2019
DOI: 10.3390/s19132957
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight RFID Mutual Authentication Protocol with PUF

Abstract: Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers. To solve these issues, lots of authentication protocols are proposed based on physical unclonable funct… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(20 citation statements)
references
References 48 publications
0
18
0
2
Order By: Relevance
“…While PUFs are not cloneable, it is possible to clone a PUF key once it is extracted. Hence, a number of authentication protocols are proposed based on PUFs [11,[20][21][22]. For example, Xu et al's protocol is based on PUFs and the lightweight cryptography to carry out an efficient verification of a single tag [21].…”
Section: Cybersecurity At the Perception Layermentioning
confidence: 99%
“…While PUFs are not cloneable, it is possible to clone a PUF key once it is extracted. Hence, a number of authentication protocols are proposed based on PUFs [11,[20][21][22]. For example, Xu et al's protocol is based on PUFs and the lightweight cryptography to carry out an efficient verification of a single tag [21].…”
Section: Cybersecurity At the Perception Layermentioning
confidence: 99%
“…For instance, a delay PUF was deployed as a key generator in an anonymous e-money transaction protocol [27]. In [28], PUF is proposed for a RFID-authentication protocol. Here, the designed protocol requires an extra hash function and the proposed PUF needs to exchange extra data with the server to attain a stable response.…”
Section: Pufs Use-cases and Their Weaknessesmentioning
confidence: 99%
“…The proposed protocols are immune to physical attacks and clone attacks since the tag stores no secrets and equips with a PUF. Besides, it supports low-cost tags and the applications with a large amount of tags and its more suitable to enhance the security and privacy for IoT applications [2].…”
Section: Feng Zhu Peng LI He Xu Ruchuan Wang (2019)mentioning
confidence: 99%
“…Then readers identify the tag ID through the wireless communication between RFID tag and reader to make alert for unauthorized usage of the device or equipment. [2]. RFID system practices radio wave frequency technique to transfer signal and track any object that has a tagged with particular device.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation