Desynchronization-Resistant Anonymous Authentication Protocol for RFID Systems Utilizing Physically Unclonable Functions
Links to Files
Author/Creator ORCID
Date
Type of Work
Department
Program
Citation of Original Publication
Muhammad, Fazal, Akhtar Badshah, Xin Ai, et al. “Desynchronization-Resistant Anonymous Authentication Protocol for RFID Systems Utilizing Physically Unclonable Functions.” IEEE Internet of Things Journal, 2025, 1–1. https://doi.org/10.1109/JIOT.2025.3645565.
Rights
© 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Subjects
Servers
Physical unclonable function
Authentication
RFID tags
Security
Internet of Things
Protocols
authentication
Synchronization
key agreement
Internet of Things (IoT)
physically unclonable functions (PUFs)
UMBC Security and Optimization for Networked Globe Laboratory (SONG Lab)
Cryptographic hash function
Performance evaluation
RFID systems
Physical unclonable function
Authentication
RFID tags
Security
Internet of Things
Protocols
authentication
Synchronization
key agreement
Internet of Things (IoT)
physically unclonable functions (PUFs)
UMBC Security and Optimization for Networked Globe Laboratory (SONG Lab)
Cryptographic hash function
Performance evaluation
RFID systems
Abstract
Radio frequency identification (RFID) systems are an indispensable part of many critical Internet of Things (IoT) applications, including supply chain management and access control. Ensuring strong security in these systems is critical to safeguarding sensitive information and protecting user privacy. In recent years, in order to meet the diversified security needs of RFID systems, authentication and key protocols based on physical unclonable functions (PUFs) have received wide attention. Nevertheless, existing protocols typically require RFID tags to pre-store an excessive number of secret credentials and impose considerable computational and communication overheads, which prove challenging for resource-constrained RFID tag. Additionally, certain lightweight protocols fall short of achieving their intended security and functional objectives, exhibiting insufficient anonymity and untraceability, and vulnerability to desynchronization attacks. To address these critical challenges, this paper first proposes a lightweight anonymous authentication and key agreement protocol designed for an ideal PUF environment. The proposed protocol integrates the arbiter PUF with cryptographic hash functions, providing robust resistance to potential attacks while minimizing system overhead. Subsequently, an enhanced protocol specifically tailored for noisy PUF scenarios is presented. This protocol employs a fuzzy extractor to reliably derive stable keys from noisy PUF responses, thereby mitigating the instability caused by inherent noise. Through comprehensive security analysis and formal verification, as well as performance evaluations compared with existing state-of-the-art protocols, both protocols are demonstrated to overcome the limitations of prior protocols and provide efficient and practically feasible solutions well suited for resource-constrained RFID environments.
