| Literature DB >> 31277487 |
Feng Zhu1,2, Peng Li3,4, He Xu1,2, Ruchuan Wang1,2.
Abstract
Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers. To solve these issues, lots of authentication protocols are proposed based on physical unclonable functions that can ensure an anti-counterfeiting feature. However, most of the existing schemes require secret parameters to be stored in tags, which are vulnerable to physical attacks that can further lead to the breach of forward secrecy. Furthermore, as far as we know, none of the existing schemes are able to solve the security and privacy problems with good scalability. Since many existing schemes rely on exhaustive searches of the backend server to validate a tag and they are not scalable for applications with a large scale database. Hence, in this paper, we propose a lightweight RFID mutual authentication protocol with physically unclonable functions (PUFs). The performance analysis shows that our proposed scheme can ensure security and privacy efficiently in a scalable way.Entities:
Keywords: authentication; lightweight; physical unclonable function; privacy; radio frequency identification; security
Year: 2019 PMID: 31277487 PMCID: PMC6651586 DOI: 10.3390/s19132957
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1A typical radio frequency identification (RFID) system.
Figure 2Arbiter physically unclonable function (PUF) circuit diagram.
Figure 3Communication channels in a typical RFID system.
Operations and cryptographic functions.
| Symbol | Definition |
|---|---|
| ⊕ | Exclusive OR operation |
| || | Concatenation operation |
| PUFT | The physically unclonable function on tag T |
| Hash | One-way hash function shared by tag T and server S |
Figure 4Setup phase of the proposed ideal PUF-based protocol.
Figure 5Authentication phase of the proposed ideal PUF-based protocol.
Figure 6Setup phase of the proposed noisy PUF-based protocol.
Figure 7Authentication phase of the proposed noisy PUF-based protocol.
The verification outcome of our proposed protocol using Scyther.
| Claim | Status | Comments | |||
|---|---|---|---|---|---|
| ideal_PUF | S | ideal_PUF,S1 | Secret N | OK | No attacks within bounds |
| ideal_PUF,S2 | Secret Ri | OK | No attacks within bounds | ||
| ideal_PUF,S3 | Niagree | OK | No attacks within bounds | ||
| ideal_PUF,S4 | Nisynch | OK | No attacks within bounds | ||
| ideal_PUF,S5 | Alive | OK | No attacks within bounds | ||
| ideal_PUF,S6 | Weakagree | OK | No attacks within bounds | ||
| T | ideal_PUF,T1 | Secret M | OK | No attacks within bounds | |
| ideal_PUF,T2 | Secret Ri+1 | OK | No attacks within bounds | ||
| ideal_PUF,T3 | Niagree | OK | No attacks within bounds | ||
| ideal_PUF,T4 | Nisynch | OK | No attacks within bounds | ||
| ideal_PUF,T5 | Alive | OK | No attacks within bounds | ||
| ideal_PUF,T6 | Weakagree | OK | No attacks within bounds |
Security performance comparison.
| Vulnerability | Ideal PUF-based Protocols | Noisy PUF-based Protocols | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| [ | [ | [ | [ | [ | Ours | [ | [ | [ | Ours | |
| Traceability | √ | |||||||||
| Lack of Forward Secrecy | √ | √ | √ | √ | ||||||
| Impersonation | ||||||||||
| Desynchronization | √ | √ | ||||||||
| Physical Attacks | √ | √ | √ | √ | ||||||
Efficiency performance comparison.
| Protocols | Computation | Storage | Bandwidth | Scalability | |
|---|---|---|---|---|---|
|
| [ | 4Hash + 2PUF + RNG | 512 | 384 | No |
| [ | 3LFSR + 2PUF | 512 | 384 | Yes | |
| [ | 2PUF + RNG | 384 | 256 | Yes | |
| [ | 5Hash + 6PUF + RNG | 512 | 384 | Yes | |
| [ | 4Hash + 2PUF + RNG | 128 + 64n * | 320 | Yes | |
| Ours | 5Hash + 2PUF + RNG | 128 | 384 | Yes | |
|
| [ | 3Hash + 2PUF + RNG + SKE + FE.Gen | 192 | 2168 | No |
| [ | 3Hash + 2PUF + RNG + SKE + CBKA + FE.Rec | 1804 | 2168 | No | |
| [ | 5Hash + 2PUF + RNG + FE.Rec | 1456 + 1392n * | 1392 | Yes | |
| Ours | 6Hash + 2PUF + RNG + FE.Rec | 1392 | 1392 | Yes |
Hash: Hash Function; PUF: Physical Unclonable Function; RNG: Random Number Generator; LFSR: Linear Feedback Shift Register; SKE: Symmetric Key Encryption; CBKA: Channel-based Key Agreement Operations; FE.Gen: Fuzzy Extractor Generation; FE.Rec: Fuzzy Extractor Reconstruction. * For the protocols in Gope et al. [47], n is the number of pseudo-identities stored in the tag.