Cited time in webofscience Cited time in scopus

Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions

Title
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
Author(s)
Gope, P.Lee, Je MinQuek, T.Q.S.
DGIST Authors
Gope, P.Lee, Je MinQuek, T.Q.S.
Issued Date
2018-11
Type
Article
Article Type
Article
Author Keywords
Anonymitylightweightauthenticationradio frequency identification (RFID)physically uncloneable functions (PUFs)
Keywords
QUADRATIC RESIDUESPRIVACYSECURITYDESIGNECC
ISSN
1556-6013
Abstract
Radio frequency identification (RFID) has been considered as one of the imperative requirements for implementation of the Internet-of-Things (IoT) applications. It helps to solve the identification issues of the things in a cost-effective manner, but RFID systems often suffer from various security and privacy issues. To solve those issues for RFID systems, many schemes has been recently proposed by using the cryptographic primitive, called physically uncloneable functions (PUFs), which can ensure tamper-evident feature. However, to the best of our knowledge, none of them has succeeded to address the problem of privacy preservation with the resistance of DoS attacks in a practical way. For instance, existing schemes need to rely on exhaustive search operations to identify a tag, and also suffer from several security and privacy related issues. Furthermore, a tag needs to store some security credentials (e.g., secret shared keys), which may cause several issues such as loss of forward and backward secrecy and large storage costs. Therefore, in this paper, we first propose a lightweight privacy-preserving authentication protocol for RFID system by considering ideal PUF environment. Subsequently, we introduce an enhanced protocol which can support the noisy PUF environment. It is argued that both of our protocols can overcome the limitations of existing schemes, and further ensure more security properties. By analyzing the performance, we have shown that the propose solutions are secure, efficient, practical, and effective for the resource-constraint RFID tag. IEEE
URI
http://hdl.handle.net/20.500.11750/6381
DOI
10.1109/TIFS.2018.2832849
Publisher
Institute of Electrical and Electronics Engineers
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science ISC(Information Security and Communication) Lab 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE