4.5 Article

A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning

Journal

ACM TRANSACTIONS ON INTERNET TECHNOLOGY
Volume 22, Issue 2, Pages -

Publisher

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3426968

Keywords

Industrial internet of things (IIoT); arbiter physical unclonable function (APUF); deep learning (DL); radio frequency identification (RFID)

Funding

  1. National Natural Science Foundation of China [62072170, 62072078]
  2. Fundamental Research Funds for the Central Universities [531118010527]
  3. Science and Technology Key Projects of Hunan Province [2022GK2015]
  4. Hunan Provincial Natural Science Foundation of China [2021JJ30341]

Ask authors/readers for more resources

The Industrial Internet of Things (IIoT) aims to improve economic benefits by optimizing process controls, but the use of Radio Frequency Identification (RFID) technology in IIoT raises concerns about security and cost. To address these issues, a mutual authentication scheme incorporating Deep Learning techniques is proposed for secure access authentication of IC circuits on the IoT.
The Industrial Internet of Things (IIoT) is designed to refine and optimize the process controls, thereby leveraging improvements in economic benefits, such as efficiency arid productivity. However, the Radio Frequency Identification (RFID) technology in an IIoT environment has problems such as low security and high cost. To overcome such issues, a mutual authentication scheme that is suitable for RFID systems, wherein techniques in Deep Learning (DL) are incorporated onto the Arbiter Physical Unclonable Function (APUF) for the secured access authentication of the IC circuits on the IoT, is proposed. The design applies the APUF-MPUF mutual authentication structure obtained by DL to generate essential real-time authentication information, thereby taking advantage of the feature that the tag in the PUF circuit structure does not need to store any essential information and resolving the problem of key storage. The proposed scheme also uses a bitwise comparison method, which hides the PUF response information and effectively reduces the resource overhead of the system during the verification process, to verify the correctness of the two strings. Security analysis demonstrates that the proposed scheme has high robustness and security against different conventional attack methods, and the storage and communication costs are 95.7% and 42.0% lower than the existing schemes, respectively.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available