Desynchronization-Resistant Anonymous Authentication Protocol for RFID Systems Utilizing Physically Unclonable Functions

dc.contributor.authorMuhammad, Fazal
dc.contributor.authorBadshah, Akhtar
dc.contributor.authorAi, Xin
dc.contributor.authorWaqas, Muhammad
dc.contributor.authorKhan, Jalal
dc.contributor.authorVasilakos, Athanasios V.
dc.contributor.authorSong, Houbing
dc.date.accessioned2026-01-22T16:18:25Z
dc.date.issued2025-12-18
dc.description.abstractRadio frequency identification (RFID) systems are an indispensable part of many critical Internet of Things (IoT) applications, including supply chain management and access control. Ensuring strong security in these systems is critical to safeguarding sensitive information and protecting user privacy. In recent years, in order to meet the diversified security needs of RFID systems, authentication and key protocols based on physical unclonable functions (PUFs) have received wide attention. Nevertheless, existing protocols typically require RFID tags to pre-store an excessive number of secret credentials and impose considerable computational and communication overheads, which prove challenging for resource-constrained RFID tag. Additionally, certain lightweight protocols fall short of achieving their intended security and functional objectives, exhibiting insufficient anonymity and untraceability, and vulnerability to desynchronization attacks. To address these critical challenges, this paper first proposes a lightweight anonymous authentication and key agreement protocol designed for an ideal PUF environment. The proposed protocol integrates the arbiter PUF with cryptographic hash functions, providing robust resistance to potential attacks while minimizing system overhead. Subsequently, an enhanced protocol specifically tailored for noisy PUF scenarios is presented. This protocol employs a fuzzy extractor to reliably derive stable keys from noisy PUF responses, thereby mitigating the instability caused by inherent noise. Through comprehensive security analysis and formal verification, as well as performance evaluations compared with existing state-of-the-art protocols, both protocols are demonstrated to overcome the limitations of prior protocols and provide efficient and practically feasible solutions well suited for resource-constrained RFID environments.
dc.description.urihttps://ieeexplore.ieee.org/document/11303175
dc.format.extent13 pages
dc.genrejournal articles
dc.genrepostprints
dc.identifierdoi:10.13016/m2vuc6-ovg5
dc.identifier.citationMuhammad, Fazal, Akhtar Badshah, Xin Ai, et al. “Desynchronization-Resistant Anonymous Authentication Protocol for RFID Systems Utilizing Physically Unclonable Functions.” IEEE Internet of Things Journal, 2025, 1–1. https://doi.org/10.1109/JIOT.2025.3645565.
dc.identifier.urihttps://doi.org/10.1109/JIOT.2025.3645565
dc.identifier.urihttp://hdl.handle.net/11603/41445
dc.language.isoen
dc.publisherIEEE
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department
dc.relation.ispartofUMBC Faculty Collection
dc.rights© 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.subjectServers
dc.subjectPhysical unclonable function
dc.subjectAuthentication
dc.subjectRFID tags
dc.subjectSecurity
dc.subjectInternet of Things
dc.subjectProtocols
dc.subjectauthentication
dc.subjectSynchronization
dc.subjectkey agreement
dc.subjectInternet of Things (IoT)
dc.subjectphysically unclonable functions (PUFs)
dc.subjectUMBC Security and Optimization for Networked Globe Laboratory (SONG Lab)
dc.subjectCryptographic hash function
dc.subjectPerformance evaluation
dc.subjectRFID systems
dc.titleDesynchronization-Resistant Anonymous Authentication Protocol for RFID Systems Utilizing Physically Unclonable Functions
dc.typeText
dcterms.creatorhttps://orcid.org/0000-0003-2631-9223

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
DesynchronizationResistant_Anonymous_Authentication_Protocol_for_RFID_Systems_Utilizing_Physically_Unclonable_Functions.pdf
Size:
1.21 MB
Format:
Adobe Portable Document Format