A RFID Privacy Protocol Based on PUF

被引:0
|
作者
Xie Yumin [1 ]
机构
[1] Nanjing Inst Technol, Nanjing, Jiangsu, Peoples R China
来源
MATERIALS, MECHATRONICS AND AUTOMATION, PTS 1-3 | 2011年 / 467-469卷
关键词
RFID; Privacy; PUF; Silicon PUF; Key Management;
D O I
10.4028/www.scientific.net/KEM.467-469.554
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical Unclonable Function (PUF) is an excellent choice for key management in security domain. A Silicon PUF based RFID privacy protocol is proposed. Unlike general PUF applications which apply PUF in the tag-end, we employ PUF within a reader. Challenge -Responding Pairs (CRPs) on PUF in the proposal are reusable. Tag's data structure is designed to a three level stack. Each level of the stack stands for a privacy state of the tag. State changing needs a password which only be transferred with plaintext. Password produce, storage, input/output operations are program control. We take a supermarket as application scene.
引用
收藏
页码:554 / 560
页数:7
相关论文
共 50 条
  • [21] SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance
    Tao Li
    Yali Liu
    Jianting Ning
    Peer-to-Peer Networking and Applications, 2023, 16 : 1652 - 1667
  • [22] A Privacy and Authentication Protocol for Mobile RFID System
    Huang, Hui-Feng
    Yu, Po-Kai
    Liu, Kuo-Ching
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INDEPENDENT COMPUTING (ISIC), 2014, : 84 - 89
  • [23] Privacy and Authentication Protocol for Mobile RFID Systems
    Ben Niu
    Xiaoyan Zhu
    Haotian Chi
    Hui Li
    Wireless Personal Communications, 2014, 77 : 1713 - 1731
  • [24] Fast privacy preserving RFID authentication protocol
    Zhai, Li
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (12): : 3215 - 3222
  • [25] Privacy and Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Chi, Haotian
    Li, Hui
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (03) : 1713 - 1731
  • [26] An Improvement on RFID Authentication Protocol with Privacy Protection
    Lee, Y. -C.
    Hsieh, Y. -C.
    You, P-S.
    Chen, T. -C.
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 569 - +
  • [27] Lightweight RFID Authentication Protocol for Cloud Services using PUF Encryption
    Ye Qiao
    Sun ZiWen
    PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 5629 - 5634
  • [28] A new security and privacy on RFID mutual authentication protocol based on partial ID
    Zhang, Hui
    Hou, Chao-Huan
    Wang, Dong-Hui
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (04): : 853 - 856
  • [29] A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications
    Arslan, Atakan
    Colak, Sultan Aldirmaz
    Erturk, Sarp
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (04) : 2653 - 2691
  • [30] A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications
    Atakan Arslan
    Sultan Aldırmaz Çolak
    Sarp Ertürk
    Wireless Personal Communications, 2021, 120 : 2653 - 2691