A Novel Bidirectional RFID Identity Authentication Protocol

Rapid advances of IC (Integrated Circuit) technology make the security be widely concerned. Traditional identity authentication protocols depend on binary secret key and encryption algorithm, and issues of complex computation and high cost exist in previous protocols. To realize a low-cost RFID (Radio Frequency Identification) identity authentication protocol, we propose a two-level arbiter PUF in RFID systems, which has advantages of less area, higher randomness and higher stability compared to that of traditional structure. In this work, a double PUF based bidirectional RFID identity authentication protocol is proposed on basis of the proposed PUF structure, aimed at providing authentication for IC, such as low-cost RFID system. The bidirectional authentication between the server and the tag is realized. In authentication, the dichotomy XOR operation and character padding are performed to the response of PUF, instead of making use the string matching method, which will not expose the response of PUF to the verifier. Experimental analysis shows that, the propose protocol can resist various malicious attacks and can be used in many low-cost hardware systems.

[1]  Srinivas Devadas,et al.  PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.

[2]  Srinivas Devadas,et al.  Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[3]  Charalampos Manifavas,et al.  Lightweight Cryptography for Embedded Systems - A Comparative Analysis , 2013, DPM/SETOP.

[4]  Sherali Zeadally,et al.  An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.

[5]  Jonathan Katz Analysis of a Proposed Hash-Based Signature Standard , 2016, SSR.

[6]  Georg T. Becker,et al.  The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs , 2015, CHES.

[7]  Wang Cha Heuristic Attack Strategy Against Improved LMAP+ Protocol , 2014 .

[8]  S. Devadas,et al.  Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.

[9]  Gildas Avoine,et al.  Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography , 2013, IEEE Transactions on Mobile Computing.

[10]  Woei-Jiunn Tsaur,et al.  PUF-Based Protocols About Mutual Authentication and Ownership Transfer for RFID Gen2 v2 Systems , 2016, IMECS 2016.

[11]  Ch. Venkateswarlu,et al.  SAFER CARDS ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING , 2014 .

[12]  Debdeep Mukhopadhyay,et al.  PUFs as Promising Tools for Security in Internet of Things , 2016, IEEE Des. Test.

[13]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[14]  Jeroen Delvaux Security Analysis of PUF-based Key Generation and Entity Authentication ; Veiligheidsanalyse van PUF-gebaseerde sleutelgeneratie en entiteitsauthenticatie , 2017 .

[15]  Srinivas Devadas,et al.  Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching , 2014, IEEE Transactions on Emerging Topics in Computing.

[16]  Wim Dehaene,et al.  On the effect of technology scaling on variation-resilient sub-threshold circuits , 2015 .

[17]  Emil Nilsson,et al.  Ultra Low Power Wake-Up Radio Using Envelope Detector and Transmission Line Voltage Transformer , 2013, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[18]  Avishai Wool,et al.  Implementing public-key cryptography on passive RFID tags is practical , 2015, International Journal of Information Security.

[19]  Derek Abbott,et al.  Emerging Physical Unclonable Functions With Nanotechnology , 2016, IEEE Access.

[20]  Leonid Bolotnyy,et al.  Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[21]  Maurizio Pizzonia,et al.  Efficient and practical authentication of PUF-based RFID tags in supply chains , 2010, 2010 IEEE International Conference on RFID-Technology and Applications.