Title :
PUF-based secure checker protocol for Networked RFID Systems
Author :
Ray, Biplob ; Chowdhury, Morshed ; Abawaiy, Jemal
Author_Institution :
Sch. of Inf. Technol., Deakin Univ., Melbourne, VIC, Australia
Abstract :
Radio Frequency Identification (RFID) system is an emerging technology for automating object identification. The Networked RFID System (NRS) is a component of a distributed object identification network which facilitates automated supply chain management. It also makes the Internet of Things (IoT) concept a reality. To increase the business feasibility of NRS implementation, the system should be able to ensure the visibility and traceability of the object throughout the chain using a checker protocol. By doing so, the protocol will check the genuineness of the object and the genuineness of the object´s previous travel path on-site. While doing so, the protocol needs to ensure the security requirement of the system. To this end, we propose a secure checker protocol for NRS which will use a PUF (Physically Unclonable Function) and simple cryptographic primitives. The protocol provides security (protect privacy of the partners, injection of fake objects, non-repudiation, and unclonability), visibility and traceability for NRS. It is also suitable for passive tags.
Keywords :
Internet of Things; cryptographic protocols; radiofrequency identification; supply chain management; telecommunication security; Internet of Things; IoT; NRS; PUF; checker protocol; cryptographic primitives; distributed object identification network; networked RFID system; passive tags; physically unclonable function; radio frequency identification system; supply chain management; Equations; Privacy; Protocols; Radiofrequency identification; Security; Supply chains; NRS; PUF; RFID; checker; injection of fake objects; non-repudiation; privacy; protocol; unclonable;
Conference_Titel :
Open Systems (ICOS), 2014 IEEE Conference on
Conference_Location :
Subang
Print_ISBN :
978-1-4799-6366-9
DOI :
10.1109/ICOS.2014.7042633