Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Radio frequency identification (RFID) safety communication method established according to ultra-lightweight RFID bidirectional authentication protocol

A two-way authentication and ultra-lightweight technology, applied in the field of communication, can solve the problems of security vulnerabilities and RFID failures, and achieve the effects of low communication costs, simple calculations, and low storage costs

Inactive Publication Date: 2013-01-16
SUN YAT SEN UNIV
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing RFID authentication protocols have certain security loopholes and hidden dangers or require too complicated operations, and RFID cannot be implemented in low-cost, low-level RFID systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio frequency identification (RFID) safety communication method established according to ultra-lightweight RFID bidirectional authentication protocol
  • Radio frequency identification (RFID) safety communication method established according to ultra-lightweight RFID bidirectional authentication protocol
  • Radio frequency identification (RFID) safety communication method established according to ultra-lightweight RFID bidirectional authentication protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The RFID secure communication method that the ultra-lightweight RFID two-way authentication protocol that the embodiment of the present invention provides provides the following two processes:

[0024] The initialization process:

[0025] At the beginning of the RFID system, each tag is assigned a unique 1-bit security identity code SID by the server or the manufacturer or completed t and a secret value S of length l-bit t , the server sends the security identity code SID t And the relevant information of the item with the tag is stored in the tag. When the item is logged in, the server will send the information related to the tag: the security identity code SID of each tag i , the current secret value S inew And the secret value S of the last successful authentication iold stored in the backend database. Authentication process:

[0026]1) Reader→Tag: The reader first generates a random number R r , will (Query, R r ) to the label.

[0027] 2) Tag→Reader→Server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a radio frequency identification (RFID) safety communication method established according to an ultra-lightweight RFID bidirectional authentication protocol. By adoption of the method, the security problems of a low-grade tag RFID system can be effectively solved. The method has the main characteristics of security, high efficiency, simplicity and practicability. A tag is only required to provide simple operation such as random number generator operation, exclusive-OR operation, modular operation (MOD) and displacement. Resources required by the simple operation are extremely limited, so the scheme is in complete accordance with an EPCglobal C1G2 tag specification, has the characteristics of low storage cost, low operation cost, low communication cost, novel and simple algorithm and the like, and is easy to implement. The method has the advantages that the problems about synchronization of the tag and a rear-end database key, forward security and security privacy (privacy leak, flow analysis and positioning tracking) can be effectively solved, and the common security problems of an RFID system about imitation attack, cloning attack, monitoring attack, replay attack and denial-of-service attack are solved. The method is quite applicable to solving the security problems of an EPCglobal C1G2 RFID tag.

Description

technical field [0001] The invention belongs to the technical field of communication, in particular to an RFID safety communication method established by an ultra-lightweight RFID bidirectional authentication protocol. Background technique [0002] Radio Frequency Identification (RFID) is an automatic identification technology with the characteristics of real-time, fast and accurate collection. The RFID system consists of three parts: the reader, the tag and the application program. The reader and the tag communicate in a non-contact manner. Low-cost RFID systems with limited resources will become one of the most dominant products in the RFID market. It is imperative to solve the security problems of these low-cost and low-level RFID systems and design a lightweight RFID authentication protocol. However, most of the existing RFID authentication protocols have certain security loopholes and hidden dangers or require too complicated operations, and RFID cannot be implemented ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00
Inventor 蔡庆玲詹宜巨杨健余松森
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products