基于RRAM PUF的轻量级RFID认证协议Lightweight RFID Authentication Protocol Based on RRAM PUF
陈飞鸿;张锋;陈军宁;吴秀龙;
摘要(Abstract):
针对当前轻量级的射频识别(RFID)加密方案信息防护手段有限的问题,结合由阻变存储器(RRAM)构成的物理不可克隆函数(PUF),提出了一种新型的轻量级RFID双向认证协议。利用多级响应加密机制实现阅读器与标签之间的安全认证处理。结合RRAM PUF模型,采用了特殊的纠错处理方法提高PUF响应的可靠性并阻止了信息泄露。此外添加了密钥更新机制和异常攻击标识,抵御了追踪攻击和去同步攻击等威胁。经仿真、分析和对比结果表明,该协议可以有效抵抗多种攻击手段,具有较高的安全性和较低的计算成本。
关键词(KeyWords): 射频识别(RFID);阻变存储器(RRAM);物理不可克隆函数(PUF);安全认证协议;轻量级
基金项目(Foundation): 国家重点研发计划(2018YFB0407500)
作者(Author): 陈飞鸿;张锋;陈军宁;吴秀龙;
Email:
DOI:
参考文献(References):
- [1]TEWARI A,GUPTA B B.Cryptanalysis of a novel ultralightweight mutual authentication protocol for Io T devices using RFID tags[J].The Journal of Supercomputing,2017,73(3):1085-1102.
- [2]SOHRABI-BONAB Z,ALAGHEBAND M R,AREF M R,et al.Formal cryptanalysis of a CRC-based RFID authentication protocol[C]//Proceedings of the 22nd Iranian Conference on Electrical Engineering(ICEE),2014:1642-1647.
- [3]PANG L,HE L,PEI Q,et al.Secure and efficient mutual authentication protocol for RFID conforming to the EPCC-1 G-2 standard[C]//Proceedings of the IEEE Wireless Communications and Networking Con-ference(WCNC),2014:1870-1875.
- [4]GOPE P,LEE J,QUEK T Q S.Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions[J].IEEE Transactions on Information Forensics and Security,2018,13(11):2831-2843.
- [5]HE Z Q,ZOU L.High-efficient RFID authentication protocol based on physical unclonable function[C]//Proceedings of the 8th International Conference on Wireless Communications,Networking and Mobile Computing,2012:1-4.
- [6]徐旭光,欧毓毅,凌捷,等.基于PUF的轻量级RFID安全认证协议[J].计算机应用与软件,2014,31(11):302-306.
- [7]XU H,DING J,LI P,et al.A lightweight RFID mutual authentication protocol based on physical unclonable function[J].Sensors,2018,18(3):760.
- [8]MAJZOOBI M,ROSTAMI M,KOUSHANFAR F,et al.Slender PUF protocol:A lightweight,robust,and secure authentication by substring matching[C]//Proceedings of2012 IEEE Symposium on Security and Privacy Workshops,2012:33-44.
- [9]XIE S,LIANG W,XU J,et al.A novel bidirectional RFIDidentity authentication protocol[C]//Proceedings of 2018IEEE Smart World,Ubiquitous Intelligence&Computing,Advanced&Trusted Computing,Scalable Computing&Communications,Cloud&Big Data Computing,Internet of People and Smart City Innovation,2018:301-307.
- [10]AYSU A,GULCAN E,MORIYAMA D,et al.End-to-end design of a puf-based privacy preserving authentication protocol[C]//Proceedings of the 17th Workshop on Cryptographic Hardware and Embedded Systems,2015:556-576.
- [11]HUTH C,AYSU A,GUAJARDO J,et al.Secure and private,yet lightweight,authentication for the Io T via PUF and CBKA[C]//Proceedings of the 19th Annual International Conference on Information Security and Cryptology,2016:28-48.
- [12]HERDER C,YU M D,KOUSHANFAR F,et al.Physical unclonable functions and applications:A tutorial[J].Proceedings of the IEEE,2014,102(8):1126-1141.
- [13]LIU R,WU H,PANG Y,et al.Experimental characterization of physical unclonable function based on 1 KBresistive random access memory arrays[J].IEEE Electron Device Letters,2015,36(12):1380-1383.
- [14]PANG Y,WU H,GAO B,et al.Design and optimization of strong Physical Unclonable Function(PUF) based on RRAM array[C]//Proceedings of 2017 International Symposium on VLSI Technology,Systems and Application(VLSI-TSA),2017:1-2.
- [15]LIU R,WU H,PANG Y,et al.A highly reliable and tamper-resistant RRAM PUF:Design and experimental validation[C]//Proceedings of IEEE International Symposium on Hardware Oriented Security and Trust(HOST),2016:13-18.
- [16]PANG Y C,GAO B,WU D,et al.25.2 A reconfigurable RRAM physically unclonable function utilizing post-process randomness source with<6×10-6native bit error rate[C]//Proceedings of 2019 IEEE International Solid-State Circuits Conference,2019:402-404.
- [17]BURROWS M,ABADI M,NEEDHAM R.A logic of authentication[J].ACM Transactions on Computer Systems,1990,8(1):18-36.
- [18]张紫楠,郭渊博.物理不可克隆函数综述[J].计算机应用,2012,32(11):3115-3120.
- [19]童嘉庆,董庆宽,霍伟光.基于云数据库的低成本RFID认证协议[J].密码学报,2015,2(4):333-341.
- [20]YUKSEL K.Universal hashing for ultra-low-power cryptographic hardware applications[D].Worcester:Worcester Polytechnic Institute,2004.
扩展功能
本文信息
服务与反馈
本文关键词相关文章
本文作者相关文章
中国知网
分享