Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hash function based RFID (Radio Frequency IDentification) mutual authentication method

A two-way authentication and RFID tag technology, which is applied in the fields of identity authentication and wireless network communication, can solve problems such as large amount of calculation, vulnerability to attack, out-of-sync database and RFID tag data, etc., to achieve enhanced security, low computing cost, and avoid The effect of plaintext transmission

Inactive Publication Date: 2013-02-06
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Among them, the Hash chain protocol is a one-way authentication protocol, and its disadvantages are: ① Only the authentication of the reader to the tag is realized, and the authentication of the tag to the reader is not realized; Computing, the amount of calculation is quite large
The Hash-Lock protocol, the randomized Hash-Lock protocol and the LCAP protocol are two-way item authentication protocols. Their disadvantages are: ①The Hash-Lock protocol does not have a dynamic ID update mechanism, and the key and ID are transmitted in plain text, which seriously affects the security of the system. safety
②The randomized Hash-Lock protocol does not have forward security and cannot resist location tracking attacks
③The LCAP protocol is easy to cause problems such as data out-of-sync between the database and the RFID tag, so it is also vulnerable to attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash function based RFID (Radio Frequency IDentification) mutual authentication method
  • Hash function based RFID (Radio Frequency IDentification) mutual authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to better illustrate the technical solution of the present invention, the present invention will be further described through an embodiment in conjunction with the accompanying drawings.

[0047] An RFID two-way authentication method based on a Hash function is used for security authentication during wireless communication between an RFID tag and an RFID reader in an RFID automatic identification system. The RFID automatic identification system includes an RFID tag, an RFID reader and Background database, which includes:

[0048] (1) Embed the Hash function in the RFID tag to generate pseudo-random numbers. The random number generator and the same Hash function as the RFID tag are embedded in the background database. The function of the random number generator is to generate random numbers.

[0049] (2) Initialize the RFID automatic identification system, as follows:

[0050] Load a triple {Id, Key, Map[m]} into each RFID tag, where Id represents the unique identifica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Hash function based RFID (Radio Frequency IDentification) mutual authentication method, which belongs to the field of wireless network communication technology. According to the method, utilizing the hash function with a one-way irreversible operational property to avoid information leakage and effectively reduce cost; utilizing mapping array technology to protect tag position privacy; and performing key authentication after completion of repeated information interaction between a reader and a tag, so as to ensure that only legal reader and tag can realize data reading, and then completing mutual authentication between the RFID tag and the reader. The method provided by the invention not only can protect the privacy data of the tags from being stolen by illegal users, but also can effectively defense internal / external malicious system attack by users.

Description

Technical field [0001] The invention relates to the technical field of identity authentication, in particular to an RFID two-way authentication method based on a Hash function, and belongs to the technical field of wireless network communication. Background technique [0002] RFID (Radio Frequency Identification) is a non-contact automatic identification technology, which uses radio frequency signals to automatically identify target objects and obtain relevant data information. The tag reader / writer sends a certain frequency radio frequency signal through the transmitting antenna. When the RFID tag enters the working area of ​​the transmitting antenna, the tag transmits its own coding and other information through its built-in transmitting antenna; the system receiving antenna receives the carrier wave sent from the tag The signal is transmitted to the reader through the antenna adjuster, and the reader demodulates and decodes the received signal, and then sends it to the backgro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/06H04W12/041H04W12/0433H04W12/122
Inventor 李杨王超樊秀梅
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More