PUF Based Scalable Private RFID Authentication
- 1 August 2011
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2011 Sixth International Conference on Availability, Reliability and Security
- p. 473-478
- https://doi.org/10.1109/ares.2011.73
Abstract
In this paper, we propose a privacy-preserving authentication scheme for RFID systems with fast lookup time. Our solution is based on the use of Physically Unclonable Functions (PUFs). Although there are many proposals that addresses the security and privacy issues of RFID, the search efficiency still remains as a challenging issue. A first tree based mutual authentication scheme for RFID systems has been proposed by Molnar and Wagner to solve the search efficiency problem. The large communication overhead of this scheme has been reduced by Dimitriou performing the authentication with one message from the tag to the reader. However, tree-based schemes are vulnerable to tag compromising attack due to lack key-updating mechanism. Therefore, tree-based schemes are weak private in the Vaudenay-Model. In this paper, we present a tree-based authentication protocol for RFID systems that is destructive-private in the Vaudenay-Model. Our proposed scheme provides resistance against tag compromising attack by using PUFs as a secure storage to keep secrets of the tag.Keywords
This publication has 10 references indexed in Scilit:
- Time Measurement Threatens Privacy-Friendly RFID Authentication ProtocolsLecture Notes in Computer Science, 2010
- Secure RFID Authentication with Efficient Key-LookupPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable FunctionLecture Notes in Computer Science, 2008
- Storage-Awareness: RFID Private Authentication based on Sparse TreePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Dynamic Key-Updating: Privacy-Preserving Authentication for RFID SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- On Privacy Models for RFIDLecture Notes in Computer Science, 2007
- RFID security and privacy: a research surveyIEEE Journal on Selected Areas in Communications, 2006
- A Scalable and Provably Secure Hash-Based RFID ProtocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Privacy and security in library RFIDPublished by Association for Computing Machinery (ACM) ,2004
- A cryptanalytic time-memory trade-offIEEE Transactions on Information Theory, 1980