4.5 Article

Hu-Fu: Replay-Resilient RFID Authentication

Journal

IEEE-ACM TRANSACTIONS ON NETWORKING
Volume 28, Issue 2, Pages 547-560

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNET.2020.2964290

Keywords

Internet of Things; RFID; device authentication

Funding

  1. National Key Research and Development Program of China [2018AAA0100500]
  2. NSFC [61832008, 61872285, 61751211, 61772413, 61802299]
  3. Fundamental Research Funds for the Central Universities
  4. Research Institute of Cyberspace Governance in Zhejiang University
  5. National Science Foundation [1932447, 1717948, 1750704]
  6. Direct For Computer & Info Scie & Enginr [1932447] Funding Source: National Science Foundation
  7. Division Of Computer and Network Systems [1932447] Funding Source: National Science Foundation
  8. Division Of Computer and Network Systems
  9. Direct For Computer & Info Scie & Enginr [1717948] Funding Source: National Science Foundation

Ask authors/readers for more resources

We provide the first solution to an important question, how a physical-layer authentication method can defend against signal replay attacks. It was believed that if an attacker can replay the exact same reply signal of a legitimate authentication object (such as an RFID tag), any physical-layer authentication method will fail. This paper presents Hu-Fu, the first physical layer RFID authentication protocol that is resilient to the major attacks including tag counterfeiting, signal replay, signal compensation, and brute-force feature reply. Hu-Fu is built on two fundamental ideas, namely inductive coupling of two tags and signal randomization. Hu-Fu does not require any hardware or protocol modification on COTS passive tags and can be implemented with COTS devices. We implement a prototype of Hu-Fu and demonstrate that it is accurate and robust to device diversity and environmental changes, including locations, distance, and temperature. Hu-Fu provides a new direction of battery-free/low-power device authentication that enables numerous IoT applications.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available