Skip to main content

An RFID Lightweight Authentication Technology Based on PUF-RFID Structure Model

  • Conference paper
  • First Online:
Blockchain and Trustworthy Systems (BlockSys 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1156))

Included in the following conference series:

  • 3360 Accesses

Abstract

With the rapid development of radio frequency identification (RFID) technology, RFID devices are beginning to exist widely in our daily lives, and people are paying more and more attention to RFID security. Traditional RFID-based encryption algorithms rely on expensive Hash function. Therefore, this paper proposes a lightweight RFID authentication protocol based on Physically Unclonable Functions (PUF), which uses the machine learning algorithm and string-matching algorithm, and presents a new mechanism of PUF challenge generation, which does not require expensive error correction code and fuzzy extractor. The implementation cost is lower. Through our security analysis, our identity authentication protocol can provide reliable security for low-cost RFID systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liang, W., Xie, S., Long, J., et al.: A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Inf. Sci. 503, 129–147 (2019)

    Article  Google Scholar 

  2. Xian, X., Chen, F., Wang, J.: An insight into campus network user behaviour analysis decision system. Int. J. Embedded Syst. 9(1), 3 (2017)

    Article  Google Scholar 

  3. Yl, L.: RFID zero knowledge certification protocol research. Tianjin University (2013)

    Google Scholar 

  4. Quwaider, M., Jararweh, Y.: Cloud-assisted data management in wireless body area networks. Int. J. Comput. Sci. Eng. 14(1), 16 (2017)

    Google Scholar 

  5. Zanetti, D.: RFID authentication (2012)

    Google Scholar 

  6. Liang, W., Xie, S., Li, X., Long, J., Xie, Y., Li, K.-C.: A novel lightweight PUF-based RFID mutual authentication protocol. In: Hung, J.C., Yen, N.Y., Hui, L. (eds.) FC 2017. LNEE, vol. 464, pp. 345–355. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-7398-4_36

    Chapter  Google Scholar 

  7. Alzubaidi, M.A.: A new strategy for bridging the semantic gap in image retrieval. Int. J. Comput. Sci. Eng. 14(1), 27 (2017)

    Google Scholar 

  8. Liang, W., Liao, B., Long, J., et al.: Study on PUF based secure protection for IC design. Microprocess. Microsyst. 45, 56–66 (2016)

    Article  Google Scholar 

  9. Igier, M., Vaudenay, S.: Distance bounding based on PUF. In: Foresti, S., Persiano, G. (eds.) CANS 2016. LNCS, vol. 10052, pp. 701–710. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48965-0_48

    Chapter  Google Scholar 

  10. Katz, J.: Analysis of a proposed hash-based signature standard. In: Chen, L., McGrew, D., Mitchell, C. (eds.) SSR 2016. LNCS, vol. 10074, pp. 261–273. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49100-4_12

    Chapter  Google Scholar 

  11. Avoine, G., Bingöl, M.A., Carpent, X., et al.: Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography. IEEE Trans. Mob. Comput. 12(10), 2037–2049 (2013)

    Article  Google Scholar 

  12. Gurubani, J.B., Thakkar, H., Patel, D.R.: Improvements over extended LMAP+: RFID authentication protocol. In: Dimitrakos, T., Moona, R., Patel, D., McKnight, D.H. (eds.) IFIPTM 2012. IAICT, vol. 374, pp. 225–231. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29852-3_17

    Chapter  Google Scholar 

  13. Xie, S., Liang, W., Xu, J., et al.: A novel bidirectional RFID identity authentication protocol. In: 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, pp. 301–307. IEEE (2018)

    Google Scholar 

  14. He, D., Zeadally, S.: An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J. 2(1), 72–83 (2015)

    Article  Google Scholar 

  15. Gao, Y., Ranasinghe, D.C., Al-Sarawi, S.F., et al.: Emerging physical unclonable functions with nanotechnology. IEEE Access 4, 61–80 (2016)

    Article  Google Scholar 

  16. Gao, Y., Ranasinghe, D.C., Al-Sarawi, S.F., et al.: Memristive crypto primitive for building highly secure physical unclonable functions. Sci. Rep. 5, 12785 (2015)

    Article  Google Scholar 

  17. Strohmeier, M., Lenders, V., Martinovic, I.: On the security of the automatic dependent surveillance-broadcast protocol. IEEE Commun. Surv. Tutor. 17(2), 1066–1087 (2015)

    Article  Google Scholar 

  18. Delvaux, J., Peeters, R., Gu, D., et al.: A survey on lightweight entity authentication with strong PUFs. ACM Comput. Surv. (CSUR) 48(2), 26 (2015)

    Article  Google Scholar 

  19. Li, H.: PUF-HB#: lightweight bidirectional RFID authentication protocol. J. Beijing Univ. Posts Telecommun. 36(6), 13–17 (2013)

    Google Scholar 

  20. Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237–249 (2010)

    Google Scholar 

  21. Rostami, M., Majzoobi, M., Koushanfar, F., et al.: Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching. IEEE Trans. Emerg. Top. Comput. 2(1), 37–49 (2014)

    Article  Google Scholar 

  22. Blanchet, B., Smyth, B.: ProVerif 1.85: automatic cryptographic protocol verifier. User Manual and Tutorial (2013)

    Google Scholar 

  23. Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. R. Soc. Lond. A - Math. Phys. Sci. 1989(426), 233–271 (1871)

    MATH  Google Scholar 

  24. Brisbanne, O.M., Bossuet, L.: Restoration protocol: lightweight and secure devices authentication based on PUF (2017)

    Google Scholar 

  25. Idriss, T., Bayoumi, M.: Lightweight highly secure PUF protocol for mutual authentication and secret message exchange. In: 2017 IEEE International Conference on RFID Technology and Application (RFID-TA), pp. 214–219. IEEE (2017)

    Google Scholar 

  26. Huang, H.H., Yeh, L.Y., Tsaur, W.J.: Ultra-lightweight mutual authentication and ownership transfer protocol with PUF for Gen2 V2 RFID systems. In: Proceedings of the International Multiconference of Engineers and Computer Scientists (2016)

    Google Scholar 

Download references

Acknowledgement

This research is funded by the National Natural Science Foundation of China (Grant 61572188), Scientific Research Program of New Century Excellent Talents in Fujian Province University, Industrial Robot Application of Fujian University Engineering Research Center, Minjiang University (MJUKF-IRA201802), Fujian Provincial Natural Science Foundation of China (Grant 2018J01570), the CERNET Innovation Project (Grant NGII20170411) and the young teacher’s education scientific research project of Fujian province(Grant no. JT180455), Educational and teaching reform and construction project of Xiamen University of Technology (Grant JG2019048).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Songyou Xie .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zheng, X., Xie, S., Xie, C., Zhu, W. (2020). An RFID Lightweight Authentication Technology Based on PUF-RFID Structure Model. In: Zheng, Z., Dai, HN., Tang, M., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol 1156. Springer, Singapore. https://doi.org/10.1007/978-981-15-2777-7_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2777-7_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2776-0

  • Online ISBN: 978-981-15-2777-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics