ARMOR: An anti-counteRfeit security Mechanism for lOw cost Radio frequency identification systems


YILMAZ Y., Do V., Halak B.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, vol.9, pp.2125-2138, 2021 (SCI-Expanded) identifier identifier

  • Publication Type: Article / Article
  • Volume: 9
  • Publication Date: 2021
  • Doi Number: 10.1109/tetc.2020.2964435
  • Journal Name: IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
  • Journal Indexes: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC
  • Page Numbers: pp.2125-2138
  • Keywords: Protocols, Authentication, Radiofrequency identification, Public key, Encryption, RFID, mutual authentication, physically unclonable function, public key, rabin cryptosystem, UHF RFID TAG, AUTHENTICATION, INTERNET, CRYPTOGRAPHY, ARCHITECTURE, LIGHTWEIGHT, EFFICIENT, PROCESSOR, SCHEME, THINGS
  • Recep Tayyip Erdoğan University Affiliated: Yes

Abstract

Counterfeited products are costing the global economy hundreds of billions of dollars annually. Radio frequency identification(RFID) technology provides a promising solution for this problem, wherein each product is fitted with a secure tag, which is difficult to forge. However, RFID technology is faced with numerous security threats, for example, if the communication link between the reader and the tag is compromised, then it will be possible for a malicious adversary to obtain the private data stored on the device. Tag cloning attacks have also been demonstrated to be feasible, which severely undermines the capabilities of the RFID technology to protect against counterfeiting. One solution to this problem is the use of authentication protocol; however, existing schemes do not support mutual authentication and are still vulnerable to tag cloning attacks. In this paper, a new security mechanism is proposed, which consists of a lightweight three-flights mutual authentication protocol and an anti-counterfeit tag design. The proposed solution is based on combining the Rabin public-key encryption scheme with physically unclonable functions (PUF) technology. The security of the proposed protocol is systematically analysed and compared with existing schemes. The implementation cost of the proposed security primitives, assuming the 1024-bit public key, is 10139 GEs, which is suitable for low-cost RFID tags. Our results show that the proposed design is up-to 50% more area-efficient compared to systems based on Elliptic Curve Cryptography (ECC).