PUF-Based Secure Checker Protocol for Networked RFID Systems

被引:0
|
作者
Ray, Biplob [1 ]
Chowdhury, Morshed [1 ]
Abawajy, Jemal [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Parallel & Distributed Comp Lab, Melbourne, Vic, Australia
关键词
PUF; unclonable; checker; protocol; NRS; RFID; privacy; injection of fake objects; non-repudiation;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio Frequency Identification (RFID) system is an emerging technology for automating object identification. The Networked RFID System (NRS) is a component of a distributed object identification network which facilitates automated supply chain management. It also makes the Internet of Things (IoT) concept a reality. To increase the business feasibility of NRS implementation, the system should be able to ensure the visibility and traceability of the object throughout the chain using a checker protocol. By doing so, the protocol will check the genuineness of the object and the genuineness of the object's previous travel path on-site. While doing so, the protocol needs to ensure the security requirement of the system. To this end, we propose a secure checker protocol for NRS which will use a PUF (Physically Unclonable Function) and simple cryptographic primitives. The protocol provides security (protect privacy of the partners, injection of fake objects, non-repudiation, and unclonability), visibility and traceability for NRS. It is also suitable for passive tags.
引用
收藏
页码:78 / 83
页数:6
相关论文
共 50 条
  • [1] A Double PUF-Based RFID Authentication Protocol
    Li T.
    Liu Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1801 - 1810
  • [2] Secure PUF-Based Authentication Systems
    Tun, Naing Win
    Mambo, Masahiro
    SENSORS, 2024, 24 (16)
  • [3] A PUF-Based Secure Communication Protocol for IoT
    Chatterjee, Urbi
    Chakraborty, Rajat Subhra
    Mukhopadhyay, Debdeep
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)
  • [4] A Secure PUF-Based Unilateral Authentication Scheme for RFID System
    Pramod Kumar Maurya
    Satya Bagchi
    Wireless Personal Communications, 2018, 103 : 1699 - 1712
  • [5] A Secure PUF-Based Unilateral Authentication Scheme for RFID System
    Maurya, Pramod Kumar
    Bagchi, Satya
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (02) : 1699 - 1712
  • [6] A Secure PUF-Based Authentication Protocol for Remote Keyless Entry Systems in Cars
    Parameswarath, Rohini Poolat
    Sikdar, Biplab
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (07) : 9825 - 9838
  • [7] PUF-based Anonymous RFID system Ownership Transfer Protocol
    Sun, Ziwen
    Wei, Min
    PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 6367 - 6373
  • [8] PUF-based RFID Ownership Transfer Protocol in an Open Environment
    Li, Qing-Shan
    Xu, Xiao-Lin
    Chen, Zhong
    2014 15TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT 2014), 2014, : 131 - 137
  • [9] Cyber Security Protocol for Secure Traffic Monitoring Systems using PUF-based Key Management
    Pudi, Vikramkumar
    Bodapati, Srinivasu
    Kumar, Sachin
    Chattopadhyay, Anupam
    2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2020) (FORMERLY INIS), 2020, : 103 - 108
  • [10] Secure Object Tracking Protocol for Networked RFID Systems
    Ray, Biplob
    Howdhury, Morshed
    Abawajy, Jemal
    Jesmin, Monika
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 135 - 141