4.7 Article

A double PUF-based RFID identity authentication protocol in service-centric internet of things environments

Journal

INFORMATION SCIENCES
Volume 503, Issue -, Pages 129-147

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2019.06.047

Keywords

Authentication; Integrated circuit (IC); Internet of things (IoT); Physical unclonable function (PUF); Radio frequency identification (RFID)

Funding

  1. National Natural Science Foundation of China [61572188]
  2. Xiamen Science and Technology Foundation [3502Z20173035]
  3. Scientific Research Program of New Century Excellent Talents in Fujian Province University, Industrial Robot Application of Fujian University Engineering Research Center, Minjiang University [MJUKF-IRA201802]
  4. Fujian Provincial Natural Science Foundation of China [2018J01570]
  5. CERNET Innovation Project [NGII20170411]

Ask authors/readers for more resources

The rapid development of sensing, automation and communication technologies has led to the proliferation of the Internet of Things (IoT), providing recognized promising opportunities to build complex industrial systems and applications, leveraging the growing ubiquity of Radio Frequency Identification (RFID) and wireless sensor devices. With the pervasiveness of the interconnected systems encompassed with an ever-growing number of RFID-enabled devices being deployed, RFID security is an issue of high concern. As lightweight security encryption primitive, Physical Unclonable Function (PUF) is used to protect the information security of low-cost devices. Unfortunately, they are vulnerable to attacks, so countermeasures should be employed in the design. Aimed at low-cost and security of connected IoT devices to satisfy various security requirements of RFID technology in IoT, a two-stage multiple-choice arbiter (TSMCA)-based PUF in RFID systems is proposed, referred as TSMCA PUF. It is aimed at the design of a double PUF-based bidirectional RFID identity authentication protocol that permits the realization of bidirectional authentication between a server and a tag for the IC authentication in low-cost RFID systems, where the exclusive-OR (XOR) and character padding operations are adopted to generate the response of the PUF; the string-matching method is used in authentication, without exposing the PUF response to the verifier. Evaluation and analysis show that the advantages over conventional schemes include reduced area, higher randomness, and high stability, yet experimental results depict that the proposed protocol is promising resilient against attacks and practical for the deployment of low-cost hardware. (C) 2019 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available