| Literature DB >> 29498684 |
He Xu1,2, Jie Ding3,4, Peng Li5,6, Feng Zhu7,8, Ruchuan Wang9,10.
Abstract
With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.Entities:
Keywords: Physical Unclonable Function; RFID technology; lightweight cryptography; mutual verification
Year: 2018 PMID: 29498684 PMCID: PMC5876676 DOI: 10.3390/s18030760
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Radio frequency identification (RFID) system framework.
Figure 2PUF subgrade circuit diagram.
The definitions of K protocol.
| Symbol | Definition |
|---|---|
| The ID of tag | |
| The false ID of tag | |
| The index of tag in the database | |
| The result of the value X processed by the PUF module in the tag | |
| ⨁ | The XOR operation |
| The Permutation function | |
| The shared secret key by the reader and the tag | |
| The secret value of the tag | |
| The loop left movement operation | |
| The AND operation | |
| || | The JOIN operation |
Figure 3Kulseng’s mutual verification protocol.
Figure 4Single tag certification process.
Figure 5Time sequence diagram of single tag authentication.
Comparison of security analysis between the proposed protocol and Kulseng’s lightweight mutual verification protocol.
| Types of Attack | Proposed Protocol | K Protocol |
|---|---|---|
| Mutual verification | √ | √ |
| Data confidentiality and Tag anonymity | √ | × |
| Steal attack | √ | × |
| Replay attack | √ | √ |
| Backtracking attack | √ | × |
| Clone attack | √ | √ |
| Desynchronization attack | √ | × |
Figure 6High frequency experiments.
Figure 7Ultra-high frequency experiments.
Results of the time cost analysis of K protocol.
| Device | Tag Verification Phase | Mutual Verification Phase | Update Phase |
|---|---|---|---|
| Tag | - | ||
| Reader | - |
Results of the time cost analysis of the proposed protocol.
| Device | Tag Verification Phase | Mutual Verification Phase | Update Phase |
|---|---|---|---|
| Tag | |||
| Reader | - |
Results of space cost analysis between the proposed protocol and K protocol.
| Protocol | Tag | Reader |
|---|---|---|
| K protocol | 3 L | 4 L |
| Our protocol | 3 L | 9 L |