Physically unclonable function-based security and privacy in RFID systems

被引:91
作者
Bolotnyy, Leonid [1 ]
Robins, Gabriel [1 ]
机构
[1] Univ Virginia, Dept Comp Sci, Charlottesville, VA 22903 USA
来源
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS | 2007年
关键词
D O I
10.1109/PERCOM.2007.26
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised many privacy and security concerns. On the other hand, known privacy and security cryptographic defenses are too hardwareexpensive to incorporate into low-cost RFID tags. In this paper we propose hardware-based approaches to RFID security that rely on physically unclonable functions (PUFs). These functions exploit the inherent variability of wire delays and parasitic gate delays in manufactured circuits, and may be implemented with an order-of-magnitude reduction in gate count as compared with traditional cryptographic functions. We describe protocols for privacy-preserving tag identification and secure message authentication codes. We compare PUFs to digital cryptographic functions, address other uses of PUFs to enhance RFID security and suggest interesting directions for future research. The proposed solutions are efficient, practical, and appropriate for low-cost RFID systems.
引用
收藏
页码:211 / +
页数:2
相关论文
共 19 条
[1]  
[Anonymous], POWER ANAL RFID TAGS
[2]   A scalable and provably secure hash-based RFID protocol [J].
Avoine, G ;
Oechslin, P .
Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, :110-114
[3]  
Bellare M., 1993, Social Science Quarterly, P62, DOI 10.1145/168588.168596
[4]   Multi-tag radio frequency identification systems [J].
Bolotnyy, L ;
Robins, G .
Fourth IEEE Workshop on Automatic Identification Advanced Technologies, Proceedings, 2005, :83-88
[5]  
BOLOTNYY L, 2006, P INT C MOB UB SYST
[6]  
FELDHOFER M, 2006, WORKSH RFID SEC RFID
[7]  
Feldhofer M., 2004, STRONG AUTHENTICATIO, P357
[8]  
Gassend B., 2002, P COMP COMM SEC C
[9]  
GASSEND B, 2002, P COMP SEC APPL C
[10]  
Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149