFID security and privacy. Journal of Network and Computer Applications, 35(6), 2059–2067.CrossRef Kardas, S., Celik, S., Yildiz, M., & Levi, A. (2012). PUF-enhanced offline RFID security and privacy. Journal of Network and Computer Applications, 35(6), 2059–2067.CrossRef
9.
Zurück zum Zitat Kaul, S. D., & Awasthi, A. K. (2017). Privacy model for threshold RFID system based on PUF. Wireless Personal Communications, 95(3), 2803–2828.CrossRef Kaul, S. D., & Awasthi, A. K. (2017). Privacy model for threshold RFID system based on PUF. Wireless Personal Communications, 95(3), 2803–2828.CrossRef
10.
Zurück zum Zitat Kulseng, L., Yu, Z., Wei, Y., & Guan, Y. (2009). Lightweight secure search protocols for low-cost RFID systems. In 29th IEEE international conference on distributed computing systems (pp. 40–48). Kulseng, L., Yu, Z., Wei, Y., & Guan, Y. (2009). Lightweight secure search protocols for low-cost RFID systems. In 29th IEEE international conference on distributed computing systems (pp. 40–48).
11.
Zurück zum Zitat Kulseng, L., Yu, Z., Wei, Y., & Guan, Y. (2010). Lightweight mutual authentication and ownership transfer for RFID systems. In 2010 proceedings IEEE INFOCOM (pp. 1–5). Kulseng, L., Yu, Z., Wei, Y., & Guan, Y. (2010). Lightweight mutual authentication and ownership transfer for RFID systems. In 2010 proceedings IEEE INFOCOM (pp. 1–5).
12.
Zurück zum Zitat Ling, S., & Xing, C. (2004). Coding theory. Cambridge: Cambridge University Press.CrossRef Ling, S., & Xing, C. (2004). Coding theory. Cambridge: Cambridge University Press.CrossRef
13.
Zurück zum Zitat Maurya, P. K., Pal, J., & Bagchi, S. (2017). A coding theory based ultralightweight RFID authentication protocol with CRC. Wireless Personal Communications, 97(1), 967–976.CrossRef Maurya, P. K., Pal, J., & Bagchi, S. (2017). A coding theory based ultralightweight RFID authentication protocol with CRC. Wireless Personal Communications, 97(1), 967–976.CrossRef
14.
Zurück zum Zitat Ranasinghe, D. C., Engels, D. W., & Cole, P. H. (2004). Security and privacy: Modest proposals for low-cost RFID systems. In Auto-ID labs research workshop. Ranasinghe, D. C., Engels, D. W., & Cole, P. H. (2004). Security and privacy: Modest proposals for low-cost RFID systems. In Auto-ID labs research workshop.
15.
Zurück zum Zitat Sadeghi, A. R., Visconti, I., & Wachsmann, C. (2010). PUF-enhanced RFID security and privacy. In Workshop on secure component and system identification (SECSI). Sadeghi, A. R., Visconti, I., & Wachsmann, C. (2010). PUF-enhanced RFID security and privacy. In Workshop on secure component and system identification (SECSI).
16.
Zurück zum Zitat Safkhani, M., Bagheri, N., & Naderi, M. (2011). Security analysis of a PUF based RFID authentication protocol. IACR Cryptology ePrint Archive, Report 2011/704. Safkhani, M., Bagheri, N., & Naderi, M. (2011). Security analysis of a PUF based RFID authentication protocol. IACR Cryptology ePrint Archive, Report 2011/704.
17.
Zurück zum Zitat Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In D. Pointcheval (Ed.), Topics in cryptology—CT-RSA 2006. Lecture notes in computer science (Vol. 3860, pp. 115–131). Berlin: Springer.CrossRef Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In D. Pointcheval (Ed.), Topics in cryptology—CT-RSA 2006. Lecture notes in computer science (Vol. 3860, pp. 115–131). Berlin: Springer.CrossRef
18.
Zurück zum Zitat Vaudenay, S. (2007). On privacy models for RFID. In K. Kurosawa (Ed.), Advances in cryptology—ASIACRYPT 2007 (Vol. 4833, pp. 68–87). Berlin: Springer.CrossRef Vaudenay, S. (2007). On privacy models for RFID. In K. Kurosawa (Ed.), Advances in cryptology—ASIACRYPT 2007 (Vol. 4833, pp. 68–87). Berlin: Springer.CrossRef
Metadaten
Titel
A Secure PUF-Based Unilateral Authentication Scheme for RFID System
verfasst von
Pramod Kumar Maurya
Satya Bagchi
Publikationsdatum
21.05.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5875-2

Weitere Artikel der Ausgabe 2/2018

Wireless Personal Communications 2/2018 Zur Ausgabe

Neuer Inhalt