Netinfo Security ›› 2020, Vol. 20 ›› Issue (6): 26-35.doi: 10.3969/j.issn.1671-1122.2020.06.004

Previous Articles     Next Articles

Large-scale Mobile RFID System Shamir’s Key Sharing PUF Security Authentication Protocol

SUN Ziwen1,2(), ZHANG Xiangyang1   

  1. 1. School of Internet of Things Engineering, Jiangnan University, Wuxi 214122, China
    2. Engineering Research Center of Internet of Things Technology Applications of Ministry of Education, Jiangnan University, Wuxi 214122, China
  • Received:2020-02-21 Online:2020-06-10 Published:2020-10-21
  • Contact: SUN Ziwen E-mail:sunziwen@jiangnan.edu.cn

Abstract:

Aiming at the diverse and serious security risks of large-scale mobile RFID systems, a Shamir’s key sharing scheme security authentication protocol is studied. The two-step session key generation mechanism based on PUF can avoid the counterfeiting attack caused by physical intrusion on tags and readers. The server authenticates the legality of the reader to comply the application scenario of the mobile RFID system. The timestamp threshold and update mechanism are used to defend against replay attacks. To meet the requirements of large-scale RFID systems, Shamir’s key sharing scheme is adopted to reduce the computational overhead of server search. The improved Vaudenay model is used to prove the security and privacy of the authentication protocol, the results show that the protocol can resist multiple attacks. Using C# to simulate the time-consuming of server authentication, the results show that the time spent on protocol server authentication in this paper has obvious advantages over other protocols, which meets the application requirements of large-scale mobile RFID systems.

Key words: RFID, PUF, security authentication protocol, Shamir’s key sharing, Vaudenay model

CLC Number: