PUF-Based Secure Checker Protocol for Networked RFID Systems

被引:0
|
作者
Ray, Biplob [1 ]
Chowdhury, Morshed [1 ]
Abawajy, Jemal [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Parallel & Distributed Comp Lab, Melbourne, Vic, Australia
来源
2014 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS) | 2014年
关键词
PUF; unclonable; checker; protocol; NRS; RFID; privacy; injection of fake objects; non-repudiation;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio Frequency Identification (RFID) system is an emerging technology for automating object identification. The Networked RFID System (NRS) is a component of a distributed object identification network which facilitates automated supply chain management. It also makes the Internet of Things (IoT) concept a reality. To increase the business feasibility of NRS implementation, the system should be able to ensure the visibility and traceability of the object throughout the chain using a checker protocol. By doing so, the protocol will check the genuineness of the object and the genuineness of the object's previous travel path on-site. While doing so, the protocol needs to ensure the security requirement of the system. To this end, we propose a secure checker protocol for NRS which will use a PUF (Physically Unclonable Function) and simple cryptographic primitives. The protocol provides security (protect privacy of the partners, injection of fake objects, non-repudiation, and unclonability), visibility and traceability for NRS. It is also suitable for passive tags.
引用
收藏
页码:78 / 83
页数:6
相关论文
共 50 条
  • [21] Testing PUF-Based Secure Key Storage Circuits
    Cortez, Mafalda
    Roelofs, Gijs
    Hamdioui, Said
    di Natale, Giorgio
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [22] A PUF-based Lightweight and Secure Mutual Authentication Mechanism for Remote Keyless Entry Systems
    Parameswarath, Rohini Poolat
    Sikdar, Biplab
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1776 - 1781
  • [23] Designing secure PUF-based authentication protocols for constrained environments
    Lee, Sang-Woong
    Safkhani, Masoumeh
    Quynh Le
    Ahmed, Omed Hassan
    Hosseinzadeh, Mehdi
    Rahmani, Amir Masoud
    Bagheri, Nasour
    SCIENTIFIC REPORTS, 2023, 13 (01):
  • [24] A New Secure Scan Design with PUF-based Key for Authentication
    Wang, Qidong
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    2020 IEEE 38TH VLSI TEST SYMPOSIUM (VTS 2020), 2020,
  • [25] A PUF-based Mutual Authentication Protocol for Internet of Things
    Satamraju, Krishna Prasad
    Malarkodi, B.
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [26] A PUF-based Lightweight and Secure Mutual Authentication Mechanism for Remote Keyless Entry Systems
    Parameswarath, Rohini Poolat
    Sikdar, Biplab
    Proceedings - IEEE Global Communications Conference, GLOBECOM, 2022, : 1776 - 1781
  • [27] A Secure MQTT Framework from PUF-based Key Establishment
    Shin, SeongHan
    Kobara, Kazukuni
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1296 - 1301
  • [28] Testing Methods for PUF-Based Secure Key Storage Circuits
    Cortez, Mafalda
    Roelofs, Gijs
    Hamdioui, Said
    Di Natale, Giorgio
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2014, 30 (05): : 581 - 594
  • [29] A Low-overhead PUF-based Secure Scan Design
    Zhou, Wei
    Cui, Aijiao
    Chen, Cassi
    Qu, Gang
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 210 - 215
  • [30] Lightweight PUF-Based Authentication Protocol for IoT Devices
    Yilmaz, Yildiran
    Gunn, Steve R.
    Halak, Basel
    2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 38 - 43