An Authentication Scheme Based on PUF

Article Preview

Abstract:

User authentication is a key research domain in security. A user authentication scheme based on Physical Unclonable Function (PUF) is proposed. Unlike general PUF applications which apply PUF in the tag-end, we employ PUF within an Authentication Centre (AC), which is only used to verify a RFID tag is legal or not. When a tag is legal, the AC will send a password which is used only once to the request reader. The reader can use this password to decrypt the tag’s sensitive information which is encrypted with the same identical password. The later password which is used in encryption is produced and used only once within the tag.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 467-469)

Pages:

561-566

Citation:

Online since:

February 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Security with Noisy Data, chapter Fuzzy Extractors, pages 79–99. Springer-Verlag, (2007).

DOI: 10.1007/978-1-84628-984-2_5

Google Scholar

[2] Sadeghi, A.R., Visconti, I., Wachsmann, C. PUF-Enhanced RFID Security and Privacy. Secure Component and System Identification (SECSI 10)., Cologne, Germany, April 26-27, (2010).

Google Scholar

[3] B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Controlled physical random functions. In Proceedings of 18th Annual Computer Security Applications Conference, December (2002).

DOI: 10.1109/csac.2002.1176287

Google Scholar

[4] B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In Proceedings of the Computer and Communication Security Conference, November (2002).

DOI: 10.1145/586110.586132

Google Scholar

[5] J.W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas. A technique to build a secret key in integrated circuits with identification and authentication applications. In Proceedings of the IEEE VLSI Circuits Symposium, June (2004).

DOI: 10.1109/vlsic.2004.1346548

Google Scholar

[6] M Ayoub Khan, Manoj Sharma, Brahmanandha Prabhu R. A Survey of RFID Tags. International Journal of Recent Trends in Engineering, Vol 1, No. 4, May (2009).

Google Scholar

[7] Ari Juels, David Molnar, and David Wagner. Security and Privacy Issues in E-passports. http: /eprint. iacr. org/2005/095. pdf.

Google Scholar