DocumentCode :
3599710
Title :
PUF-Based RFID Ownership Transfer Protocol in an Open Environment
Author :
Qing-Shan Li ; Xiao-Lin Xu ; Zhong Chen
Author_Institution :
Key Lab. of Network & Software Security Assurance, Peking Univ., Beijing, China
fYear :
2014
Firstpage :
131
Lastpage :
137
Abstract :
In the supply chain, RFID tags are deployed more widely. In the life of the supply chain, the owner of the tag will change frequently. Ownership transfer protocol can achieve the purpose that the access rights of the tag are transferred from the original owner to the new owner, and protect the privacy of the original owner and the new owner. To resist cloning attack and side channel analysis attack, physical unclonable function (PUF) has been proposed to enhance the security of the tags. Since the PUF of each tag is unique and different, it is difficult to be forged. However, most of PUF-based authentication protocols need the response value previously stored in the readers. On the other hand, most of the ownership transfer protocols assume the original owner and the new owner has a secure channel. However, in an open environment, due to time and space constraints, such a channel is often unable to quickly established. In this paper, we studied the ownership transfer protocols in an open environment and proposed a PUF-based RFID ownership transfer protocols, PROTP. The new protocol is the first ownership transfer protocol based on the PUF in an open environment. The new protocol does not need to store the respond values of the PUF. To utilize the randomness of the PUF, it replaces the pseudo-random generator. Meanwhile, PROTP can protect the privacy of the original owner and the new owner. In terms of efficiency, since the protocol is designed to satisfy the requirement in an open environment, the total cost of the computation is more than others protocols. However, due to the new protocol utilizes the PUF to replace the pseudo-random generator, the each step of the authentication messages achieves a better optimization in computational cost.
Keywords :
cryptographic protocols; message authentication; radiofrequency identification; random number generation; supply chains; transport protocols; PROTP; PUF-based RFID ownership transfer protocol; PilF-based authentication protocol; cloning attack; computational cost optimization; message authentication; open environment; physical unclonable function; pseudorandom generator; radio frequency identification tag; side channel analysis attack; supply chain; Authentication; Privacy; Protocols; RFID tags; Resists; Ownership Transfer; Physical Unclonable Function; Privacy Protection; Protocol; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Parallel and Distributed Computing, Applications and Technologies (PDCAT), 2014 15th International Conference on
Type :
conf
DOI :
10.1109/PDCAT.2014.25
Filename :
7174777
Link To Document :
بازگشت