RFID two-way authentication method based on Hash function and capable of updating keys synchronously

A synchronous update, two-way authentication technology, applied in the field of radio frequency identification, can solve the problems of limited storage space, computing power and power supply, difficult to apply, etc., to avoid denial of service attacks, prevent tracking, and ensure forward security.

Active Publication Date: 2015-04-29
JIANGXI UNIV OF SCI & TECH
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the strict limitation of the cost of tag hardware, the storage space, computing power and power supply are very limited, which makes it difficult for many existing mature cryptographic techniques to be effectively applied in RFID systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID two-way authentication method based on Hash function and capable of updating keys synchronously
  • RFID two-way authentication method based on Hash function and capable of updating keys synchronously
  • RFID two-way authentication method based on Hash function and capable of updating keys synchronously

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention will be further described below in conjunction with the accompanying drawings.

[0058] The protocol of the present invention includes three stages of system initialization, mutual authentication, and key update, and the specific interaction process is as follows:

[0059] 1. RFID system initialization

[0060] First initialize the RFID system, and the back-end database stores a record for each tag, such as figure 1 shown. Additionally, tags also store their own IDs i and key K i .

[0061] 2. System certification process

[0062] RFID system security certification process such as figure 2 As shown, the steps are as follows:

[0063] (1) The reader generates a random number r R , and send it to the tag together with the query command Query as an authentication request.

[0064] (2) The authentication of the tag by the reader

[0065] ① (reader → back-end database): the label receives the message {Query,r R}, also generate a random numbe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is an RFID two-way authentication method based on a Hash function and capable of updating keys synchronously. A label key dynamic updating mechanism is introduced in the method, a self-synchronizing solution scheme is designed, and secondary authentication on an RFID label is achieved. Safety analysis and performance comparison are performed on an existing protocol, the analysis result shows that on the premise that label cost is not increased, the computing amount of the label and a rear-end database is reduced through new two-way authentication, the retrieval efficiency of the rear-end database is improved, the privacy protection and safety problem of an RFID system is effectively solved, meanwhile, the executing efficiency of RFID protocol identification is improved, and the method is more suitable for a low-cost RFID system and a large-scale electronic label system and has certain application value.

Description

technical field [0001] The invention belongs to the technical field of radio frequency identification, and relates to a method for mutual security authentication of a reader-writer and a tag in an RFID system. Background technique [0002] Radio Frequency Identification (RFID) technology is a non-contact automatic identification technology implemented by radio frequency communication. Its basic principle is to use the spatial coupling (inductive or electromagnetic coupling) or reflection transmission characteristics of radio frequency signals to transmit information. , to achieve the purpose of quickly identifying targets and obtaining data. Compared with traditional identification technology, RFID technology has many advantages such as non-contact, strong anti-interference, ability to identify high-speed moving objects, and adaptability to harsh environments. RFID technology is widely used in logistics, tracking, positioning, industrial automation and transportation. Trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K17/00
Inventor 张小红胡应梦吴政泽
Owner JIANGXI UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products