Question: Here's a simple scenario and simple protocol using PUFs for authenticating a tag. (Keep in mind the concept of Physically Unclonable Functions) In the protocol
Here's a simple scenario and simple protocol using PUFs for authenticating a tag. (Keep in mind the concept of Physically Unclonable Functions)
In the protocol pictured below, the Reader stores ALL possible combinations of Challenge-Response pairs for every tag it needs to authenticate. During authentication, the Reader broadcasts the ID of the tag, and a greeting (Gn). Every tag may see this message, but only the one with the right ID will process the message. The right tag with the ID in the message will then feed the greeting to its PUF and compute the response Sn. The response is then sent to the Reader. This should be clear from the Figure below. For the next round of authenticating the same Tag, the process repeats with a new Greeting (Gn+1). Since the Reader has the responses, authentication is straightforward.
From the protocol, and class, it should be clear that eavesdropping attacks are ineffective in this protocol, since the attacker will be able to snoop on challenge response pairs for one round. But this pair will not be used again, attackers gain no practical advantage. Also, since the PUF is not clonable, attackers will not be able to generate the response expected. This much should be clear.
Give one or two reasons as to why you will NOT recommend this protocol if you are in-charge of securing RFID tags. Do not mention Replay Attacks and Jamming attacks!

ID, PUF ID ID, Gn P(G)S2 .00 ID, PUF ID ID, Gn P(G)S2 .00
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
