A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function

With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

[1]  S. Devadas,et al.  Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.

[2]  Masoud Hadian Dehkordi,et al.  Improvement of the Hash-Based RFID Mutual Authentication Protocol , 2014, Wirel. Pers. Commun..

[3]  Da-Zhi Sun,et al.  Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol , 2016, Wirel. Pers. Commun..

[4]  Maurizio Rebaudengo,et al.  A novel simulator for RFID reader-to-reader anti-collision protocols , 2015, 2015 International EURASIP Workshop on RFID Technology (EURFID).

[5]  Xiaojun Zhang,et al.  A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety , 2015, Journal of Medical Systems.

[6]  Chimay J. Anumba,et al.  Radio-Frequency Identification (RFID) applications: A brief introduction , 2007, Adv. Eng. Informatics.

[7]  Davide Zanetti,et al.  Privacy-preserving clone detection for RFID-enabled supply chains , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).

[8]  Sándor Imre,et al.  Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems , 2012, EUNICE.

[9]  Derek Abbott,et al.  Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[10]  Alfredo De Santis,et al.  On Ultralightweight RFID Authentication Protocols , 2011, IEEE Transactions on Dependable and Secure Computing.

[11]  JaeCheol Ha,et al.  Low-Cost and Strong-Security RFID Authentication Protocol , 2007, EUC Workshops.

[12]  Ching-Hsien Hsu,et al.  Efficient identity authentication and encryption technique for high throughput RFID system , 2016, Secur. Commun. Networks.

[13]  Katina Michael,et al.  RFID and Supply Chain Management: Introduction to the Special Issue , 2008, J. Theor. Appl. Electron. Commer. Res..

[14]  Hideyoshi Harashima,et al.  Enhanced antigen presentation and CTL activity by transduction of mature rather than immature dendritic cells with octaarginine-modified liposomes. , 2009, Journal of controlled release : official journal of the Controlled Release Society.

[15]  Mete Akgün,et al.  Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems , 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications.

[16]  Yong Guan,et al.  Lightweight Mutual Authentication and Ownership Transfer for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[17]  Alessandro Perego,et al.  A quantitative model for the introduction of RFId in the fast moving consumer goods supply chain: Are there any profits? , 2009 .

[18]  B. B. Gupta,et al.  Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.

[19]  Maode Ma,et al.  An ultralightweight RFID authentication protocol with CRC and permutation , 2014, J. Netw. Comput. Appl..

[20]  Biplob Ray,et al.  PUF-based secure checker protocol for Networked RFID Systems , 2014, 2014 IEEE Conference on Open Systems (ICOS).

[21]  Elgar Fleisch,et al.  How to detect cloned tags in a reliable way from incomplete RFID traces , 2009, 2009 IEEE International Conference on RFID.

[22]  Nemai Chandra Karmakar,et al.  Introduction of electromagnetic image-based chipless RFID system , 2013, 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[23]  Zhihua Wang,et al.  A Low-Cost UHF RFID System With OCA Tag for Short-Range Communication , 2015, IEEE Transactions on Industrial Electronics.

[24]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[25]  Katina Michael,et al.  RFID - A Unique Radio Innovation for the 21st Century , 2010, Proc. IEEE.

[26]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.