Abstract
With the rapid development of radio frequency identification (RFID) technology, RFID devices are beginning to exist widely in our daily lives, and people are paying more and more attention to RFID security. Traditional RFID-based encryption algorithms rely on expensive Hash function. Therefore, this paper proposes a lightweight RFID authentication protocol based on Physically Unclonable Functions (PUF), which uses the machine learning algorithm and string-matching algorithm, and presents a new mechanism of PUF challenge generation, which does not require expensive error correction code and fuzzy extractor. The implementation cost is lower. Through our security analysis, our identity authentication protocol can provide reliable security for low-cost RFID systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liang, W., Xie, S., Long, J., et al.: A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Inf. Sci. 503, 129–147 (2019)
Xian, X., Chen, F., Wang, J.: An insight into campus network user behaviour analysis decision system. Int. J. Embedded Syst. 9(1), 3 (2017)
Yl, L.: RFID zero knowledge certification protocol research. Tianjin University (2013)
Quwaider, M., Jararweh, Y.: Cloud-assisted data management in wireless body area networks. Int. J. Comput. Sci. Eng. 14(1), 16 (2017)
Zanetti, D.: RFID authentication (2012)
Liang, W., Xie, S., Li, X., Long, J., Xie, Y., Li, K.-C.: A novel lightweight PUF-based RFID mutual authentication protocol. In: Hung, J.C., Yen, N.Y., Hui, L. (eds.) FC 2017. LNEE, vol. 464, pp. 345–355. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-7398-4_36
Alzubaidi, M.A.: A new strategy for bridging the semantic gap in image retrieval. Int. J. Comput. Sci. Eng. 14(1), 27 (2017)
Liang, W., Liao, B., Long, J., et al.: Study on PUF based secure protection for IC design. Microprocess. Microsyst. 45, 56–66 (2016)
Igier, M., Vaudenay, S.: Distance bounding based on PUF. In: Foresti, S., Persiano, G. (eds.) CANS 2016. LNCS, vol. 10052, pp. 701–710. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48965-0_48
Katz, J.: Analysis of a proposed hash-based signature standard. In: Chen, L., McGrew, D., Mitchell, C. (eds.) SSR 2016. LNCS, vol. 10074, pp. 261–273. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49100-4_12
Avoine, G., Bingöl, M.A., Carpent, X., et al.: Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography. IEEE Trans. Mob. Comput. 12(10), 2037–2049 (2013)
Gurubani, J.B., Thakkar, H., Patel, D.R.: Improvements over extended LMAP+: RFID authentication protocol. In: Dimitrakos, T., Moona, R., Patel, D., McKnight, D.H. (eds.) IFIPTM 2012. IAICT, vol. 374, pp. 225–231. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29852-3_17
Xie, S., Liang, W., Xu, J., et al.: A novel bidirectional RFID identity authentication protocol. In: 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, pp. 301–307. IEEE (2018)
He, D., Zeadally, S.: An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J. 2(1), 72–83 (2015)
Gao, Y., Ranasinghe, D.C., Al-Sarawi, S.F., et al.: Emerging physical unclonable functions with nanotechnology. IEEE Access 4, 61–80 (2016)
Gao, Y., Ranasinghe, D.C., Al-Sarawi, S.F., et al.: Memristive crypto primitive for building highly secure physical unclonable functions. Sci. Rep. 5, 12785 (2015)
Strohmeier, M., Lenders, V., Martinovic, I.: On the security of the automatic dependent surveillance-broadcast protocol. IEEE Commun. Surv. Tutor. 17(2), 1066–1087 (2015)
Delvaux, J., Peeters, R., Gu, D., et al.: A survey on lightweight entity authentication with strong PUFs. ACM Comput. Surv. (CSUR) 48(2), 26 (2015)
Li, H.: PUF-HB#: lightweight bidirectional RFID authentication protocol. J. Beijing Univ. Posts Telecommun. 36(6), 13–17 (2013)
Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237–249 (2010)
Rostami, M., Majzoobi, M., Koushanfar, F., et al.: Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching. IEEE Trans. Emerg. Top. Comput. 2(1), 37–49 (2014)
Blanchet, B., Smyth, B.: ProVerif 1.85: automatic cryptographic protocol verifier. User Manual and Tutorial (2013)
Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. R. Soc. Lond. A - Math. Phys. Sci. 1989(426), 233–271 (1871)
Brisbanne, O.M., Bossuet, L.: Restoration protocol: lightweight and secure devices authentication based on PUF (2017)
Idriss, T., Bayoumi, M.: Lightweight highly secure PUF protocol for mutual authentication and secret message exchange. In: 2017 IEEE International Conference on RFID Technology and Application (RFID-TA), pp. 214–219. IEEE (2017)
Huang, H.H., Yeh, L.Y., Tsaur, W.J.: Ultra-lightweight mutual authentication and ownership transfer protocol with PUF for Gen2 V2 RFID systems. In: Proceedings of the International Multiconference of Engineers and Computer Scientists (2016)
Acknowledgement
This research is funded by the National Natural Science Foundation of China (Grant 61572188), Scientific Research Program of New Century Excellent Talents in Fujian Province University, Industrial Robot Application of Fujian University Engineering Research Center, Minjiang University (MJUKF-IRA201802), Fujian Provincial Natural Science Foundation of China (Grant 2018J01570), the CERNET Innovation Project (Grant NGII20170411) and the young teacher’s education scientific research project of Fujian province(Grant no. JT180455), Educational and teaching reform and construction project of Xiamen University of Technology (Grant JG2019048).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zheng, X., Xie, S., Xie, C., Zhu, W. (2020). An RFID Lightweight Authentication Technology Based on PUF-RFID Structure Model. In: Zheng, Z., Dai, HN., Tang, M., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol 1156. Springer, Singapore. https://doi.org/10.1007/978-981-15-2777-7_25
Download citation
DOI: https://doi.org/10.1007/978-981-15-2777-7_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2776-0
Online ISBN: 978-981-15-2777-7
eBook Packages: Computer ScienceComputer Science (R0)