Abstract
Radio frequency identification technology (RFID) has empowered a wide variety of automation industries. Aiming at the current light-weight RFID encryption scheme with limited information protection methods, combined with the physical unclonable function (PUF) composed of resistive random access memory (RRAM), a new type of high-efficiency reconfigurable strong PUF circuit structure is proposed in this paper. Experimental results show that the proposed PUF shows an almost ideal value (50%) of inter-chip hamming distance (HD) (µ/ = 0.5001/0.0340) among 1000 PUF keys, and intra-chip HD results are very close to the ideal value (0). The bit error rate (BER) is as low as across one million challenges. Based on the RRAM PUF, we propose and implement a light weight RFID authentication protocol. By virtue of RRAM’s model ability, the protocol replaces the One-way Hash Function with a response chain mutual encryption algorithm. The results of test and analysis show that the protocol can effectively resist multiple threats such as physical attacks, replay attacks, tracking attacks and asynchronous attacks, and has good stability. At the same time, based on RRAM’s unique resistance variability, PUF also has the advantage of being reconfigurable, providing good security for RFID tags.
Highlights
This paper proposes an Radio frequency identification technology (RFID) authentication protocol based on the resistive random access memory (RRAM) physical unclonable function (PUF)
In order to improve the computational efficiency of the PUF circuit and expand the challenge response space, this paper proposes a new type of PUF circuit based on RRAM
Under the correlation-based power analysis attack, the number of traces to successfully analyze RRAM PUF is more than 1 × 107, 20 times as many as that of CMOS PUF
Summary
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. The PUFs are easy to construct with a few numbers of gates [3] and their outputs are difficult to predict but easy to evaluate This makes them a good choice for use as primitive security for an RFID system. It should be noted that the NVM PUF may not follow the canonical definition of PUF, but it is more similar to a true random number generator with a (secure) NVM Most of these prior works are based on simulations [13] or a single device measurement, which usually could not accurately reflect the statistics of variability and reliability in the memory arrays. The circuit improves the computational efficiency of the PUF circuit and expand the challenge response space This protocol can be applied to RFID systems that include RRAM.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have