RFID lightweight class bidirectional authentication method based on PUF

A two-way authentication, lightweight technology, applied in the field of Internet of Things and information security authentication, can solve the problems of inability to resist counterfeit attacks, insufficient security, incorrect update of readers, etc., to achieve the effect of resisting counterfeit attacks and reducing complexity and cost

Inactive Publication Date: 2014-07-02
GUANGDONG UNIV OF TECH
View PDF4 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]At present, the PUF-based RFID authentication method in the industry generally requires less hardware resources, but the tag side does not have the ability to generate pseudo-random numbers, which cannot resist counterfeiting attacks ; and when the attacker tampers with the communication process, the reader will perform an incorrect update, resulting in a desynchronization attack, which is not secure enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID lightweight class bidirectional authentication method based on PUF

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0049] The specific process of a kind of PUF-based RFID lightweight two-way authentication method of the present invention is as follows:

[0050] (1) Initialization

[0051] refer to figure 1 , when the present invention is initialized, there are 2 data structures stored inside each tag, one is {Index, ID, k, Gn}, and the other is the Index and Gn when the last tag passed the reader authentication for synchronization , denoted as {PreIndex, PreGn}, and stores PF, LF and updated values ​​k', Gn' and G n+1 '. And the reader stores a data structure about each tag {Index, ID, Gn, G n+1}, while storing the same LF as the tag, and also integrates a pseudo-random number generator.

[0052] (2) Two-way authentication process

[0053] The RFID two-way authentication process of the present invention is as figure 1 shown. Among them, Req is the authentication request, M1={Index, rt}, M2= { , } , M3={ , }.

[0054] The detailed authentication process of the present inven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an RFID lightweight class bidirectional authentication method based on a PUF. Information encryption and pseudo random number generation are carried out through a linear feedback shift register protected through a secret key seed, counterfeit attack can be resisted, a pseudo random number generator does not need to be additionally integrated, and complexity and cost of a label are reduced; in the communication process, all communication information is effectively utilized to carry out authentication, the problem of desynchronization attack of out-of-step information between a reader and the label can be effectively solved through falsification and other means, and security is higher. The method can be widely applied to the internet of things and information security authentication fields.

Description

Technical field [0001] The invention involves the field of Internet of Things and information security certification, especially a PUF -based RFID lightweight two -way certification method. Background technique [0002] With the gradual popularization of the Internet of Things, RFID technology, as an important part of the Internet of Things, has become increasingly prominent.RFID security issues include privacy and certification issues, privacy issues include location tracking and information leakage. Certification issues include label cloning, tampering label data, counterfeit attacks, and replay attacks.At present, the RFID security certification method is an important method to respond to RFID security issues.Traditional RFID lightweight two -way authentication method, in order to achieve set security, the demand for hardware resources is large, such as simplified Hash functions and advanced encrypted standards AES (Advanced Encryption Standard), respectively.And MD5 and SHA-2...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K17/00
Inventor 甘万康凌捷柳毅
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products