4.5 Article

A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning

期刊

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3426968

关键词

Industrial internet of things (IIoT); arbiter physical unclonable function (APUF); deep learning (DL); radio frequency identification (RFID)

资金

  1. National Natural Science Foundation of China [62072170, 62072078]
  2. Fundamental Research Funds for the Central Universities [531118010527]
  3. Science and Technology Key Projects of Hunan Province [2022GK2015]
  4. Hunan Provincial Natural Science Foundation of China [2021JJ30341]

向作者/读者索取更多资源

The Industrial Internet of Things (IIoT) aims to improve economic benefits by optimizing process controls, but the use of Radio Frequency Identification (RFID) technology in IIoT raises concerns about security and cost. To address these issues, a mutual authentication scheme incorporating Deep Learning techniques is proposed for secure access authentication of IC circuits on the IoT.
The Industrial Internet of Things (IIoT) is designed to refine and optimize the process controls, thereby leveraging improvements in economic benefits, such as efficiency arid productivity. However, the Radio Frequency Identification (RFID) technology in an IIoT environment has problems such as low security and high cost. To overcome such issues, a mutual authentication scheme that is suitable for RFID systems, wherein techniques in Deep Learning (DL) are incorporated onto the Arbiter Physical Unclonable Function (APUF) for the secured access authentication of the IC circuits on the IoT, is proposed. The design applies the APUF-MPUF mutual authentication structure obtained by DL to generate essential real-time authentication information, thereby taking advantage of the feature that the tag in the PUF circuit structure does not need to store any essential information and resolving the problem of key storage. The proposed scheme also uses a bitwise comparison method, which hides the PUF response information and effectively reduces the resource overhead of the system during the verification process, to verify the correctness of the two strings. Security analysis demonstrates that the proposed scheme has high robustness and security against different conventional attack methods, and the storage and communication costs are 95.7% and 42.0% lower than the existing schemes, respectively.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据