Abstract
The Industrial Internet of Things (IIoT) is designed to refine and optimize the process controls, thereby leveraging improvements in economic benefits, such as efficiency and productivity. However, the Radio Frequency Identification (RFID) technology in an IIoT environment has problems such as low security and high cost. To overcome such issues, a mutual authentication scheme that is suitable for RFID systems, wherein techniques in Deep Learning (DL) are incorporated onto the Arbiter Physical Unclonable Function (APUF) for the secured access authentication of the IC circuits on the IoT, is proposed. The design applies the APUF-MPUF mutual authentication structure obtained by DL to generate essential real-time authentication information, thereby taking advantage of the feature that the tag in the PUF circuit structure does not need to store any essential information and resolving the problem of key storage. The proposed scheme also uses a bitwise comparison method, which hides the PUF response information and effectively reduces the resource overhead of the system during the verification process, to verify the correctness of the two strings. Security analysis demonstrates that the proposed scheme has high robustness and security against different conventional attack methods, and the storage and communication costs are 95.7% and 42.0% lower than the existing schemes, respectively.
- [1] . 2015. The gap between promise and reality: On the insecurity of XOR arbiter PUFs. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 535–555.Google Scholar
- [2] . 2018. ProVerif 2.00: Automatic cryptographic protocol verifier, user manual and tutorial. Version from2018, 05–16.Google Scholar
- [3] . 2017. A PUF-based secure communication protocol for IoT. ACM Transactions on Embedded Computing Systems (TECS) 16, 3 (2017), 1–25. Google Scholar
Digital Library
- [4] . 2019. Anti-synchronization and robust authentication for noisy PUF-based smart card. IEEE Access 7 (2019), 142214–142223.Google Scholar
Cross Ref
- [5] . 2019. An efficient and secure RFID authentication protocol using elliptic curve cryptography. Wireless Networks 25, 1 (2019), 415–428. Google Scholar
Digital Library
- [6] . 2020. Cloud-based lightweight secure RFID mutual authentication protocol in IoT. Information Sciences 527 (2020), 329–340.Google Scholar
Cross Ref
- [7] . 2018. Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Transactions on Information Forensics and Security 13, 11 (2018), 2831–2843.Google Scholar
Cross Ref
- [8] . 2020. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing (2020).Google Scholar
Cross Ref
- [9] . 2018. A reliable strong PUF based on switched-capacitor circuit. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26, 6 (2018), 1073–1083.Google Scholar
Cross Ref
- [10] . 2016. Distance bounding based on PUF. In International Conference on Cryptology and Network Security. Springer, 701–710.Google Scholar
- [11] . 2016. Deep learning attack for physical unclonable function. In 2016 IEEE 5th Global Conference on Consumer Electronics. IEEE, 1–2.Google Scholar
- [12] . 2019. PUFs deep attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE’19). IEEE, 204–209.Google Scholar
- [13] . 2013. A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 58, 1–2 (2013), 85–95.Google Scholar
Cross Ref
- [14] . 2013. An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications 36, 5 (2013), 1365–1371.Google Scholar
Cross Ref
- [15] . 2011. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 34, 1 (2011), 73–79. Google Scholar
Digital Library
- [16] . 2020. Secure data storage and recovery in industrial blockchain network environments. IEEE Transactions on Industrial Informatics 16, 10 (2020), 6543–6552.Google Scholar
Cross Ref
- [17] . 2020. Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet of Things Journal 7, 7 (2020), 6392–6401.Google Scholar
Cross Ref
- [18] . 2019. An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Transactions on Industrial Informatics 16, 3 (2019), 2063–2071.Google Scholar
Cross Ref
- [19] . 2019. A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Information Sciences 503 (2019), 129–147.Google Scholar
Cross Ref
- [20] . 2020. Secure multiparty learning from the aggregation of locally trained models. Journal of Network and Computer Applications 167 (2020), 102754.Google Scholar
Cross Ref
- [21] . 2015. A new arbiter PUF for enhancing unpredictability on FPGA. The Scientific World Journal 2015 (2015).Google Scholar
Cross Ref
- [22] . 2013. A systematic method to evaluate and compare the performance of physical unclonable functions. In Embedded Systems Design with FPGAs. Springer, 245–267.Google Scholar
Cross Ref
- [23] . 2012. Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching. In 2012 IEEE Symposium on Security and Privacy Workshops. IEEE, 33–44. Google Scholar
Digital Library
- [24] . 2019. Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography. Sensors 19, 21 (2019), 4752.Google Scholar
Cross Ref
- [25] . 2014. Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching. IEEE Transactions on Emerging Topics in Computing 2, 1 (2014), 37–49.Google Scholar
Cross Ref
- [26] . 2010. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM Conference on Computer and Communications Security. 237–249. Google Scholar
Digital Library
- [27] . 2019. Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains. IEEE Access 7 (2019), 7273–7285.Google Scholar
Cross Ref
- [28] . 2016. Deep-learning-based security evaluation on authentication systems using arbiter PUF and its variants. In International Workshop on Security. Springer, 267–285.Google Scholar
- [29] . 2018. Artificial intelligence inspired transmission scheduling in cognitive vehicular communications and networks. IEEE Internet of Things Journal 6, 2 (2018), 1987–1997.Google Scholar
Cross Ref
- [30] . 2019. Deep learning empowered task offloading for mobile edge computing in urban informatics. IEEE Internet of Things Journal 6, 5 (2019), 7635–7647.Google Scholar
Cross Ref
- [31] . 2019. Edge intelligence and blockchain empowered 5G beyond for the industrial Internet of Things. IEEE Network 33, 5 (2019), 12–19.Google Scholar
Digital Library
- [32] . 2019. A lightweight RFID mutual authentication protocol with PUF. Sensors 19, 13 (2019), 2957.Google Scholar
Cross Ref
Index Terms
A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning
Recommendations
A double PUF-based RFID identity authentication protocol in service-centric internet of things environments
AbstractThe rapid development of sensing, automation and communication technologies has led to the proliferation of the Internet of Things (IoT), providing recognized promising opportunities to build complex industrial systems and applications,...
A secure lightweight mutual authentication scheme in Social Industrial IoT environment
AbstractThe Social Industrial Internet of Things (SIIoT) is a new paradigm that integrates social networking features into the Industrial IoT (IIoT) environment to enforce efficient and effective service discovery and collaboration between smart IoT ...
RFID security and privacy: a research survey
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to ...






Comments