RFID (Radio Frequency Identification Device) mutual authentication method based on Hash

A technology of two-way authentication and reader, applied in the field of RFID two-way authentication, can solve the problem of low efficiency in retrieving target tags, and achieve the effect of reducing the amount of calculation and improving efficiency.

Inactive Publication Date: 2012-06-20
NORTHWESTERN POLYTECHNICAL UNIV +1
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the technical problem of low efficiency of the existing RFID authentication method database retrieval target tag, the present invention provides a Hash-based RFID two-way authentication method, which uses a pseudo-random number generator, Hash function and simple bitwise XOR operation , when the server retrieves the target tag in the database, it uses the tag response message to compare the tag records one by one with the tag records in the database, and then calculates and verifies after finding a matching record

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID (Radio Frequency Identification Device) mutual authentication method based on Hash
  • RFID (Radio Frequency Identification Device) mutual authentication method based on Hash
  • RFID (Radio Frequency Identification Device) mutual authentication method based on Hash

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Glossary:

[0028] N: the maximum number of tags in the RFID system;

[0029] i: positive integer (1≤i≤N);

[0030] new : The subscript new indicates the current value;

[0031] old : The subscript old indicates the previous value;

[0032] ID i : the tag identifier stored in the tag;

[0033] l: data length, usually set to the length of the tag identifier;

[0034] h(x): Hash function, h: {0, 1}l→{0, 1}l, x is an independent variable;

[0035] f k (x): Hash function f with key k : {0, 1} l × {0, 1} l → {0, 1} l , where k is the encryption key and x is the argument;

[0036] ID inew : the current tag identifier stored in the database;

[0037] ID iold : the previous tag identifier stored in the database;

[0038] h inew : the hash value of the current tag identifier stored in the database;

[0039] h iold : the hash value of the previous tag identifier stored in the database;

[0040] D. i : Details of tags stored in the database;

[0041] r 1 : ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an RFID (Radio Frequency Identification) mutual authentication method based on Hash. The RFID mutual authentication method is used for solving the technical problem of low efficiency of retrieving an object label of a database by using a traditional RFID mutual authentication method. The invention adopts the technical scheme that a pseudo-random number generator, a Hash function and a simple bitwise exclusive-OR operation are adopted; when a server retrieves the object labels in the database, comparison is carried out item by item firstly by using label response message information and label records in the database; and after a matched record is found, calculating validation is carried out. According to the method, calculating validation for each label record in the database is avoided, thereby the calculated quantity of the database of the server is effectively reduced and the efficiency of retrieving the object label in the database is remarkably increased; and in addition, the calculated quantity of the label in the authentication process is also reduced.

Description

technical field [0001] The invention relates to an RFID bidirectional authentication method, in particular to a Hash-based RFID bidirectional authentication method. Background technique [0002] In the radio frequency identification (Radio Frequency Identification hereinafter referred to as RFID) system, due to the wireless communication between the reader and the tag through radio frequency signals, the RFID system is extremely vulnerable to various attacks, and security issues have become the main problem facing the wide application of RFID technology. challenge. [0003] The document "RFID Authentication Protocol for Low-cost Tags. In Proc. of WISEC'08, 2008: 140-147" discloses a low-cost RFID authentication method. This method adopts a security mechanism based on hash (Hash), although it meets the privacy and security requirements of RFID authentication method design, but the efficiency of this method is low. In this method, after the server database receives the tag r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K17/00
Inventor 李慧贤徐银雨庞辽军裴庆祺赵军刘能宾何利伟王掌权
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products