Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (1): 177-191.doi: 10.19665/j.issn1001-2400.2023.01.020
Previous Articles Next Articles
AI Lulin(),CHANG Zhengtai(),FAN Wenbing(),KONG Dehan()
Received:
2022-03-31
Online:
2023-02-20
Published:
2023-03-21
CLC Number:
AI Lulin, CHANG Zhengtai, FAN Wenbing, KONG Dehan. Lightweight RFID dual-tag authentication protocol using cloud and PUF[J].Journal of Xidian University, 2023, 50(1): 177-191.
"
协议 | 通信代价 | 服务器 搜索代价 | 标签存储 代价 | 标签计算代价 | 阅读器计算代价 |
---|---|---|---|---|---|
文献[ | 17L | O(N) | 2L | 4x+1d+3p+2rot | 1T+13x+1d+5rot+5p+3m+1rm |
文献[ | 12L | O(1) | 2L | 13x+3puf+2h+1c | — |
文献[ | 13L | O(1) | 2L | 2per+3x+1puf+1M+1upa | 1T+2pad+2x+1E |
文献[ | 16L | O(1) | 3L | 9x+1p+3cro | 1W+9x+1p+3cro |
文献[ | 8L | O(N) | L | 7x+2puf+4h+2p+1pad+1upa | 8x+2puf+4h+2p+1upa+1pad |
CP-LRDP | 16L | O(1) | 2L | 1x+2p+2puf+4scr | 6x+2p+3m+1rm+4scr+3uns |
[1] | 施虹宇, 邓伦治, 高岩, 等. 物联网中基于云的RFID认证方案[J]. 贵州师范大学学报:自然科学版, 2022, 40(2):88-95. |
SHI Hongyu, DENG Lunzhi, GAO Yan, et al. Cloud-Based RFID Authentication Scheme for Internet of Things[J]. Journal of Guizhou Normal University:Natural Sciences, 2022, 40(2):88-95. | |
[2] | FAN K, ZHU S, ZHANG K, et al. A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems[J]. IEEE Network, 2019, 33(2):44-49. |
[3] |
KAI F, QI L, KUAN Z, et al. Cloud-Based Lightweight Secure RFID Mutual Authentication Protocol in IoT[J]. Information Sciences, 2020, 527:329-340.
doi: 10.1016/j.ins.2019.08.006 |
[4] | DEVADAS S, SUH E, PARAL S, et al. Design and Implementation of PUF-Based" Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications[C]// 2008 IEEE International Conference on RFID.Piscataway:IEEE, 2008:58-64. |
[5] | RÜHRMAIR U, SEHNKE F, HOLTER J, et al. Modeling Attacks on Physical Unclonable Functions[C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM, 2010:237-249. |
[6] | 王利, 李二霞, 纪宇晨, 等. 基于PUF的抗物理克隆RFID安全认证协议[J]. 信息网络安全, 2020, 20(8):89-97. |
WANG Li, LI Erxia, JI Yuchen, et al. PUF-Based Anti-Physical Cloning RFID Security Authentication Protocol[J]. Netinfo Security, 2020, 20(8):89-97. | |
[7] | YE Q, SUN Z. Lightweight RFID Authentication Protocol for Cloud Services Using PUF Encryption[C/OL].[2021-12-20]. https://ieeexplore.ieee.org/document/9602061. |
[8] |
CHATTERJEE U, GOVINDAN V, SADHUKHAN R, et al. Building PUF Based Authentication and Key Exchange Protocol for IoT without Explicit CRPs in Verifier Database[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 16(3):424-437.
doi: 10.1109/TDSC.8858 |
[9] | SADEGHI A R, VISCONTI I, WACHSMANN C. PUF-Enhanced RFID Security and Privacy[C/OL].[2022-01-20]. https://www.researchgate.net/publication/265986050_PUF-enhanced_RFID_security_and_privac. |
[10] | LIM D, LEE J W, GASSEND B, et al. Extracting Secret Keys from Integrated Circuits[J]. IEEE Transactions on Very Large Scale Integration(VLSI) Systems, 2015, 13(10):1200-1205. |
[11] |
RÜHRMAIR U, SOLTER J, SEHNKE F, et al. PUF Modeling Attacks on Simulated and Silicon Data[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(11):1876-1891.
doi: 10.1109/TIFS.2013.2279798 |
[12] |
GU C, CHANG C H, LIU W, et al. A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF-Based Authentication[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020, 40(6):1183-1196.
doi: 10.1109/TCAD.2020.3036807 |
[13] | MAJZOOBI M, ROSTAMI M, KOUSHANFAR F, et al. Slender PUF Protocol:A Lightweight,Robust,and Secure Authentication by Substring Matching[C]// 2012 IEEE Symposium on Security and Privacy Workshops.Piscataway:IEEE, 2012:33-44. |
[14] |
YU M D, HILLER M, DELVAUX J, et al. A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication[J]. IEEE Transactions on Multi-Scale Computing Systems, 2016, 2(3):146-159.
doi: 10.1109/TMSCS.6687315 |
[15] |
GOPE P, LEE J, QUEK T Q S. Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(11):2831-2843.
doi: 10.1109/TIFS.2018.2832849 |
[16] |
CHATTERJEE U, GOVINDAN V, SADHUKHAN R, et al. Building PUF Based Authentication and Key Exchange Protocol for IoT without Explicit CRPs in Verifier Database[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 16(3):424-437.
doi: 10.1109/TDSC.8858 |
[17] | 范美月, 董庆宽, 王蕾, 等. 无 TTP 带权重的多所有者 RFID 标签认证协议[J]. 西安电子科技大学学报, 2021, 48(1):133-140. |
FAN Meiyue, DONG Qingkuan, WANG Lei, et al. TTP-Free Weighted Muti-Owner RFID Tag Authentication Protocol[J]. Journal of Xidian University, 2021, 48(1):133-140. | |
[18] | XIE W, XIE L, ZHANG Q, et al. Cloud-Based RFID Authentication[C]// 2013 IEEE International Conference on RFID.Piscataway:IEEE, 2013:168-175. |
[19] | KUMAR V, AHMAD M, MISHRA D, et al. RSEAP:RFID Based Secure and Efficient Authentication Protocol for Vehicular Cloud Computing[J]. Vehicular Communications, 2019, 11:100213. |
[20] | SAFKHANI M, CAMARA C, PERIS-LOPEZ P, et al. RSEAP2:An Enhanced Version of RSEAP,an RFID Based Authentication Protocol for Vehicular Cloud Computing[J]. Vehicular Communications, 2020, 11:100311. |
[21] |
LIANG W, XIE S, LONG J, et al. A Double PUF-Based RFID Identity Authentication Protocol in Service-Centric Internet of Things Environments[J]. Information Sciences, 2019, 503:129-147.
doi: 10.1016/j.ins.2019.06.047 |
[22] |
黄可可, 刘亚丽, 殷新春. 基于位重排变换的超轻量级 RFID双向认证协议[J]. 计算机应用, 2019, 39(1):118-125.
doi: 10.11772/j.issn.1001-9081.2018071738 |
HUANG Keke, LIU Yali, YIN Xinchun. Ultra-Lightweight RFID Mutual Authentication Protocol Based on Regeneration Transformation[J]. Journal of Computer Applications, 2019, 39(1):118-125.
doi: 10.11772/j.issn.1001-9081.2018071738 |
|
[23] | MUJAHID U, NAJAMULISLAM M, SHAMI M A. RCIA:A New Ultralightweight RFID Authentication Protocol Using Recursive Hash[J]. International Journal of Distributed Sensor Networks, 2015, 11(1):1-8. |
[24] | SAHOO D P, CHAKRABORTY R S, MUKHOPADHYAY D. Towards Ideal Arbiter PUF Design on Xilinx FPGA:A Practitioner's Perspective[C]// 2015 Euromicro Conference on Digital System Design.Piscataway:IEEE, 2015:559-562. |
[25] |
CAO Y, ZHENG W, ZHAO X, et al. An Energy-Efficient Current-Starved Inverter Based Strong Physical Unclonable Function with Enhanced Temperature Stability[J]. IEEE Access, 2019, 7:105287-105297.
doi: 10.1109/Access.6287639 |
[26] | 叶乔. 采用 PUF 的云服务 RFID 系统认证协议的研究[D]. 无锡: 江南大学, 2021. |
[27] |
VIGANÒ L. Automated Security Protocol Analysis With the AVISPA Tool[J]. Electronic Notes in Theoretical Computer Science, 2006, 155:61-86.
doi: 10.1016/j.entcs.2005.11.052 |
[28] |
FAN K, JIANG W, LI H, et al. Lightweight RFID Protocol for Medical Privacy Protection in IoT[J]. IEEE Transactions on Industrial Informatics, 2018, 14(4):1656-1665.
doi: 10.1109/TII.2018.2794996 |
[29] | 李涛, 刘亚丽. 一种基于双PUF的RFID认证协议[J]. 计算机研究与发展, 2021, 58(8):1801-1810. |
LI Tao, LIU Yali. A Double PUF-Based RFID Authentication Protocol[J]. Journal of Computer Research and Development, 2021, 58(8):1801-1810. |
[1] | CAO Xincheng, YAO Bin, HE Wangpeng, CHEN Binqiang, QING Tao. Edge-cloud collaborative transfer of process knowledge for digital manufacturing monitoring [J]. Journal of Xidian University, 2022, 49(6): 152-163. |
[2] | WANG Pengjun,CHEN Jia,ZHANG Yuejun,ZHUANG Youyi,LI Lewei,NI Li. Software PUF with multiple entropy sources based on path sensitization [J]. Journal of Xidian University, 2022, 49(6): 58-66. |
[3] | ZHANG Hong,HUANG Chuang,ZOU Hong,WANG Ruyan,XU Ruixin,LI Zhidu. QoE-awarevideo transmission resource allocation strategy for V-CRAN [J]. Journal of Xidian University, 2022, 49(3): 48-58. |
[4] | ZHOU Peng,YANG Jun. Index edge geometric convolution neural network for point cloud classification [J]. Journal of Xidian University, 2022, 49(2): 207-217. |
[5] | LV Yi,WANG Yanbin,ZHANG Hong,WANG Ruyan,ZHANG Puning. Resource allocation mechanism with energy consumption awareness in the edge enhanced H-CRAN [J]. Journal of Xidian University, 2022, 49(2): 67-78. |
[6] | QIAO Wenxin,LU Yu,LIU Yicen,LI Zhiwei,LI Xi. Dynamic scheduling method for service function chains in space air terrestrial aided edge cloud networks [J]. Journal of Xidian University, 2022, 49(2): 79-88. |
[7] | WANG Ruyan,LIU Jia,HE Peng,CUI Yaping. Preference aware participant selection strategy for edge-cloud collaborative crowdsensing [J]. Journal of Xidian University, 2022, 49(1): 142-151. |
[8] | YANG Haibin,LI Ruifeng,YI Zhengge,NIU Ke,YANG Xiaoyuan. Efficient cloud storage data auditing scheme without bilinear pairing [J]. Journal of Xidian University, 2022, 49(1): 47-54. |
[9] | LI Huadong,ZHANG Xueliang,WANG Xiaolei,LIU Hui,WANG Pengcheng,DU Junzhao. Multi-node cooperative game load balancing strategy in the Kubernetes cluster [J]. Journal of Xidian University, 2021, 48(6): 16-22. |
[10] | WANG Junjun,SUN Yue,LI Ying. Cloud removal method for the remote sensing image based on the GAN [J]. Journal of Xidian University, 2021, 48(5): 23-29. |
[11] | FAN Meiyue,DONG Qingkuan,WANG Lei,YANG Can. TTP-free weighted muti-owner RFID tag authentication protocol [J]. Journal of Xidian University, 2021, 48(1): 133-140. |
[12] | DANG Jisheng,YANG Jun. 3D model recognition and segmentation based on multi-feature fusion [J]. Journal of Xidian University, 2020, 47(4): 149-157. |
[13] | LI Jian,ZHANG Haoruo,HE Bin. Optimization algorithm for estimating the human pose by using the morphable model [J]. Journal of Xidian University, 2020, 47(2): 23-31. |
[14] | YAN Lin,LIU Kai,DUAN Meiyu. Lightweight deep neural network for point cloud classification [J]. Journal of Xidian University, 2020, 47(2): 46-53. |
[15] | CHEN Bo,WANG Pengjun,LI Gang. Lightweight authentication mechanism for IP protection of IoT [J]. Journal of Xidian University, 2019, 46(5): 62-68. |
|