Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A lightweight RFID two-way authentication method against desynchronization

A two-way authentication, lightweight technology, applied in key distribution, can solve problems such as desynchronization attacks, achieve the effect of small computing overhead, increase tolerance, and improve privacy and security attributes

Active Publication Date: 2017-02-08
BEIJING UNIV OF POSTS & TELECOMM
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2007, Chien HY worked on ultra-lightweight SASI authentication protocol (H Y Chien. SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(9): 337-340 ) only uses a limited number of ultra-lightweight algorithms such as XOR (exclusive OR) and ROT cyclic shift to realize the challenge-response, and establishes two key storage units in the background database to improve the key recovery ability, but due to ROT Due to the algebraic nature of the function, SASI is proven to be susceptible to bit tampering (Dimitriou,T.(2005).ALightweight RFID Protocol to protect against Traceability and Cloning attacks[C] / / Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), Athens, Greece, ISBN: 0769523692) desynchronization attack
The protocol designed by Peris Lopez relies entirely on the reader PRNG (pseudo-random number generator) to provide freshness, which saves the computational overhead of tags, but the protocol is also vulnerable to desynchronization attacks (LiT Wang. Security analysis of two ultra-lightweight RFID authenticationprotocols[C] / / Proceedings of the IFIP TC-11 22 nd International Information Security Conference IFIP SEC 2007. South Africa: 2007: 109-120) and algebraic attacks (Gidas Avoine, Xavier Carpent. Strong Authentication and Strong Integrity (SASI) Is Not That Strong[C] / / The 6 th International Workshop.RFIDSec 2010.Turkey: Istanbul, 2010, 50-64)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A lightweight RFID two-way authentication method against desynchronization
  • A lightweight RFID two-way authentication method against desynchronization
  • A lightweight RFID two-way authentication method against desynchronization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] (1) Implementation steps

[0019] The protocol includes three stages of initialization, authentication, and update. The specific interaction process between the background-reader and the tag in the protocol is described as follows:

[0020] 1. Initialization phase

[0021] The RFID system generates a unique serial number C for each tag Tag i , self-updating parameter T i , and share the key group with the database (key i L, key i h). The tag party saves its unique search name and key group, and the storage unit is (IDS, keyL, keyH, T i , C); background database storage directory (Pre-IDS i , Pre-key i ;Cur-IDS i , Cur-key i ; C), where the Cur key unit of the database (Cur-IDS i , Cur-key i ) is the same as (IDS, key) for tags. The reader side and the background database each maintain a local clock t.

[0022] 2. Authentication stage

[0023] 2.1) Step 1Reader→Tag(Challenge Message): r R

[0024] The reader generates a random number r R And sent to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a lightweight bidirectional authentication protocol which can be used in an RFID system of the Internet of Things. The bidirectional challenging response of a backstage and an RFID label is achieved based on a dual authentication mechanism of 'bidirectional random number-new and old key pair, the pseudo random number and the clock parameter are bound through the time attachment encryption, and the trust worthiness of the freshness amount of the protocol can be improved. The protocol participates in authentication through the new and old key pair preset by a backstage database to resist the desynchronizatio excluding the RFID system, and the unbalance between the backstage and a label key is avoided. A reader and the backstage resist the desynchronization from the interior of a system through the time attachment encryption / decryption, and the occurrence that the backstage refuses an authentication label perpetually due to the fact that a malicious reader releases information again is avoided. In addition, the key is updated through the Hash operation, the parameter is corrected by alternately adopting the ultra-lightweight Mixbits function, and the tracking prevention and forward direction safety of the protocol are guaranteed on the basis of reducing the protocol calculating expenditure. The protocol has the advantages of being safe, efficient, flexible and suitable for the fields of identifying the low-cost RFID system, updating the key and the like.

Description

technical field [0001] The invention relates to a lightweight anti-desynchronization RFID two-way authentication method, which uses a "two-way random number-new and old key pair" double authentication mechanism to realize the two-way challenge-response of the background database-label system, and uses clock parameters to bind The method of pseudo-random number guarantees the trustworthiness and real-time performance of the fresh quantity of the protocol. The operation of key update and authentication parameters uses lightweight hash function and ultra-lightweight cyclic shift function, and finally combines the theory based on colored petri net Formal simulation and informal methods are used to analyze the privacy and security of the protocol, and it is proved that the protocol can reach the expected state space, and can effectively resist location tracking attacks and desynchronization attacks. This method only needs three communications to complete the authentication of the r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 高欣贾庆轩陈鹏赵兵王鑫
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products