RFID (radio frequency identification device) authentication method and system based on PUFs (physical unclonable functions)

An authentication method and reader technology, applied in the field of Internet of Things and information security

Active Publication Date: 2013-11-13
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is mainly aimed at the limited energy, computing power and storage space of the RFID system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID (radio frequency identification device) authentication method and system based on PUFs (physical unclonable functions)
  • RFID (radio frequency identification device) authentication method and system based on PUFs (physical unclonable functions)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The invention will be described in further detail below in conjunction with the accompanying drawings.

[0031] The authentication method of the present invention mainly has two stages, namely: initialization stage and authentication stage, and its specific implementation mode is:

[0032] 1. Initialization stage: background database, reader and all tags are pre-installed with some information in a safe environment.

[0033] (1), the server calculates the public key H and the private key pair (F, F p ), then (ID t , H) as a record stored in the label, where ID t is the ID of the tag, and the reader IDr is stored in the reader.

[0034] (2), built-in PUF module in the reader and tag (expressed by P function), calculate G=P(ID r ), Q=P(ID t ) will G, Q, (F, F p ) into the background database.

[0035] 2. Authentication stage: To realize the authentication process of Reader and Tag, it is divided into the following five steps.

[0036] Step 1: Reader sends a reques...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an RFID authentication method and system based on PUFs. The system comprises a backend database, a reader and a tag, wherein communication between the backend database and the reader can be realized by using a conventional network security technology, so that the communication between the backend database and the reader is safe; however, the communication between the reader and the tag is not realized through the conventional network security technology, so that the communication is not safe. The RFID authentication method has the advantages of high safety and authentication efficiency, little in resource consumption and the like, can resist typical attack techniques such as replay attacks, counterfeit attacks, track attacks, physical attacks and the like, has forward safety and backward safety, and realizes bidirectional authentication between the reader and the tag. A public key encryption method is used, so that the RFID authentication method has higher safety.

Description

technical field [0001] The invention relates to the technical field of Internet of Things and information security, in particular to a PUF-based RFID authentication method and system. Background technique [0002] Radio frequency identification, that is, RFID (Radio Frequency Identification) technology, uses radio frequency to conduct non-contact two-way communication and exchange data, effectively realizes non-contact automatic identification and dynamic management of items, and improves the efficiency and accuracy of social management, production and circulation. control ability. As the application of RFID becomes more and more widespread, security issues such as user privacy disclosure during use are becoming more and more prominent. Due to the insecure communication channels and the limited computing resources of RFID systems, it is still a challenging problem to design efficient and secure RFID protocols. [0003] Drawing on the idea of ​​authenticating individuals ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06K17/00
Inventor 杨一涛王振宇孙国梓王志伟卢杨
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products