信息网络安全 ›› 2016, Vol. 16 ›› Issue (4): 38-43.doi: 10.3969/j.issn.1671-1122.2016.04.006

• • 上一篇    下一篇

基于PUF的RFID防伪技术研究综述

蒋政君1,2, 田海博1,2, 张方国1,2()   

  1. 1.中山大学数据科学与计算机学院,广东广州 510006
    2.广东省信息安全技术重点实验室,广东广州 510006
  • 收稿日期:2015-12-26 出版日期:2016-04-20 发布日期:2020-05-13
  • 作者简介:

    作者简介: 蒋政君(1993—),男,江西,硕士研究生,主要研究方向为密码学与信息安全;田海博(1979—),男,河北,副教授,博士,主要研究方向为安全协议设计与分析;张方国(1972—),男,山东,教授,博士,主要研究方向为密码学与信息安全。

  • 基金资助:
    国家自然科学基金[61379154]

Survey on PUF-based RFID Anti-counterfeiting Techniques

Zhengjun JIANG1,2, Haibo TIAN1,2, Fangguo ZHANG1,2()   

  1. 1. School of Data and Computer Science, Sun Yat-sen University, Guangzhou Guangdong 510006, China
    2. Guangdong Provincial Key Laboratory of Information Security, Guangzhou Guangdong 510006, China
  • Received:2015-12-26 Online:2016-04-20 Published:2020-05-13

摘要:

随着信息科学与技术的快速发展,射频识别(RFID)技术被应用到越来越多的场合,给人们带来了诸多便利。但是,RFID技术存在一些安全隐患。例如,攻击者可以窃取RFID系统通信过程中的重要信息,进行克隆等攻击。物理不可克隆函数(PUF)是解决克隆问题的有效技术手段,基于PUF的RFID系统可以很好地达到防伪要求。文章首先对目前RFID系统存在的伪造情况进行概述和分析,进而提出防伪的必要性。然后从公钥密码技术和私钥密码技术两个方面对目前基于PUF的RFID主要防伪技术做了一个比较全面的综述,总结不同方案的优缺点。

关键词: 射频识别, 物理不可克隆函数, 防伪技术, 认证

Abstract:

With the fast development of information science and technology, radio frequency identification (RFID) technique has been used in more and more scenarios, which brings people a lot of conveniences. However, RFID technique has some potential security problems. For example, an attacker can steal important information from the communication process of the RFID system, and then complete the clone attack. Physical unclonable function (PUF) is an effective method to solve the problem of cloning. Based on PUF, RFID system can serve the anti-counterfeiting purpose well. This paper summarizes and analyzes the situation of counterfeiting existing in the RFID system, and then points out the necessity of anti-counterfeiting. This paper gives a comprehensive summary for PUF-based RFID anti-counterfeiting techniques from two aspects: public key cryptography and secret key cryptography, and summarizes the advantages and disadvantages of these different schemes.

Key words: RFID, physically unclonable function, anti-counterfeiting, authentication

中图分类号: