Javascript must be enabled to continue!
A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions
View through CrossRef
Radio Frequency IDentification (RFID) is a radio communication technique. It identifies specific targets and acquires related data from the backend database by using radio frequency signal and no physical touch needed. Because of its advantages of low cost and remote identity-recognition, this technology has been widely used in many applications. However, the information, which is transmitted via radio signal, is easily eavesdropped and traced by an attacker. Therefore, it is important to design a secure RFID protocol which can ensure the authentication of the origin and the integrity of the transmitted information. Researchers have put their efforts into this field and proposed many solutions to deal with these issues. In particular, in 2012, Bassil et al. introduced an ultra-lightweight RFID protocol based on a physical unclonable function (PUF), which means that the tags in the RFID architecture are unclonable. However, the insecurity of the scheme has been pointed out recently. In this paper, we will propose a new ultra-lightweight RFID protocol based on PUF that can overcome the security loopholes occurs in Bassil et al.'s protocol.
Title: A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions
Description:
Radio Frequency IDentification (RFID) is a radio communication technique.
It identifies specific targets and acquires related data from the backend database by using radio frequency signal and no physical touch needed.
Because of its advantages of low cost and remote identity-recognition, this technology has been widely used in many applications.
However, the information, which is transmitted via radio signal, is easily eavesdropped and traced by an attacker.
Therefore, it is important to design a secure RFID protocol which can ensure the authentication of the origin and the integrity of the transmitted information.
Researchers have put their efforts into this field and proposed many solutions to deal with these issues.
In particular, in 2012, Bassil et al.
introduced an ultra-lightweight RFID protocol based on a physical unclonable function (PUF), which means that the tags in the RFID architecture are unclonable.
However, the insecurity of the scheme has been pointed out recently.
In this paper, we will propose a new ultra-lightweight RFID protocol based on PUF that can overcome the security loopholes occurs in Bassil et al.
's protocol.
Related Results
RFID and Fingerprint Based Smart Bike Ignition System
RFID and Fingerprint Based Smart Bike Ignition System
The ascending rate of motorcycle larceny accentuates the desideratum for amended security solutions. Conventional key-predicated ignition systems are susceptible to unauthorized in...
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication
One of the concerns that comes with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, t...
Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Unmanned aerial vehicles (UAVs) and radio frequency identification (RFID) technology are becoming very popular in the era of Industry 4.0, especially for retail, logistics, and war...
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
The Lifelog Monitoring System for Honeybees: RFID and Camera Recordings in an Observation Hive
The Lifelog Monitoring System for Honeybees: RFID and Camera Recordings in an Observation Hive
A typical honeybee colony contains more than 15,000 individuals, each with its own task related to supporting the hive and maintaining the colony. In previous studies on honeybees,...
Enhancing RFID system configuration through semantic modelling
Enhancing RFID system configuration through semantic modelling
Abstract
Radio-Frequency Identification (RFID) system technology is a key element for the realization of the Industry 4.0 vision, as it is vital for tasks such as...
A study of RFID application for improving the installation process of precast concrete panels in a housing project
A study of RFID application for improving the installation process of precast concrete panels in a housing project
Two types of information, namely; related jobsite information along the process and feedback information have been found as essential elements for construction process improvement....
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...

