Font Size: a A A

Research On PUF-based RFID Security Protocol

Posted on:2018-11-11Degree:MasterType:Thesis
Country:ChinaCandidate:L X ZhanFull Text:PDF
GTID:2348330542490942Subject:Engineering
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification(RFID)systems may suffer security threats because of its exposure of wireless communication between readers and tags in an open environment.In addition,tags limited to its hardware resources can not use the traditional encryption algorithms with high computational complexity.The current proposed protocols are based on tags with a certain processing capacity,and they use Hash operations to achieve the information encryption.However,the addition of the hash module will increase the cost of tags.This paper proposes a RFID authentication protocol based on Physical Unclonable Function(PUF).The principle of PUF is to generate a unique key by using the random differences of subtle physical structure in the integrated circuit production process.Compared with the protocols based on Hash operations,PUF has the advantages of simple structures,lower power consumption,and unpredictable keys.In some tags with higher security requirements,the tag processor and memory are integrated in the tag chips,and using SRAM to achieve PUF has more advantages than adding an additional integrated circuit in the chip to achieve PUF.According to the emerging phenomenon that SRAM PUF may be affected by some environmental factors,a new fuzzy extraction algorithm is proposed in this paper.Compared with the traditional Error Checking and Correction(ECC)fuzzy extraction algorithms,the proposed algorithm does not need complicated operation and additional hardware overhead.At the same time,compared with other lightweight RFID security protocols,the protocol designed in this paper can not only ensure the security of wireless communication and prevent tag cloning,but also save the cost of RFID systems.In order to verify the proposed fuzzy extraction algorithm and authentication protocol,the initial value of SRAM on the MSP430F149 development board is used to verify their effectiveness.The experimental results show that the efficiency of the fuzzy extraction algorithm is similar to that of the Fuzzy extraction algorithm based on ECC,but the proposed algorithm has the advantages of simple operation and lower cost.To verify the security and correctness of authentication protocol,the GNY logical analysis is used to prove the security of the protocol,and the software simulation using JAVA language shows the correctness ofthe protocol.
Keywords/Search Tags:Radio Frequency Identification, Physical Unclonable Function, Fuzzy Extraction Algorithm, Authentication Protocols, GNY Logic
PDF Full Text Request
Related items