Cited 58 time in webofscience Cited 63 time in scopus

Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions

Title
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
Authors
Gope, P.Lee, Je MinQuek, T.Q.S.
DGIST Authors
Gope, P.; Lee, Je Min; Quek, T.Q.S.
Issue Date
2018-11
Citation
IEEE Transactions on Information Forensics and Security, 13(11), 2831-2843
Type
Article
Article Type
Article
Author Keywords
AnonymityAuthenticationAuthenticationCryptographyLightweightPhysically uncloneable functions (PUFs)PrivacyProtocolsRadio frequency identification (RFID)Radiofrequency identificationServers
ISSN
1556-6013
Abstract
Radio frequency identification (RFID) has been considered as one of the imperative requirements for implementation of the Internet-of-Things (IoT) applications. It helps to solve the identification issues of the things in a cost-effective manner, but RFID systems often suffer from various security and privacy issues. To solve those issues for RFID systems, many schemes has been recently proposed by using the cryptographic primitive, called physically uncloneable functions (PUFs), which can ensure tamper-evident feature. However, to the best of our knowledge, none of them has succeeded to address the problem of privacy preservation with the resistance of DoS attacks in a practical way. For instance, existing schemes need to rely on exhaustive search operations to identify a tag, and also suffer from several security and privacy related issues. Furthermore, a tag needs to store some security credentials (e.g., secret shared keys), which may cause several issues such as loss of forward and backward secrecy and large storage costs. Therefore, in this paper, we first propose a lightweight privacy-preserving authentication protocol for RFID system by considering ideal PUF environment. Subsequently, we introduce an enhanced protocol which can support the noisy PUF environment. It is argued that both of our protocols can overcome the limitations of existing schemes, and further ensure more security properties. By analyzing the performance, we have shown that the propose solutions are secure, efficient, practical, and effective for the resource-constraint RFID tag. IEEE
URI
http://hdl.handle.net/20.500.11750/6381
DOI
10.1109/TIFS.2018.2832849
Publisher
Institute of Electrical and Electronics Engineers Inc.
Files:
There are no files associated with this item.
Collection:
Department of Information and Communication EngineeringISC(Information Security and Communication) Lab1. Journal Articles


qrcode mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE