An Authentication Scheme Based on PUF

被引:0
|
作者
Xie Yumin [1 ]
机构
[1] Nanjing Inst Technol, Nanjing, Jiangsu, Peoples R China
关键词
User Authentication; PUF; RFID; Attacks;
D O I
10.4028/www.scientific.net/KEM.467-469.561
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication is a key research domain in security. A user authentication scheme based on Physical Unclonable Function (PUF) is proposed. Unlike general PUF applications which apply PUF in the tag-end, we employ PUF within an Authentication Centre (AC), which is only used to verify a RFID tag is legal or not. When a tag is legal, the AC will send a password which is used only once to the request reader. The reader can use this password to decrypt the tag's sensitive information which is encrypted with the same identical password. The later password which is used in encryption is produced and used only once within the tag.
引用
收藏
页码:561 / 566
页数:6
相关论文
共 50 条
  • [41] A Lightweight Authentication Protocol for Network Security Based on PUF
    Xu, Zhao-Hui
    International Journal of Network Security, 2023, 25 (05) : 777 - 783
  • [42] Optimal Tradeoff of Secure PUF-based Authentication
    Kittichokechai, Kittipong
    Caire, Giuseppe
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 83 - 88
  • [43] A Double PUF-Based RFID Authentication Protocol
    Li T.
    Liu Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1801 - 1810
  • [44] A PUF-based hardware mutual authentication protocol
    Barbareschi, Mario
    De Benedictis, Alessandra
    Mazzocca, Nicola
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 : 107 - 120
  • [45] Blockchain-based authentication for IIoT devices with PUF
    Li, Dawei
    Chen, Ruonan
    Liu, Di
    Song, Yingxian
    Ren, Yangkun
    Guan, Zhenyu
    Sun, Yu
    Liu, Jianwei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 130
  • [46] P/Key: PUF based second factor authentication
    Uysal, Ertan
    Akguen, Mete
    PLOS ONE, 2023, 18 (02):
  • [47] Efficient Fuzzy Extractor Implementations for PUF Based Authentication
    Wen, Yuejiang
    Lao, Yingjie
    PROCEEDINGS OF THE 2017 12TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2017, : 119 - 125
  • [48] Proving authentication property of PUF-based mutual authentication protocol based on logic of events
    Song, Jiawen
    Xiao, Meihua
    Zhang, Tong
    Zhou, Haoyang
    SOFT COMPUTING, 2022, 26 (02) : 841 - 852
  • [49] Proving authentication property of PUF-based mutual authentication protocol based on logic of events
    Jiawen Song
    Meihua Xiao
    Tong Zhang
    Haoyang Zhou
    Soft Computing, 2022, 26 : 841 - 852
  • [50] Enhancing MQTT-SN Security with a Lightweight PUF-Based Authentication and Encrypted Channel Establishment Scheme
    Gong, Xiang
    Kou, Ting
    Li, Yan
    SYMMETRY-BASEL, 2024, 16 (10):