skip to main content
research-article

A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning

Authors Info & Claims
Published:22 October 2021Publication History
Skip Abstract Section

Abstract

The Industrial Internet of Things (IIoT) is designed to refine and optimize the process controls, thereby leveraging improvements in economic benefits, such as efficiency and productivity. However, the Radio Frequency Identification (RFID) technology in an IIoT environment has problems such as low security and high cost. To overcome such issues, a mutual authentication scheme that is suitable for RFID systems, wherein techniques in Deep Learning (DL) are incorporated onto the Arbiter Physical Unclonable Function (APUF) for the secured access authentication of the IC circuits on the IoT, is proposed. The design applies the APUF-MPUF mutual authentication structure obtained by DL to generate essential real-time authentication information, thereby taking advantage of the feature that the tag in the PUF circuit structure does not need to store any essential information and resolving the problem of key storage. The proposed scheme also uses a bitwise comparison method, which hides the PUF response information and effectively reduces the resource overhead of the system during the verification process, to verify the correctness of the two strings. Security analysis demonstrates that the proposed scheme has high robustness and security against different conventional attack methods, and the storage and communication costs are 95.7% and 42.0% lower than the existing schemes, respectively.

REFERENCES

  1. [1] Becker Georg T.. 2015. The gap between promise and reality: On the insecurity of XOR arbiter PUFs. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 535555.Google ScholarGoogle Scholar
  2. [2] Blanchet Bruno, Smyth Ben, Cheval Vincent, and Sylvestre Marc. 2018. ProVerif 2.00: Automatic cryptographic protocol verifier, user manual and tutorial. Version from2018, 0516.Google ScholarGoogle Scholar
  3. [3] Chatterjee Urbi, Chakraborty Rajat Subhra, and Mukhopadhyay Debdeep. 2017. A PUF-based secure communication protocol for IoT. ACM Transactions on Embedded Computing Systems (TECS) 16, 3 (2017), 125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Chen Yuling, Kong Wei, and Jiang Xinzhao. 2019. Anti-synchronization and robust authentication for noisy PUF-based smart card. IEEE Access 7 (2019), 142214142223.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Dinarvand Negin and Barati Hamid. 2019. An efficient and secure RFID authentication protocol using elliptic curve cryptography. Wireless Networks 25, 1 (2019), 415428. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Fan Kai, Luo Qi, Zhang Kuan, and Yang Yintang. 2020. Cloud-based lightweight secure RFID mutual authentication protocol in IoT. Information Sciences 527 (2020), 329340.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Gope Prosanta, Lee Jemin, and Quek Tony Q. S.. 2018. Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Transactions on Information Forensics and Security 13, 11 (2018), 28312843.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Han Dezhi, Pan Nannan, and Li Kuan-Ching. 2020. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing (2020).Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] He Zhangqing, Wan Meilin, Deng Jie, Bai Chuang, and Dai Kui. 2018. A reliable strong PUF based on switched-capacitor circuit. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26, 6 (2018), 10731083.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Igier Mathilde and Vaudenay Serge. 2016. Distance bounding based on PUF. In International Conference on Cryptology and Network Security. Springer, 701710.Google ScholarGoogle Scholar
  11. [11] Ikezaki Yoshiya, Nozaki Yusuke, and Yoshikawa Masaya. 2016. Deep learning attack for physical unclonable function. In 2016 IEEE 5th Global Conference on Consumer Electronics. IEEE, 12.Google ScholarGoogle Scholar
  12. [12] Khalafalla Mahmoud and Gebotys Catherine. 2019. PUFs deep attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE’19). IEEE, 204209.Google ScholarGoogle Scholar
  13. [13] Li Xiong, Ma Jian, Wang Wendong, Xiong Yongping, and Zhang Junsong. 2013. A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 58, 1–2 (2013), 8595.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Li Xiong, Niu Jianwei, Khan Muhammad Khurram, and Liao Junguo. 2013. An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications 36, 5 (2013), 13651371.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Li Xiong, Niu Jian-Wei, Ma Jian, Wang Wen-Dong, and Liu Cheng-Lian. 2011. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 34, 1 (2011), 7379. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Liang Wei, Fan Yongkai, Li Kuan-Ching, Zhang Dafang, and Gaudiot Jean-Luc. 2020. Secure data storage and recovery in industrial blockchain network environments. IEEE Transactions on Industrial Informatics 16, 10 (2020), 6543–6552.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Liang Wei, Huang Weihong, Long Jing, Zhang Ke, Li Kuan-Ching, and Zhang Dafang. 2020. Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet of Things Journal 7, 7 (2020), 6392–6401.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Liang Wei, Li Kuan-Ching, Long Jing, Kui Xiaoyan, and Zomaya Albert Y.. 2019. An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Transactions on Industrial Informatics 16, 3 (2019), 20632071.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Liang Wei, Xie Songyou, Long Jing, Li Kuan-Ching, Zhang Dafang, and Li Keqin. 2019. A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Information Sciences 503 (2019), 129147.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Ma Xu, Ji Cunmei, Zhang Xiaoyu, Wang Jianfeng, Li Jin, Li Kuan-Ching, and Chen Xiaofeng. 2020. Secure multiparty learning from the aggregation of locally trained models. Journal of Network and Computer Applications 167 (2020), 102754.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Machida Takanori, Yamamoto Dai, Iwamoto Mitsugu, and Sakiyama Kazuo. 2015. A new arbiter PUF for enhancing unpredictability on FPGA. The Scientific World Journal 2015 (2015).Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Maiti Abhranil, Gunreddy Vikash, and Schaumont Patrick. 2013. A systematic method to evaluate and compare the performance of physical unclonable functions. In Embedded Systems Design with FPGAs. Springer, 245267.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Majzoobi Mehrdad, Rostami Masoud, Koushanfar Farinaz, Wallach Dan S., and Devadas Srinivas. 2012. Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching. In 2012 IEEE Symposium on Security and Privacy Workshops. IEEE, 3344. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Mansoor Khwaja, Ghani Anwar, Chaudhry Shehzad Ashraf, Shamshirband Shahaboddin, Ghayyur Shahbaz Ahmed Khan, and Mosavi Amir. 2019. Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography. Sensors 19, 21 (2019), 4752.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Rostami Masoud, Majzoobi Mehrdad, Koushanfar Farinaz, Wallach Dan S., and Devadas Srinivas. 2014. Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching. IEEE Transactions on Emerging Topics in Computing 2, 1 (2014), 3749.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Rührmair Ulrich, Sehnke Frank, Sölter Jan, Dror Gideon, Devadas Srinivas, and Schmidhuber Jürgen. 2010. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM Conference on Computer and Communications Security. 237249. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Sidorov Michail, Ong Ming Tze, Sridharan Ravivarma Vikneswaren, Nakamura Junya, Ohmura Ren, and Khor Jing Huey. 2019. Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains. IEEE Access 7 (2019), 72737285.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Yashiro Risa, Machida Takanori, Iwamoto Mitsugu, and Sakiyama Kazuo. 2016. Deep-learning-based security evaluation on authentication systems using arbiter PUF and its variants. In International Workshop on Security. Springer, 267285.Google ScholarGoogle Scholar
  29. [29] Zhang Ke, Leng Supeng, Peng Xin, Pan Li, Maharjan Sabita, and Zhang Yan. 2018. Artificial intelligence inspired transmission scheduling in cognitive vehicular communications and networks. IEEE Internet of Things Journal 6, 2 (2018), 19871997.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Zhang Ke, Zhu Yongxu, Leng Supeng, He Yejun, Maharjan Sabita, and Zhang Yan. 2019. Deep learning empowered task offloading for mobile edge computing in urban informatics. IEEE Internet of Things Journal 6, 5 (2019), 76357647.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Zhang Ke, Zhu Yongxu, Maharjan Sabita, and Zhang Yan. 2019. Edge intelligence and blockchain empowered 5G beyond for the industrial Internet of Things. IEEE Network 33, 5 (2019), 1219.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Zhu Feng, Li Peng, Xu He, and Wang Ruchuan. 2019. A lightweight RFID mutual authentication protocol with PUF. Sensors 19, 13 (2019), 2957.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Internet Technology
          ACM Transactions on Internet Technology  Volume 22, Issue 2
          May 2022
          582 pages
          ISSN:1533-5399
          EISSN:1557-6051
          DOI:10.1145/3490674
          • Editor:
          • Ling Liu
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 October 2021
          • Revised: 1 September 2020
          • Accepted: 1 September 2020
          • Received: 1 June 2020
          Published in toit Volume 22, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!