Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Gope, P. -
dc.contributor.author Lee, Je Min -
dc.contributor.author Quek, T.Q.S. -
dc.date.accessioned 2018-05-25T02:25:41Z -
dc.date.available 2018-05-25T02:25:41Z -
dc.date.created 2018-05-18 -
dc.date.issued 2018-11 -
dc.identifier.citation IEEE Transactions on Information Forensics and Security, v.13, no.11, pp.2831 - 2843 -
dc.identifier.issn 1556-6013 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/6381 -
dc.description.abstract Radio frequency identification (RFID) has been considered as one of the imperative requirements for implementation of the Internet-of-Things (IoT) applications. It helps to solve the identification issues of the things in a cost-effective manner, but RFID systems often suffer from various security and privacy issues. To solve those issues for RFID systems, many schemes has been recently proposed by using the cryptographic primitive, called physically uncloneable functions (PUFs), which can ensure tamper-evident feature. However, to the best of our knowledge, none of them has succeeded to address the problem of privacy preservation with the resistance of DoS attacks in a practical way. For instance, existing schemes need to rely on exhaustive search operations to identify a tag, and also suffer from several security and privacy related issues. Furthermore, a tag needs to store some security credentials (e.g., secret shared keys), which may cause several issues such as loss of forward and backward secrecy and large storage costs. Therefore, in this paper, we first propose a lightweight privacy-preserving authentication protocol for RFID system by considering ideal PUF environment. Subsequently, we introduce an enhanced protocol which can support the noisy PUF environment. It is argued that both of our protocols can overcome the limitations of existing schemes, and further ensure more security properties. By analyzing the performance, we have shown that the propose solutions are secure, efficient, practical, and effective for the resource-constraint RFID tag. IEEE -
dc.language English -
dc.publisher Institute of Electrical and Electronics Engineers -
dc.title Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions -
dc.type Article -
dc.identifier.doi 10.1109/TIFS.2018.2832849 -
dc.identifier.wosid 000433909100009 -
dc.identifier.scopusid 2-s2.0-85046467572 -
dc.type.local Article(Overseas) -
dc.type.rims ART -
dc.description.journalClass 1 -
dc.citation.publicationname IEEE Transactions on Information Forensics and Security -
dc.contributor.nonIdAuthor Gope, P. -
dc.contributor.nonIdAuthor Quek, T.Q.S. -
dc.identifier.citationVolume 13 -
dc.identifier.citationNumber 11 -
dc.identifier.citationStartPage 2831 -
dc.identifier.citationEndPage 2843 -
dc.identifier.citationTitle IEEE Transactions on Information Forensics and Security -
dc.type.journalArticle Article -
dc.description.isOpenAccess Y -
dc.subject.keywordAuthor Anonymity -
dc.subject.keywordAuthor lightweight -
dc.subject.keywordAuthor authentication -
dc.subject.keywordAuthor radio frequency identification (RFID) -
dc.subject.keywordAuthor physically uncloneable functions (PUFs) -
dc.subject.keywordPlus QUADRATIC RESIDUES -
dc.subject.keywordPlus PRIVACY -
dc.subject.keywordPlus SECURITY -
dc.subject.keywordPlus DESIGN -
dc.subject.keywordPlus ECC -
dc.contributor.affiliatedAuthor Gope, P. -
dc.contributor.affiliatedAuthor Lee, Je Min -
dc.contributor.affiliatedAuthor Quek, T.Q.S. -
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science ISC(Information Security and Communication) Lab 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE