A lightweight serverless RFID security search method

A search method and serviceless technology, applied in the field of lightweight serviceless RFID security search, can solve the problems of high energy consumption, incompatibility with passive tags, etc., achieve low hardware resource requirements, protect channel security and tag privacy, design Well-structured effect

Active Publication Date: 2017-07-25
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional security protocols like SSL / TLS can provide secure and reliable channels, but due to their high energy consumption, they are not suitable for passive tags

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A lightweight serverless RFID security search method
  • A lightweight serverless RFID security search method
  • A lightweight serverless RFID security search method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] (1) System initialization

[0091] Such as figure 1 As shown, the CA certification center issues digital certificates to the background server and W readers, and the background server fills the label with the key and sets the label time stamp T last It is the current time of the background server, and correspondingly records the corresponding relationship between the unique identification code ID of the tag and the key of the tag in the background database, and then attaches the tag to the identification object.

[0092] (2) System operation process

[0093] Such as figure 2 shown. First, the background server determines a certain reader R i for the search task reader; then, with the R i Use the TLS / SSL protocol for two-way authentication, so that both parties can confirm the legitimacy of the identity of the other party; after that, the background server sends its label to search the access list Here the key information k of the label s with its tag ID r i Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a lightweight no-service type RFID (radio frequency identification) safe search protocol. The protocol uses multiple tag collision for protecting the privacy of a target tag; a loose timestamp and a one-way Hash function are used, so that the safety problem possibly occurring to a data link between an RFID reader and the tag is effectively solved; and under the condition that no background server exists, the HASH function which can be realized through a passive tag is adopted, so that safe search and bidirectional authentication to the tag are guaranteed, and excellent characteristics of fast search and safety certificate are realized. Common active and passive attacks in a wireless link can be effectively resisted. The lightweight no-service type RFID safe search protocol is ingenious in structure and wide in application environment, and has a high safety level and privacy level.

Description

technical field [0001] The invention relates to a lightweight non-service RFID security search method, which belongs to the technical field of RFID communication security. Background technique [0002] RFID technology has many advantages such as non-contact reading, readable and writable, batch reading, and applicable to harsh environments. Therefore, RFID technology has received more and more attention in the fields of identification, sensor positioning, and logistics tracking, and is widely used in various industries such as logistics, aviation, transportation, and pet management. However, large-scale promotion has made security and privacy issues increasingly prominent, which has become a key factor restricting its development. Using wireless channels for non-contact reading not only brings convenience, but also provides good attack conditions for attackers. The use of passive attacks can lead to the leakage of company data and customers' personal privacy, malicious tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K17/00H04L9/32
Inventor 贾庆轩王鑫高欣赵兵陈钢翟峰陈鹏
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products