RFID security authentication method based on EPC C-1G-2 standard

An EPCC-1G-2, security authentication technology, applied to key distribution, can solve problems such as poor security

Inactive Publication Date: 2012-06-13
XIDIAN UNIV +1
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the technical problem of poor security of the existing RFID security authentication method based on the EPC C-1G-2 standard, the present invention provides a RFID security authentication method based on the EPC C-1G-2 standard. The device uses cyclic redundancy check code (CRC), pseudo-random number generator (PRNG) and bitwise exclusive-or (XOR) operations,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID security authentication method based on EPC C-1G-2 standard
  • RFID security authentication method based on EPC C-1G-2 standard
  • RFID security authentication method based on EPC C-1G-2 standard

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Explanation of terms: EPC C-1G-2: Electronic Product Code class-1generation-2, the second generation standard of electronic product code class 1;

[0029] EPC: tag identifier;

[0030] EPC S : Tag identification code, a 16-bit character string generated by bitwise XOR of 96 bits of the tag identifier EPC divided into six 16-bit blocks;

[0031] N: the maximum number of tags in the RFID system;

[0032] i: positive integer (1≤i≤N);

[0033] l: data length value, usually set to the length of the tag identifier;

[0034] N 1 : a random number with a length of l bits;

[0035] N 2 : a random number with a length of l bits;

[0036] K i : the shared secret stored in the tag;

[0037] C i : The tag index number stored in the tag, used to find the corresponding record of the tag in the database;

[0038] new : The subscript new indicates the current value;

[0039] old : The subscript old indicates the previous value;

[0040] K inew : the current shared secret s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a RFID (Radio Frequency Identification) security authentication method based on an EPC (Electronic Product Code) C-1G-2 standard. The method is used for solving the technical problem of poor security of the existing RFID security authentication method based on the EPC C-1G-2 standard. A technical scheme is that a tag and a reader use cyclic redundancy check codes (CRC), a pseudo random number generator (PRNG) and bitwise exclusive OR operations, so that known security holes of the existing RFID authentication scheme are solved, tag tracking attacks are resisted effectively, and tag forward security is ensured. Moreover, the method meets the EPC C-1G-2 standard of the low-cost RFID tag, reduces demands on storage and calculation of the tag and can be well suitable for the requirement on application of low-performance equipment.

Description

technical field [0001] The invention relates to an RFID security authentication method, in particular to an RFID security authentication method based on the EPC C-1G-2 standard. Background technique [0002] In the radio frequency identification (Radio Frequency Identification hereinafter referred to as RFID) system, due to the wireless communication between the reader and the tag through radio frequency signals, the RFID system is extremely vulnerable to various attacks, and security issues have become the main problem facing the wide application of RFID technology. challenge. [0003] The document "Securing RFID systems conforming to EPC Class-1Generation-2standard, Expert Systems with Applications, 2010, 37(12): 7678-7683" discloses that the verification conforms to the EPC C-1G-2 standard (Electronic Product Code class-1generation-2 , electronic product coding class 1 second-generation standard) RFID security authentication method, the method on the label and reader equ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08G06K17/00
Inventor 庞辽军徐银雨李慧贤裴庆祺崔静静赵军何利伟王掌权
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products