A Low Cost Solution to Cloning and Authentication Based on a Lightweight Primitive

  • Damith C. Ranasinghe
  • Srinivas Devadas
  • Peter H. Cole

Abstract

This paper proposes a solution to address the issue of authentication to prevent counterfeiting in a low cost RFID based system based on using a lightweight primitive, Physically Unclonable Functions.

Keywords

Authentication Scheme Mutual Authentication Verification Phase Physical Unclonable Function Security Engine 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ranasinghe, D.C., Leong, K.S., Ng, M.L., Engels, D.W., Cole, P.H.: A distributed architecture for a ubiquitous item identification network. In: Seventh International Conference on Ubiquitous computing, Tokyo, Japan, (2005)Google Scholar
  2. 2.
    Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security analysis of a cryptographically-enabled RFID Device. In: Proceedings of 14th USENIX Security Symposium, (2005) 1–16Google Scholar
  3. 3.
    Westhues, J.: Hacking the prox card. In: RFID: Applications, Security and Privacy, Addison-Wesley, (2005) 291–300Google Scholar
  4. 4.
    Verichip corporation home page. Available from: http://www.4verichip.com/ (06/2006)Google Scholar
  5. 5.
    Albrecht, K.: Chipping workers poses huge security risks. In: Freemarketnews. Available from: http://www.freemarketnews.com/Analysis/139/3812/ 2006–02–15.asp?wid = 139&nid = 3812 (06/2006)Google Scholar
  6. 6.
    Ranasinghe, D.C., Cole, P.H.: Security and privacy issues. In: Ranasinghe, D.C., Cole, P.H. (eds.): Networked RFID Systems and Lightweight Cryptography, Springer-Verlag, Berlin Heidelberg New York (2007)Google Scholar
  7. 7.
    Schnorr, C.P.: Efficient signature generation by smart cards. In: Journal of Cryptology, Vol. 4 (1991) 161–174MATHCrossRefGoogle Scholar
  8. 8.
    Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Lecture Notes in Computer Science, Vol. 196, (1993)Google Scholar
  9. 9.
    Menezes, P. van O., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, (1996)Google Scholar
  10. 10.
    Kommerling, O., Kuhn, M.G.: Design principles for tamper-resistance smartcard processors. In: proceedings of USENIX Workshop Smartcard Technology (1999) 9–20Google Scholar
  11. 11.
    Ravikanth, P.S.: Physical one-way functions. In: PhD dissertation, Department of Media and Art Science, Massachusetts Institute of Technology, Cambridge, (2001)Google Scholar
  12. 12.
    Pappu, R., Recht, B., Taylor, J., Gershen-Feld, N.: Physical one-way functions. In: Science, Vol. 297 (2002) 2026–2030CrossRefGoogle Scholar
  13. 13.
    Gassend, B.: Physical random functions. In: M.S. thesis, Department of Electrical Engineering Computer Science, Massachusetts Institute of Technology, Cambridge (2003)Google Scholar
  14. 14.
    Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of Computer Communications Security Conf. (2002). 148–160Google Scholar
  15. 15.
    Lim, D.: Extracting secret keys from integrated circuits. In: Master thesis, Massachusetts Institute of Technology (2004)Google Scholar
  16. 16.
    Lim, D., Lee, J.W., Gassend, B., Suh G.E., van Dijk, M., Devadas, S.: Extracting Secret Keys from Integrated Circuits. In: IEEE Transactions on VLSI Systems. Vol. 13(10) (2005)Google Scholar
  17. 17.
    Lee, J.W., Lim, D., Gassend, B., Suh, van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications in 2004 Symposium on VLSI circuits (2004) 176–179Google Scholar
  18. 18.
    Ranasinghe, D.C., Engels, D.W., Cole, P.H.: Low cost RFID systems: confronting security and privacy. In: Auto-ID Labs White Paper Journal. Vol 1 (2005)Google Scholar
  19. 19.
    EPCglobal UHF Class I Generation II Air Interface Protocol v1.0.0 (2006): Available from: http://www.epcglobalinc.org/standards_technology/ (06/2006)Google Scholar
  20. 20.
    Ranasinghe, D.C., Engels, D.W., Cole, P.H.: Security and privacy solutions for low cost RFID Systems. In: Proc. of the 2004 Intelligent Sensors, Sensor Networks & Information Processing Conference, Melbourne, Australia (2004) 337–342Google Scholar
  21. 21.
    Aigner, M., Feldhofer, M.: Secure Symmetric Authentication for RFID Tags. In: Telecommunications and Mobile Computing TCMC2005 (2005)Google Scholar
  22. 22.
    Feldhofer M., Dominikus S., Wolkerstorfer J.: Strong authentication for RFID in Systems using the AES algorithm. In: Lecture Notes in Computer Science, Vol. 3156 (2004) 357–370CrossRefGoogle Scholar
  23. 23.
    Wolkerstorfer, J.: Is Elliptic-Curve Cryptography suitable to secure RFID tags. In: Workshop on RFID and Light-Weight Cryptography, Graz Austria (2005)Google Scholar
  24. 24.
    Suh, G.E., O”Donnell, C.W., Sachdev, I., Devadas, S.: Design and implementation of the AEGIS single-chip secure processor using Physical Random Functions. In: Proceedings of the 32nd International Symposium on Computer Architecture, Madison, Wisconsin (2005)Google Scholar
  25. 25.
    Weigart, S.H.: Physical security devices for computer subsystems: a survey of attacks and defences. In: Workshop on Cryptographic Hardware and Embedded Systems. LNCS, Vol. 1965 (2005) 302–317Google Scholar
  26. 26.
    Kommerling, O., Kuhn, M.G.: Design principles for tamper-resistance smartcard processors. In: Proceedings of USENIX Workshop Smartcard Technology (1999) 9–20Google Scholar
  27. 27.
    Ranasinghe, D.C.: New directions in advanced RFID systems. In: PhD dissertation submitted to the School of Electrical and Electronic Engineering, The University of Adelaide, Australia (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Damith C. Ranasinghe
    • 1
  • Srinivas Devadas
    • 2
  • Peter H. Cole
    • 1
  1. 1.School of Electrical and Electronic EngineeringUniversity of AdelaideAdelaideAustralia
  2. 2.Massachusetts Institute of TechnologyCambridgeUSA

Personalised recommendations