A RFID Privacy Protocol Based on PUF

Article Preview

Abstract:

Physical Unclonable Function (PUF) is an excellent choice for key management in security domain. A Silicon PUF based RFID privacy protocol is proposed. Unlike general PUF applications which apply PUF in the tag-end, we employ PUF within a reader. Challenge -Responding Pairs (CRPs) on PUF in the proposal are reusable. Tag’s data structure is designed to a three level stack. Each level of the stack stands for a privacy state of the tag. State changing needs a password which only be transferred with plaintext. Password produce, storage, input/output operations are program control. We take a supermarket as application scene.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 467-469)

Pages:

554-560

Citation:

Online since:

February 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] http: /en. wikipedia. org/wiki/Physically_unclonable_function.

Google Scholar

[2] CW O'Donnell, GE Suh, and S. Devadas. PUF-based random number generation. In MIT CSAIL CSG Technical Memo 481, November (2004).

Google Scholar

[3] Ari. Juels, Ronald. L. Rivest and Michael. Szydlo, The Blocker Tag : Selective Blocking of RFID Tags for Consumer Privacy, In Proceedings of 10th ACM Conference on Computer and Communications Security(CCS 2003), Oct. (2003).

DOI: 10.1145/948109.948126

Google Scholar

[4] Michael S. Kirkpatrick. PUF ROKs: Generating Read-Once Keys from Physically Unclonable Functions. CSIIRW'2010, April 21-23, Oak Ridge, Tennessee, USA.

DOI: 10.1145/1852666.1852688

Google Scholar

[5] M. Riley and I. Richardson. Reed-solomon codes. http: /www. cs. cmu. edu/afs/ cs. cmu. edu/project/pscico-uyb/realworld/www/reedsolomon/reed_solomon_codes. html, (1998).

Google Scholar

[6] Ari Juels. RFID privacy: A technical primer for the non-technical reader. In Katherine Strindberg and Daniela Stan Raicu, editors, Privacy and Technologies of Identity: A Cross-Disciplinary Conversation. Springer, Berlin Heidelberg New York, (2005).

Google Scholar

[7] Marc Langheinrich. A survey of RFID privacy approaches. Personal and Ubiquitous Computing archive. Volume 13 , Issue 6 , 2009 p.413 – 421.

DOI: 10.1007/s00779-008-0213-4

Google Scholar