Safe, reliable and low-cost RFID mutual authentication method

A two-way authentication and RFID tag technology, which is applied in the field of wireless network communication and identity authentication, can solve problems that affect system security, are vulnerable to asynchronous attacks, and do not implement RFID tag authentication.

Inactive Publication Date: 2015-03-11
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Among them, the Hash chain protocol is a one-way authentication protocol, and its disadvantages are: ① Only the authentication of the RFID reader to the tag is realized, and the authentication of the RFID tag to the reader is not realized; Multiple calculations, the amount of calculation is quite large
The Hash-Lock protocol, the randomized Hash-Lock protocol and the LCAP protocol are two-way authentication protocols. Their disadvantages are: ①The Hash-Lock protocol has no dynamic ID update mechanism, and the key and ID are transmitted in plain text, which seriously affects the security of the system. sex
②The randomized Hash-Lock protocol does not have forward security and cannot resist location tracking attacks
③The LCAP protocol is easy to cause problems such as data out-of-sync between the database and the RFID tag, so it is vulnerable to asynchronous attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe, reliable and low-cost RFID mutual authentication method
  • Safe, reliable and low-cost RFID mutual authentication method
  • Safe, reliable and low-cost RFID mutual authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0049] A safe, reliable, and low-cost RFID bidirectional authentication method, used for security authentication during wireless communication between an RFID tag and an RFID reader-writer in an RFID automatic identification system, the RFID automatic identification system including an RFID tag, an RFID reader-writer and backend database, which includes:

[0050] (1) Embed a linear feedback shift register and a physical unclonable function (Physical Unclonable Function, PUF) in the RFID tag; among them, the function of the linear feedback shift register is to generate pseudo-random numbers; the function of the physical unclonable function is to generate and The Id of the RFID tag corresponds to the spoofed Id, avoiding the plain text transmission of the RFID tag Id and key. Embed a random number generator and the same linear feedback shift register as the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe, reliable and low-cost RFID mutual authentication method, which belongs to the field of wireless network communication technology. The method provided by the invention is an RFID mutual authentication protocol based on a linear feedback shift register, a physical unclonable function and mapping array technology. The method comprises the following steps: performing key authentication after completion of repeated information interaction between a reader and a tag, so as to ensure that only legal reader and tag can realize data reading, and then completing mutual authentication between the RFID tag and the reader. The method is characterized in that the linear shift register is adopted to generate pseudorandom numbers so as to effectively reduce gate circuit numbers; the physical unclonable function is adopted to disguise tag ID information so as to avoid core information leakage; and the mapping array technology is adopted to protect the tag position privacy. The method provided by the invention not only can protect the privacy data of the tags from being stolen by illegal users, but also can effectively defense internal / external malicious system attack by users.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to a safe, reliable and low-cost RFID bidirectional authentication method, which belongs to the technical field of wireless network communication. Background technique [0002] RFID (Radio Frequency Identification) is a non-contact automatic identification technology, which automatically identifies target objects and obtains relevant data information through radio frequency signals. The RFID reader sends a radio frequency signal of a certain frequency through the transmitting antenna. When the RFID tag enters the working area of ​​the transmitting antenna, the tag sends out its own code and other information through its built-in transmitting antenna; the system receiving antenna receives the carrier wave sent from the tag. The signal is transmitted to the reader-writer through the antenna regulator, and the reader-writer demodulates and decodes the received signal, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/069H04W12/47
Inventor 王超李杨樊秀梅
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products