PUF-Based Authentication-Oriented Architecture for Identification Tags

被引:1
|
作者
Rullo, Antonino [1 ]
Felicetti, Carmelo [1 ]
Vatalaro, Massimo [1 ]
De Rose, Raffaele [1 ]
Lanuzza, Marco [1 ]
Crupi, Felice [1 ]
Sacca, Domenico [1 ]
机构
[1] Univ Calabria, Dept Comp Engn Modeling Elect & Syst, I-87036 Arcavacata Di Rende, Italy
关键词
Physical unclonable function; Authentication; Protocols; Object recognition; Silicon; Internet of Things; Transistors; device architecture; ECDSA; elliptic curve cryptography; hardware design; identification; physical unclonable function; smart tag; PHYSICALLY UNCLONABLE FUNCTION; KEY-EXCHANGE; SECURE; PROTOCOL; RESILIENT; ATTACKS; ROBUST;
D O I
10.1109/TDSC.2024.3387568
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smart tags are compact electronic devices affixed to or embedded into objects to facilitate identification, monitoring, and data exchange. Consequently, secure authentication of these tags is a crucial issue, as objects must reliably verify their identity before sharing sensitive information with other entities. The application of Physical Unclonable Functions (PUF) as a device's "digital fingerprint" has attracted significant attention, yet existing PUF-based authentication methods exhibit security vulnerabilities, either due to the authentication protocol itself or the limited reliability of the PUF technology used. Moreover, there has been a considerable focus on the software aspect, often overlooking the critical role of hardware design, which can become a target for attacks aimed at compromising the device's identity or act as a hindrance in the manufacturing process. In light of these points, this paper introduces an identification tag architecture that leverages PUF technology, focusing on authentication. This architecture features a straightforward but efficient authentication protocol, underpinned by a new and highly stable PUF model. The overall architecture encompasses particular hardware implementation aspects that significantly simplify the tag's enrollment phase and minimize vulnerabilities to attacks. The paper also describes a prototype of this identification tag and provide detailed insights into its application.
引用
收藏
页码:66 / 83
页数:18
相关论文
共 50 条
  • [21] PUF-IPA: A PUF-based Identity Preserving Protocol for Internet of Things Authentication
    Qureshi, Mahmood Azhar
    Munir, Arslan
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [22] A PUF-based lightweight identity authentication protocol for Internet of Vehicles
    Men, Honglei
    Cao, Li
    Zheng, Guoli
    Chen, Liang
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [23] A Secure PUF-Based Unilateral Authentication Scheme for RFID System
    Maurya, Pramod Kumar
    Bagchi, Satya
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (02) : 1699 - 1712
  • [24] A Secure PUF-Based Unilateral Authentication Scheme for RFID System
    Pramod Kumar Maurya
    Satya Bagchi
    Wireless Personal Communications, 2018, 103 : 1699 - 1712
  • [25] A New Efficient PUF-Based Mutual Authentication Scheme for Drones
    Ayebie, Edoukou Berenger
    Bou-chaaya, Karam
    Rais, Helmi
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023, 2023, 14529 : 67 - 84
  • [26] PUF-Based Fuzzy Authentication Without Error Correcting Codes
    Yan, Wei
    Tehranipoor, Fatemeh
    Chandy, John A.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (09) : 1445 - 1457
  • [27] Proving authentication property of PUF-based mutual authentication protocol based on logic of events
    Jiawen Song
    Meihua Xiao
    Tong Zhang
    Haoyang Zhou
    Soft Computing, 2022, 26 : 841 - 852
  • [28] Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT
    Lounis, Karim
    Zulkernine, Mohammad
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (02):
  • [29] Reliable PUF-Based Local Authentication With Self-Correction
    Lao, Yingjie
    Yuan, Bo
    Kim, Chris H.
    Parhi, Keshab K.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (02) : 201 - 213
  • [30] Designing secure PUF-based authentication protocols for constrained environments
    Sang-Woong Lee
    Masoumeh Safkhani
    Quynh Le
    Omed Hassan Ahmed
    Mehdi Hosseinzadeh
    Amir Masoud Rahmani
    Nasour Bagheri
    Scientific Reports, 13 (1)