Netinfo Security ›› 2016, Vol. 16 ›› Issue (4): 38-43.doi: 10.3969/j.issn.1671-1122.2016.04.006

• Orginal Article • Previous Articles     Next Articles

Survey on PUF-based RFID Anti-counterfeiting Techniques

Zhengjun JIANG1,2, Haibo TIAN1,2, Fangguo ZHANG1,2()   

  1. 1. School of Data and Computer Science, Sun Yat-sen University, Guangzhou Guangdong 510006, China
    2. Guangdong Provincial Key Laboratory of Information Security, Guangzhou Guangdong 510006, China
  • Received:2015-12-26 Online:2016-04-20 Published:2020-05-13

Abstract:

With the fast development of information science and technology, radio frequency identification (RFID) technique has been used in more and more scenarios, which brings people a lot of conveniences. However, RFID technique has some potential security problems. For example, an attacker can steal important information from the communication process of the RFID system, and then complete the clone attack. Physical unclonable function (PUF) is an effective method to solve the problem of cloning. Based on PUF, RFID system can serve the anti-counterfeiting purpose well. This paper summarizes and analyzes the situation of counterfeiting existing in the RFID system, and then points out the necessity of anti-counterfeiting. This paper gives a comprehensive summary for PUF-based RFID anti-counterfeiting techniques from two aspects: public key cryptography and secret key cryptography, and summarizes the advantages and disadvantages of these different schemes.

Key words: RFID, physically unclonable function, anti-counterfeiting, authentication

CLC Number: