Abstract
The widespread use of radio frequency identification (RFID) in IoTs makes authentication of RFID systems be widely concerned. In existing encryption schemes (e.g., Hash function) in electronic products, secure chip is hard to be used in high performance RFID system due to high computation complexity and cost. In this work, we consider problems in these performances and propose a PUF-GIMAP protocol by combining GIMAP protocol and physically unclonable functions (PUFs). The response of PUF is added into protocol. The mutual authentication between label and reader is realized by transmitting information such as secret key and dynamical pseudonym, which greatly ensures data security in transmission. After authentication, the reserved data is updated in time. The protocol analysis shows that the proposed scheme has the advantages of high security and high reliability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pagnin, E., Yang, A., Hu, Q., et al.: HB + DB math container loading Mathjax: distance bounding meets human based authentication. Future Gener. Comput. Syst. 6(11), 6–21 (2016)
Liang, W., Liao, B., Jiang, Y., Long, J., Peng, L.: Study on PUF based secure protection for IC design. Microprocess. Microsyst. 8(45), 56–66 (2016)
Manifavas, C., Hatzivasilis, G., Fysarakis, K., et al.: Lightweight cryptography for embedded systems–a comparative analysis. In: Data Privacy Management and Autonomous Spontaneous Security, pp. 333–349. Springer, Heidelberg (2014)
Arbit, A., Livne, Y., Oren, Y., et al.: Implementing public-key cryptography on passive RFID tags is practical. Int. J. Inf. Secur. 14(1), 85–99 (2015)
Li, H., Deng, G.: PUF-HB#: a lightweight RFID mutual authentication protocol. J. Beijing Univ. Posts Telecommun. 36(6), 13–17 (2013)
Rührmair, U., Sölter, J., Sehnke, F., et al.: PUF modeling attacks on simulated and silicon data. IEEE Trans. Inf. Forensics Secur. 8(11), 1876–1891 (2013)
Nilsson, E., Svensson, C.: Ultra-low power wake-up radio using envelope detector and transmission line voltage transformer. IEEE J. Emerg. Sel. Topics Circ. Syst. 3(1), 5–12 (2013)
Wikipedia. The Free Encyclopedia. http://en.wikipedia.org/wiki/FaradayCage
Ding, Z., Li, J., Feng, B.: Research on hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009)
Maiti, A., Gunreddy, V., Schaumont, P.: A systematic method to evaluate and compare the performance of physical unclonable functions. In: Embedded Systems Design with FPGAs, pp. 245–267. Springer, New York (2013)
Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J.: A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment. Math. Comput. Model. 58(12), 85–95 (2013)
Li, X., Niu, J., Khan, M.K., Liao, J.: An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5), 1365–1371 (2013)
Pappu, R.S.: Physical One-way Functions. Massachusetts Institute of Technology, Boston (2001)
Zhang, Z., Guo, Y.: Survey of physically unclonable function. J. Comput. Appl. 32(1), 3115–3120 (2012)
Igier, M., Vaudenay, S.: Distance bounding based on PUF. In: International Conference on Cryptology and Network Security, pp. 701–710. Springer International Publishing (2016)
Gurubani, J.B., Thakkar, H., Patel, D.R.: Improvements over extended LMAP+: RFID authentication protocol. In: IFIP Advances in Information and Communication Technology, pp. 225–231 (2012)
Wang, C.: Heuristic attack strategy for improving LMAP+ protocol. Comput. Sci. 41(5), 143–149 (2014)
Zhu, F.: New lightweight RFID bidirectional authentication protocol: PUF-LMAP+. Microcomput. Appl. 35(1), 1–4 (2016)
Zheng, J., Chen, B., Zhou, Y.: A RFID lightweight authentication protocol GIMAP. J. Chin. Comput. Syst. 34(3), 530–534 (2013)
Herder, C., Yu, M.D., Koushanfar, F., et al.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126–1141 (2014)
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Science Foundation of China (grant no. 61572188, 61502405), Hunan Provincial Natural Science Foundation of China (grant no. 2016jj2058), Scientific Research Project of Hunan University of Science and Technology (grant no. E51697), Xiamen science and technology Foundation (grant no. 3502Z20173035).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liang, W., Xie, S., Li, X., Long, J., Xie, Y., Li, KC. (2018). A Novel Lightweight PUF-Based RFID Mutual Authentication Protocol. In: Hung, J., Yen, N., Hui, L. (eds) Frontier Computing. FC 2017. Lecture Notes in Electrical Engineering, vol 464. Springer, Singapore. https://doi.org/10.1007/978-981-10-7398-4_36
Download citation
DOI: https://doi.org/10.1007/978-981-10-7398-4_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7397-7
Online ISBN: 978-981-10-7398-4
eBook Packages: EngineeringEngineering (R0)