Title
PUF-based Encryption Processor for the RFID Systems
Abstract
The attacker can access the RFID systems illegally because authentication operations on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because these utilize Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the low-cost RFID authentication protocol are proposed. The challenge-response pairs (PUF’s input and output) are encrypted by the PUF’s characteristics, not by Hash and AES. Besides, the encryption method is changed by the instruction code. Therefore, it is difficult for the attacker to analyze challenge-response pairs. The proposed scheme defends several kinds of attacks, which are physical, modeling, spoofing and location tracking attacks. We implemented the PUF-based encryption processor at low cost with small footprint and low power.
Year
DOI
Venue
2010
10.1109/CIT.2010.400
CIT
Keywords
Field
DocType
challenge-response pair,rfid systems,low power,low-cost rfid authentication protocol,authentication method,encryption method,low-cost rfid tag,low cost,puf-based encryption processor,rfid system,authentication operation,encryption,puf,authentication,physical model,instruction sets,authentication protocol,aes,digital circuits,rfid tag,servers,hash,cryptographic protocols,integrated circuit design,protocols,registers,wireless communication,embedded systems,physically unclonable function,authorisation
Authentication,Cryptographic protocol,Spoofing attack,Computer science,Server,Computer network,Encryption,Authentication protocol,Hash function,Physical unclonable function,Embedded system
Conference
Citations 
PageRank 
References 
7
0.65
6
Authors
5
Name
Order
Citations
PageRank
Won-Seok Choi1555.55
Sungsoo Kim211524.95
Yonghwan Kim313920.18
Yongsoo Park481.69
Kwangseon Ahn5184.16