Skip to main content

PUF-Based RFID Authentication Protocol against Secret Key Leakage

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7235))

Abstract

RFID tags are now pervasive in our everyday life. They raise a lot of security and privacy issues. Many authentication protocols against these problems assume that the tags can contain a secret key that is unknown to the adversary. However, physical attacks can lead to key exposure and full security breaks. On the other hand, many protocols are only described and analyzed. However, we cannot explain why they are designed like that. Compare with the previous protocols, we first propose a universal RFID authentication protocol and show the principle why the protocol is designed. It can be instantiated for various types and achieve different security properties according to the implementation of the functions. Then we introduce a general prototype of delay-based PUF for low-cost RFID systems and propose a new lightweight RFID authentication protocol based on the general prototype of PUF. The new protocol not only resists the physical attacks and secret key leakage, but also prevents the asynchronization between the reader and the tag. It also can resist the replay attack, man-in-the-middle attack etc. Finally, we show that it is efficient and practical for low-cost RFID systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kasper, T., Oswald, D., Paar, C.: Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 61–77. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  2. de Koning Gans, G., Hoepman, J.-H., Garcia, F.D.: A Practical Attack on the MIFARE Classic. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 267–282. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Pappu, R.: Physical one-way functions. Massachusetts Institute of Technology (2001)

    Google Scholar 

  4. Rührmair, U., et al.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM, Chicago (2010)

    Google Scholar 

  5. Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM (2002)

    Google Scholar 

  6. Oztiirk, E., Hammouri, G., Sunar, B.: Towards robust low cost authentication for pervasive devices. In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. IEEE (2008)

    Google Scholar 

  7. Cortese, P.F., Gemmiti, F., Palazzi, B., Pizzonia, M., Rimondini, M.: Efficient and practical authentication of PUF-based RFID tags in supply chains. In: 2010 IEEE International Conference on RFID-Technology and Applications (RFID-TA). IEEE (2010)

    Google Scholar 

  8. Kulseng, L., Yu, Z., Wei, Y., Guan, Y.: Lightweight mutual authentication and ownership transfer for RFID systems. In: Proceedings IEEE INFOCOM. IEEE (2010)

    Google Scholar 

  9. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: RFID Privacy Workshop (2003)

    Google Scholar 

  10. Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security. ACM (2004)

    Google Scholar 

  11. Ranasinghe, D., Engels, D., Cole, P.: Security and privacy: Modest proposals for low-cost RFID systems. In: Proceedings of the Intelligent Sensors, Sensor Networks and Information Processing Conference. IEEE (2004)

    Google Scholar 

  12. Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks 2005. IEEE Computer Society (2005)

    Google Scholar 

  13. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In: Proceedings of 2nd Workshop on RFID Security (2006)

    Google Scholar 

  14. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 912–923. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Li, T., Wang, G.: Security analysis of two ultra-lightweight RFID authentication protocols. In: New Approaches for Security, Privacy and Trust in Complex Environments, pp. 109–120 (2007)

    Google Scholar 

  16. Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Chien, H.-Y., Chen, C.-H.: Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces 29(2), 254–259 (2007)

    Article  MathSciNet  Google Scholar 

  18. Bolotnyy, L., Robins, G.: Physically unclonable function-based security and privacy in RFID systems. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2007. IEEE (2007)

    Google Scholar 

  19. Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An efficient forward private RFID protocol. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM (2009)

    Google Scholar 

  20. Ma, C., Li, Y., Deng, R.H., Li, T.: RFID privacy: relation between two notions, minimal condition, and efficient construction. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, New York (2009)

    Google Scholar 

  21. Choi, W., Kim, S., Kim, Y., Park, Y., Ahn, K.: PUF-based Encryption Processor for the RFID Systems. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT). IEEE (2010)

    Google Scholar 

  22. Kardas, S., Akgün, M., Kiraz, M.S., Demirci, H.: Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. In: 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec). IEEE (2011)

    Google Scholar 

  23. Busch, H., Katzenbeisser, S., Baecher, P.: PUF-Based Authentication Protocols – Revisited. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 296–308. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  24. Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight secure pufs. IEEE Press (2008)

    Google Scholar 

  25. Devadas, S.: Physical Unclonable Functions and Secure Processors. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 65–65. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  26. Bolotnyy, L., Robins, G.: Multi-tag RFID systems. International Journal of Internet Protocol Technology 2(3), 218–231 (2007)

    Article  Google Scholar 

  27. Dimitriou, T.: rfidDOT: RFID delegation and ownership transfer made simple. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. ACM (2008)

    Google Scholar 

  28. Song, B.: RFID tag ownership transfer. In: Proceedings of RFIDSEC Workshop (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jin, Y., Xin, W., Sun, H., Chen, Z. (2012). PUF-Based RFID Authentication Protocol against Secret Key Leakage. In: Sheng, Q.Z., Wang, G., Jensen, C.S., Xu, G. (eds) Web Technologies and Applications. APWeb 2012. Lecture Notes in Computer Science, vol 7235. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29253-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29253-8_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29252-1

  • Online ISBN: 978-3-642-29253-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics