RFID security authentication method based on physical unclonable function

A security authentication and function technology, applied in security communication devices, digital transmission systems, user identity/authority verification, etc., can solve security threats and attacks on labels and readers, to ensure system security and save system resources , the effect of improving execution efficiency

Inactive Publication Date: 2015-02-04
CHINA TOBACCO ZHEJIANG IND
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limitations of the RFID system's own hardware system and the particularity of the wireless communication link, the air interface between the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID security authentication method based on physical unclonable function

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0040] 1. RFID system initialization

[0041] When the RFID system is initialized, each tag T has an identity identifier PID T and the physical unclonable function PUF(·); the reader R has the identity identifier PID R ;The background database DB has all tags, the identifiers of the readers and the mathematical model of the integrated PUF( ) circuit structure inside all tags; the tag T, the reader R and the database DB have a secret shared secret value S n ; In the RFID system, the communication link from the reader to the background database is considered safe.

[0042] 2. Certification process

[0043] The safety authentication protocol steps of the RFID system are as follows:

[0044] Step 1: The reader R first generates a random number r R , and r R Sent to tag T as an inquiry request;

[0045] Step 2: After the tag T receives the request, it generates a random number r T ; Label T uses physical unclonable function to get S n+1 =PUF(S n ) and S n+2 =PUF(S n+1 ||...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an RFID security authentication method based on a physical unclonable function. The method realizes non-replicability of label data by utilizing the unique excitation response mapping mechanism of the physical unclonable function, and realizes freshness of shared secret values in an authentication period by introducing a dynamic updating mechanism. Targeted for the particularity and limitation of air interfaces of labels and reader-writers of an RFID system, the method utilizes an XOR operation and a unidirectional Hash function to effectively solve the problem of security data transmission of the RFID system. The method is practical and novel, and identity authentication is carried out by utilizing a lightweight cryptography operator, so that tamper-proofing performance of the label data is improved; and the method is suitable for RFID application scenarios having higher safety false-proofing demand.

Description

technical field [0001] The invention belongs to the technical field of RFID air interface security, and relates to an RFID security authentication protocol algorithm, in particular to an RFID security authentication method based on a physical unclonable function. Background technique [0002] RFID (Radio Frequency Identification) technology uses radio frequency signals to realize non-contact automatic identification of target objects, and is gradually being applied in intelligent logistics, supply chain management, security and anti-counterfeiting, identity anti-counterfeiting, asset management and other fields. As a typical wireless sensing technology of the Internet of Things system, RFID technology can realize item perception and information sharing on a global scale, and has broad market application prospects. However, due to the limitations of the RFID system's own hardware system and the particularity of the wireless communication link, the air interface between the ta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06K7/10
CPCH04L63/0846G06K7/10158H04L9/3226H04L9/3278
Inventor 高扬华陆海良郁钢梁启荣叶斌尚伟王毅君盛佳绮
Owner CHINA TOBACCO ZHEJIANG IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products