Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Radio frequency identification bidirectional authentication method based on hash function

A wireless radio frequency, two-way authentication technology, applied in the field of Internet of Things and communications, can solve the problem that Hash-lock protocol is vulnerable to retransmission attacks, spoofing attacks, and does not have anti-tracking properties.

Inactive Publication Date: 2013-04-03
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Third parties can monitor, interfere, and tamper with the conversation between tags and readers, and the integrity and availability of information is difficult to guarantee
[0008] The Hash-lock protocol is vulnerable to retransmission attacks and spoofing attacks, and it is not anti-tracking; the random number generation operation in the randomized Hash-lock protocol is mainly done by tags, and this operation is not necessary in the case of low-cost tags. Realistically, the database transmits all IDs to the reader, which increases the workload of the reader and the time consumption of the entire authentication. The ID is transmitted in plain text, which is likely to cause ID information leakage; One-way authentication of tags; hash-based ID change protocol technology has disadvantages such as data out-of-sync problems and too much tag calculation load

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention provides a two-way authentication method in the RFID system. The ID of the tag T is transmitted in an anonymous manner, and the encrypted transmission is performed separately. In this way, the ID information is not transmitted in plain text, and the tag is transmitted in an anonymous manner. ID information can effectively protect the untraceability of label information. In addition, the embodiment of the present invention proposes a tag-inquiry communication method on the issue of data synchronization, by storing a random session key in the database DB, and updating the session key after the database obtains the tag's response to the key update request The method improves the reliability of the session key between the tag and the database.

[0057] Below in conjunction with embodiment, describe the specific embodiment of the present invention.

[0058] One: RFID system initialization

[0059] When the RFID system is initialized, each tag and read...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a radio frequency identification bidirectional authentication method based on hash function. The mutual verification of identify between a tag and a reader is specifically as follows: the pre-allocated and stored tag information or shared information is read and verified by a rear-end system, the local time of the rear-end system is used as the identification tag information shared with the tag, the initial value is allocated to each tag by a rear-end database system, and the subsequent change is updated by the rear-end system according to the local system time of the tag in each verification process; the rear-end system stores the mark information and associated information of the tag and carries out hash calculation in each verification process; and the RFID (radio frequency identification) tag comprises a pseudo-random number generator, and carries out hash calculation and xor logic calculation. The method has excellent safety and privacy protection characteristic, and can protect content privacy and position privacy, resist replay attach, attach of denial of service and data synchronization attach and prevent fake.

Description

technical field [0001] The invention relates to the field of Internet of Things and communication technology, specifically, a security authentication scheme of a radio frequency identification system, which mainly solves the problem of two-way authentication among tags, readers and databases in the radio frequency identification system. Background technique [0002] Radio Frequency Identification (RFID) technology is a non-contact automatic identification technology that emerged in the 1990s. It conducts non-contact two-way communication through radio frequency to achieve automatic identification of target objects. It has many advantages such as high precision, strong ability to adapt to the environment, strong anti-interference, and quick operation. [0003] The radio frequency identification system consists of 3 parts: RFID tags, RFID readers and background databases. The information of goods and users is stored in the RFID tag, and is transmitted to the back-end database...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K17/00H04L9/32
Inventor 叶宁朱艳王汝传林巧民王忠勤
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products