Dergi makalesi Açık Erişim

k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions

Kardas, Suleyman; Celik, Serkan; Bingol, Muhammed Ali; Kiraz, Mehmet Sabir; Demirci, Huseyin; Levi, Albert


JSON

{
  "conceptrecid": "100442", 
  "created": "2021-03-16T14:26:30.489785+00:00", 
  "doi": "10.1002/wcm.2482", 
  "files": [
    {
      "bucket": "2ea2857b-87eb-4f51-a076-b0a7f821d8f9", 
      "checksum": "md5:b6b965cbe5b02e0ebbdc8ead8536f7d0", 
      "key": "bib-5fe3208d-df50-4724-b782-d9b54dfc0d30.txt", 
      "links": {
        "self": "https://aperta.ulakbim.gov.tr/api/files/2ea2857b-87eb-4f51-a076-b0a7f821d8f9/bib-5fe3208d-df50-4724-b782-d9b54dfc0d30.txt"
      }, 
      "size": 258, 
      "type": "txt"
    }
  ], 
  "id": 100443, 
  "links": {
    "badge": "https://aperta.ulakbim.gov.tr/badge/doi/10.1002/wcm.2482.svg", 
    "bucket": "https://aperta.ulakbim.gov.tr/api/files/2ea2857b-87eb-4f51-a076-b0a7f821d8f9", 
    "doi": "https://doi.org/10.1002/wcm.2482", 
    "html": "https://aperta.ulakbim.gov.tr/record/100443", 
    "latest": "https://aperta.ulakbim.gov.tr/api/records/100443", 
    "latest_html": "https://aperta.ulakbim.gov.tr/record/100443"
  }, 
  "metadata": {
    "access_right": "open", 
    "access_right_category": "success", 
    "communities": [
      {
        "id": "tubitak-adresli-yayinlar"
      }
    ], 
    "creators": [
      {
        "name": "Kardas, Suleyman"
      }, 
      {
        "name": "Celik, Serkan"
      }, 
      {
        "name": "Bingol, Muhammed Ali"
      }, 
      {
        "affiliation": "Tubitak Bilgem Uekae, Kocaeli, Turkey", 
        "name": "Kiraz, Mehmet Sabir"
      }, 
      {
        "affiliation": "Tubitak Bilgem Uekae, Kocaeli, Turkey", 
        "name": "Demirci, Huseyin"
      }, 
      {
        "affiliation": "Sabanci Univ, Fac Engn & Nat Sci, Istanbul, Turkey", 
        "name": "Levi, Albert"
      }
    ], 
    "description": "This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k-strong and k-forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k-resistant PUFs. k-PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public-key cryptography using k PUF-based authentication. We finally prove that our extended proposal achieves both reader authentication and k-strong privacy. Copyright (C) 2014 John Wiley & Sons, Ltd.", 
    "doi": "10.1002/wcm.2482", 
    "has_grant": false, 
    "journal": {
      "issue": "18", 
      "pages": "2150-2166", 
      "title": "WIRELESS COMMUNICATIONS & MOBILE COMPUTING", 
      "volume": "15"
    }, 
    "license": {
      "id": "cc-by"
    }, 
    "publication_date": "2015-01-01", 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "100443"
          }, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "100442"
          }
        }
      ]
    }, 
    "resource_type": {
      "subtype": "article", 
      "title": "Dergi makalesi", 
      "type": "publication"
    }, 
    "title": "k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions"
  }, 
  "owners": [
    1
  ], 
  "revision": 1, 
  "stats": {
    "downloads": 7.0, 
    "unique_downloads": 7.0, 
    "unique_views": 29.0, 
    "version_downloads": 7.0, 
    "version_unique_downloads": 7.0, 
    "version_unique_views": 29.0, 
    "version_views": 31.0, 
    "version_volume": 1806.0, 
    "views": 31.0, 
    "volume": 1806.0
  }, 
  "updated": "2021-03-16T14:26:30.541128+00:00"
}
31
7
görüntülenme
indirilme
Görüntülenme 31
İndirme 7
Veri hacmi 1.8 kB
Tekil görüntülenme 29
Tekil indirme 7

Alıntı yap