Abstract | ||
---|---|---|
The attacker can access the RFID systems illegally because authentication operations on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because these utilize Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the low-cost RFID authentication protocol are proposed. The challenge-response pairs (PUF’s input and output) are encrypted by the PUF’s characteristics, not by Hash and AES. Besides, the encryption method is changed by the instruction code. Therefore, it is difficult for the attacker to analyze challenge-response pairs. The proposed scheme defends several kinds of attacks, which are physical, modeling, spoofing and location tracking attacks. We implemented the PUF-based encryption processor at low cost with small footprint and low power. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1109/CIT.2010.400 | CIT |
Keywords | Field | DocType |
challenge-response pair,rfid systems,low power,low-cost rfid authentication protocol,authentication method,encryption method,low-cost rfid tag,low cost,puf-based encryption processor,rfid system,authentication operation,encryption,puf,authentication,physical model,instruction sets,authentication protocol,aes,digital circuits,rfid tag,servers,hash,cryptographic protocols,integrated circuit design,protocols,registers,wireless communication,embedded systems,physically unclonable function,authorisation | Authentication,Cryptographic protocol,Spoofing attack,Computer science,Server,Computer network,Encryption,Authentication protocol,Hash function,Physical unclonable function,Embedded system | Conference |
Citations | PageRank | References |
7 | 0.65 | 6 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Won-Seok Choi | 1 | 55 | 5.55 |
Sungsoo Kim | 2 | 115 | 24.95 |
Yonghwan Kim | 3 | 139 | 20.18 |
Yongsoo Park | 4 | 8 | 1.69 |
Kwangseon Ahn | 5 | 18 | 4.16 |