PUF-Based Lightweight Authentication Framework for RFID Systems


Abstract views: 8 / PDF downloads: 2

Authors

  • Shabbir Ahmad University of Engineering & Technology
  • Fazal Muhammad University of Engineering & Technology
  • Hamza Ali University of Engineering & Technology
  • Muhammad Ismail University of Engineering & Technology
  • Sana Ullah University of Malakand

Keywords:

RFID Systems, Internet Of Things, Physically Unclonable Functions, Desynchronization Attacks, Authentication Protocol, Privacy

Abstract

Radio Frequency Identification (RFID) systems have become an essential technology for
Internet of Things (IoT) applications that require dependable and secure item identification. However, the
widespread adoption of RFID systems is hindered by security and privacy concerns. While cryptographic
techniques that incorporate Physically Unclonable Functions (PUFs) have been introduced to enhance
tamper-resistant features, they remain vulnerable to attacks, particularly desynchronization. This research
proposes an improved and privacy-preserving authentication protocol that is specifically designed for
RFID systems. The proposed protocol capitalizes on an ideal PUF environment to effectively combat
desynchronization attacks, ensuring robust security measures. A comprehensive performance evaluation
was conducted to demonstrate the effectiveness, security, and practicality of the proposed solutions. The
proposed solutions are particularly well-suited for resource-constrained RFID tags. The outcomes of this
research contribute to mitigating the security and privacy challenges in RFID systems, thereby facilitating
their secure and reliable integration across diverse IoT applications. This research has significant
academic and practical implications for researchers and practitioners working in the field of IoT security
and privacy and can pave the way for the successful deployment of RFID systems in a wide range of
applications.

Downloads

Download data is not yet available.

Author Biographies

Shabbir Ahmad, University of Engineering & Technology

Department of Electrical Engineering, Mardan, KPK (Pakistan)

Fazal Muhammad, University of Engineering & Technology

Department of Electrical Engineering, Mardan, KPK (Pakistan)

Hamza Ali, University of Engineering & Technology

Department of Electrical Engineering,Mardan, KPK (Pakistan)

Muhammad Ismail, University of Engineering & Technology

Department of Electrical Engineering, Mardan, KPK (Pakistan)

Sana Ullah, University of Malakand

Department of Software Engineering, Faculty of Engineering, Dir Lower 18800, Pakistan

References

S. Wang, S. Zhu and Y. Zhang, "Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems," IEEE Symposium on Computers and Communications (ISCC), 2018, pp. 00074-00077, doi: 10.1109/ISCC.2018.8538567.

A. G. Jadhao and S. P. Ugale, "Study of RFID Authentication Protocols,” Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), 2018, pp. 1-4, doi: 10.1109/ICCUBEA.2018.8697573.

N. M. Noor et. al., "A study of authentication protocols for security of mobile RFID (M-RFID) system," International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES), 2016, pp. 339-343, doi: 10.1109/ICAEES.2016.7888065.

Kumar, V.; Kumar, R.; Khan, A.A.; Kumar, V.; Chen, Y.-C.; Chang, C.-C. RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure. Sensors 2022, 22, 3110.

G. Avoine, M. A. Bingol, X. Carpent, and S. B. O. Yalcin, “Privacyfriendly authentication in RFID systems: On sublinear protocols based on symmetric-key cryptography,” IEEE Trans. Mobile Comput., vol. 12, no. 10, pp. 2037–2049, Oct. 2013.

C.-I. Lee and H.-Y. Chien, “An elliptic curve cryptography-based RFID authentication securing e-health system,” Int. J. Distrib. Sensor Netw., vol. 11, Dec. 2015, Art. no. 642425-1–642425-7.

Cho, J.S.; Jeong, Y.S.; Park, S.O. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Comput. Math. Appl. 2015, 69, 58–65.

Gope, P.; Amin, R.; Islam, S.H.; Kumar, N.; Bhalla, V.K. Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environments. Future Gener. Comput. Syst. 2018, 83, 629–637

Safkhani, M.; Peris-Lopez, P.; Hernandez-Castro, J.C.; Bagheri, N. Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 2014, 259, 571–577.

Gope, P.; Hwang, T. A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput. Secur. 2015, 55, 271–280.

Mansoor, K.; Ghani, A.; Chaudhry, S.A.; Shamshirband, S.; Ghayyur, S.A.K.; Mosavi, A. Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography. Sensors 2019, 19, 4752.

J. Bringer, H. Chabanne, and T. Icart, “Improved privacy of the treebased hash protocols using physically unclonable function,” in Proc. 6th Int. Conf. Secur. Cryptograp. Netw. (SCN), Sep. 2008, pp. 77–91.

A.-R. Sadeghi, I. Visconti, and C. Wachsmann, “PUF-enhanced offline RFID security and privacy,” in Proc. Secure Component Syst. Identificat., Cologne, Germany, Jun. 2010, pp. 102–106.

S. Kardas, M. S. Kiraz, M. A. Bing, and H. Demirci, “A novel RFID distance bounding protocol based on physically unclonable functions,” in Proc. Int. Conf. RFID Secur. Privacy, Jun. 2012, pp. 78–93.

[28] M. Akgun and M. U. Caglayan, “Puf based scalable private RFID authentication,” in Proc. Int. Conf. Availability Rel. Secur., Washington, DC, USA, Aug. 2011, pp. 473–478.

S. Kardas, M. S. Kiraz, M. A. Bing, and H. Demirci, “A novel RFID distance bounding protocol based on physically unclonable functions,” in Proc. Int. Conf. RFID Secur. Privacy, Jun. 2012, pp. 78–93.

S. Kardas et al., “Puf-enhanced offline RFID security and privacy,” J. Netw. Comput. Appl., vol. 35, no. 6, pp. 2059–2067, Nov. 2012.

M. Akgun and M. U. Caglayan, “Providing destructive privacy and scalability in RFID systems using PUFs,” Ad Hoc Netw., vol. 32, pp. 32–42, Sep. 2015

Ismail, Muhammad, et al. "Line-of-Sight-based Coordinated Channel Resource Allocation Management in UAV-Assisted Vehicular Ad Hoc Networks." IEEE Access (2024).

Ismail, Muhammad, et al. "Enhancing Vehicular Network Performance through Integrated RSU and UAV Deployment." 2023 18th International Conference on Emerging Technologies (ICET). IEEE, 2023.

Ismail, Muhammad, et al. "Efficient content delivery in urban vehicular networks: A hybrid rsu-uav framework." International Conference on Recent and Innovative Results in Engineering and Technology. 2023..

Allah, Abdu, et al. "A Novel High Gain Array Approach MIMO Antenna Operating at 28 GHz for 5G mm Wave Applications." 2021 1st International Conference on Microwave, Antennas & Circuits (ICMAC). IEEE, 2021.

A. Badshah et al., "Blockchain-Assisted Lightweight Authenticated Key Agreement Security Framework for Smart Vehicles-Enabled Intelligent Transportation System," in IEEE Transactions on Automation Science and Engineering, pp. 1 – 15, April 2024. doi: 10.1109/TASE.2024.3381068.

A. Badshah et al., "USAF-IoD: Ultralightweight and Secure Authenticated Key Agreement Framework for Internet of Drones Environment," in IEEE Transactions on Vehicular Technology, pp. 1 – 15, March 2024. doi: 10.1109/TVT.2024.3375758

A. Badshah et al., "AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation," in IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 1739-1755, Feb. 2023, doi: 10.1109/TITS.2022.3220624

A. Badshah, M. Waqas, F. Muhammad, G. Abbas and Z. H. Abbas, "A Novel Framework for Smart Systems Using Blockchain-Enabled Internet of Things," in IT Professional, vol. 24, no. 3, pp. 73-80, 1 May-June 2022, doi: 10.1109/MITP.2022.3143658

D. Dolev and A. C. Yao, “On the security of public key protocols,” IEEE Trans. Inf. Theory, vol. IT-29, no. 2, pp. 198–208, Mar. 1983.

P. Gope, J. Lee, and T. Q. Quek, “Lightweight and practical anonymous authentication protocol for rfid systems using physically unclonable functions,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2831–2843, 2018.

Downloads

Published

2024-04-26

How to Cite

Ahmad, S., Muhammad, F., Ali, H., Ismail, M., & Ullah, S. (2024). PUF-Based Lightweight Authentication Framework for RFID Systems. International Journal of Advanced Natural Sciences and Engineering Researches, 8(3), 58–67. Retrieved from https://as-proceeding.com/index.php/ijanser/article/view/1788

Conference Proceedings Volume

Section

Articles