k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions

This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allow...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless communications and mobile computing 2015-12, Vol.15 (18), p.2150-2166
Hauptverfasser: Kardaş, Süleyman, Çelik, Serkan, Bingöl, Muhammed Ali, Kiraz, Mehmet Sabi̇r, Demirci, Hüseyin, Levi, Albert
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2166
container_issue 18
container_start_page 2150
container_title Wireless communications and mobile computing
container_volume 15
creator Kardaş, Süleyman
Çelik, Serkan
Bingöl, Muhammed Ali
Kiraz, Mehmet Sabi̇r
Demirci, Hüseyin
Levi, Albert
description This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd. We enhance Vaudenay's privacy model by introducing two new adversary classes, k‐strong and k‐forward adversaries where it is possible to corrupt a tag at most k times. The common assumption of physically unclonable functions (PUFs) is that PUFs are destroyed once tampered. In this paper, we weaken this assumption by introducing a new definition k‐resistant PUFs. k‐Resistant PUFs are tamper resistant against number of k attacks. We prove that strong privacy can be achieved without public‐key cryptography using k‐PUF‐based authentication.
doi_str_mv 10.1002/wcm.2482
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1757741483</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3924450621</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3982-2bfe9475d68058da988e635d75e20424e926a8128173fbbe318bbec7068123883</originalsourceid><addsrcrecordid>eNp1kD1PwzAQhiMEEqUg8RMssbCk-COJnREiKEgFlqKyWY5jU7dpXOyEkn-Po6JKDCznu_eeO9tvFF0iOEEQ4pud3ExwwvBRNEIpgTHLKD0-5Fl-Gp15v4IQEojRKOrWsW-dbT7A1pkvIXugrQNOVMYC7dRnp5qgmUo1rdFGitbYBoiuXQ7Cb7l1trXS1h6UwqsKDNKy96Fd1z3oGlnbRpS1Ajrkw4Q_j060qL26-D3H0dvD_bx4jGev06fidhZLkjMc41KrPKFplTGYskrkjKmMpBVNFYYJTlSOM8EQZogSXZaKIBaipDALImGMjKOr_d7wxPAV3_KV7VwTruSIppQmKGEkUNd7SjrrvVOaBy82wvUcQT6YyoOpfDA1oPEe3Zla9f9yfFE8_-WNb9X3gRduzTNKaMoXL1OO5--E5sUdh-QHQVOJWA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1757741483</pqid></control><display><type>article</type><title>k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions</title><source>Alma/SFX Local Collection</source><creator>Kardaş, Süleyman ; Çelik, Serkan ; Bingöl, Muhammed Ali ; Kiraz, Mehmet Sabi̇r ; Demirci, Hüseyin ; Levi, Albert</creator><creatorcontrib>Kardaş, Süleyman ; Çelik, Serkan ; Bingöl, Muhammed Ali ; Kiraz, Mehmet Sabi̇r ; Demirci, Hüseyin ; Levi, Albert</creatorcontrib><description>This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley &amp; Sons, Ltd. We enhance Vaudenay's privacy model by introducing two new adversary classes, k‐strong and k‐forward adversaries where it is possible to corrupt a tag at most k times. The common assumption of physically unclonable functions (PUFs) is that PUFs are destroyed once tampered. In this paper, we weaken this assumption by introducing a new definition k‐resistant PUFs. k‐Resistant PUFs are tamper resistant against number of k attacks. We prove that strong privacy can be achieved without public‐key cryptography using k‐PUF‐based authentication.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1002/wcm.2482</identifier><language>eng</language><publisher>Oxford: Blackwell Publishing Ltd</publisher><subject>physically unclonable function ; privacy ; RFID ; security</subject><ispartof>Wireless communications and mobile computing, 2015-12, Vol.15 (18), p.2150-2166</ispartof><rights>Copyright © 2014 John Wiley &amp; Sons, Ltd.</rights><rights>Copyright © 2015 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3982-2bfe9475d68058da988e635d75e20424e926a8128173fbbe318bbec7068123883</citedby><cites>FETCH-LOGICAL-c3982-2bfe9475d68058da988e635d75e20424e926a8128173fbbe318bbec7068123883</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27915,27916</link.rule.ids></links><search><creatorcontrib>Kardaş, Süleyman</creatorcontrib><creatorcontrib>Çelik, Serkan</creatorcontrib><creatorcontrib>Bingöl, Muhammed Ali</creatorcontrib><creatorcontrib>Kiraz, Mehmet Sabi̇r</creatorcontrib><creatorcontrib>Demirci, Hüseyin</creatorcontrib><creatorcontrib>Levi, Albert</creatorcontrib><title>k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions</title><title>Wireless communications and mobile computing</title><addtitle>Wirel. Commun. Mob. Comput</addtitle><description>This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley &amp; Sons, Ltd. We enhance Vaudenay's privacy model by introducing two new adversary classes, k‐strong and k‐forward adversaries where it is possible to corrupt a tag at most k times. The common assumption of physically unclonable functions (PUFs) is that PUFs are destroyed once tampered. In this paper, we weaken this assumption by introducing a new definition k‐resistant PUFs. k‐Resistant PUFs are tamper resistant against number of k attacks. We prove that strong privacy can be achieved without public‐key cryptography using k‐PUF‐based authentication.</description><subject>physically unclonable function</subject><subject>privacy</subject><subject>RFID</subject><subject>security</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNp1kD1PwzAQhiMEEqUg8RMssbCk-COJnREiKEgFlqKyWY5jU7dpXOyEkn-Po6JKDCznu_eeO9tvFF0iOEEQ4pud3ExwwvBRNEIpgTHLKD0-5Fl-Gp15v4IQEojRKOrWsW-dbT7A1pkvIXugrQNOVMYC7dRnp5qgmUo1rdFGitbYBoiuXQ7Cb7l1trXS1h6UwqsKDNKy96Fd1z3oGlnbRpS1Ajrkw4Q_j060qL26-D3H0dvD_bx4jGev06fidhZLkjMc41KrPKFplTGYskrkjKmMpBVNFYYJTlSOM8EQZogSXZaKIBaipDALImGMjKOr_d7wxPAV3_KV7VwTruSIppQmKGEkUNd7SjrrvVOaBy82wvUcQT6YyoOpfDA1oPEe3Zla9f9yfFE8_-WNb9X3gRduzTNKaMoXL1OO5--E5sUdh-QHQVOJWA</recordid><startdate>20151225</startdate><enddate>20151225</enddate><creator>Kardaş, Süleyman</creator><creator>Çelik, Serkan</creator><creator>Bingöl, Muhammed Ali</creator><creator>Kiraz, Mehmet Sabi̇r</creator><creator>Demirci, Hüseyin</creator><creator>Levi, Albert</creator><general>Blackwell Publishing Ltd</general><general>Hindawi Limited</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20151225</creationdate><title>k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions</title><author>Kardaş, Süleyman ; Çelik, Serkan ; Bingöl, Muhammed Ali ; Kiraz, Mehmet Sabi̇r ; Demirci, Hüseyin ; Levi, Albert</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3982-2bfe9475d68058da988e635d75e20424e926a8128173fbbe318bbec7068123883</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>physically unclonable function</topic><topic>privacy</topic><topic>RFID</topic><topic>security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kardaş, Süleyman</creatorcontrib><creatorcontrib>Çelik, Serkan</creatorcontrib><creatorcontrib>Bingöl, Muhammed Ali</creatorcontrib><creatorcontrib>Kiraz, Mehmet Sabi̇r</creatorcontrib><creatorcontrib>Demirci, Hüseyin</creatorcontrib><creatorcontrib>Levi, Albert</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kardaş, Süleyman</au><au>Çelik, Serkan</au><au>Bingöl, Muhammed Ali</au><au>Kiraz, Mehmet Sabi̇r</au><au>Demirci, Hüseyin</au><au>Levi, Albert</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions</atitle><jtitle>Wireless communications and mobile computing</jtitle><addtitle>Wirel. Commun. Mob. Comput</addtitle><date>2015-12-25</date><risdate>2015</risdate><volume>15</volume><issue>18</issue><spage>2150</spage><epage>2166</epage><pages>2150-2166</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley &amp; Sons, Ltd. We enhance Vaudenay's privacy model by introducing two new adversary classes, k‐strong and k‐forward adversaries where it is possible to corrupt a tag at most k times. The common assumption of physically unclonable functions (PUFs) is that PUFs are destroyed once tampered. In this paper, we weaken this assumption by introducing a new definition k‐resistant PUFs. k‐Resistant PUFs are tamper resistant against number of k attacks. We prove that strong privacy can be achieved without public‐key cryptography using k‐PUF‐based authentication.</abstract><cop>Oxford</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/wcm.2482</doi><tpages>17</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2015-12, Vol.15 (18), p.2150-2166
issn 1530-8669
1530-8677
language eng
recordid cdi_proquest_journals_1757741483
source Alma/SFX Local Collection
subjects physically unclonable function
privacy
RFID
security
title k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T04%3A59%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=k-strong%20privacy%20for%20radio%20frequency%20identification%20authentication%20protocols%20based%20on%20physically%20unclonable%20functions&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Karda%C5%9F,%20S%C3%BCleyman&rft.date=2015-12-25&rft.volume=15&rft.issue=18&rft.spage=2150&rft.epage=2166&rft.pages=2150-2166&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1002/wcm.2482&rft_dat=%3Cproquest_cross%3E3924450621%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1757741483&rft_id=info:pmid/&rfr_iscdi=true