A mobile RFID two-way authentication method based on dynamic shared key

A technology of shared key and authentication method, which is applied in the field of radio frequency identification, can solve the problems of security attacks, dynamic shared key cannot be safely updated, and cannot completely prevent desynchronization attacks, etc., achieves good label efficiency and performance, and realizes random dynamic Effect of Security Updates

Inactive Publication Date: 2018-05-01
HENAN POLYTECHNIC UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that the mobile RFID authentication method using the dynamic shared key cannot completely prevent desynchronization attacks, the dynamic shared key cannot be safely updated, and is vulnerable to various security attacks, the present invention proposes a dynamic shared key-based Mobile RFID two-way authentication method, while preventing security attacks against mobile RFID, has high tag performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile RFID two-way authentication method based on dynamic shared key
  • A mobile RFID two-way authentication method based on dynamic shared key
  • A mobile RFID two-way authentication method based on dynamic shared key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Symbol Description

[0025] Table 1 Symbol description

[0026]

[0027] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0028]Initialization stage: When the system is initialized, four data tables are set up in the background database to store the shared key and identification information of the tag and the reader and the background database. The tag's current information table Tag_c_au stores the tag ID, the current shared key, and the hash code of the tag ID with the current key as a parameter; the tag's history information table Tag_h_au stores the tag ID, the tag history shared key, and the tag ID with the history The shared key is the Hash code of the parameter; the reader identity and the current key are stored in the reader current information table Reader_c_au; the reader identity and the historical key are stored in the reader history information table Reader_h_au. Each tag stores the shared...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-way authentication method of a random dynamic shared key for mobile radio frequency identification, which is used to solve the security update of the dynamic shared key and the synchronization problem after being attacked in the radio frequency identification authentication method, as well as the vulnerability other security threats. The technical solution improves the traditional method of only using random numbers for identity authentication, not only makes the random number generated by the tag serve as a parameter for mutual authentication between the tag and the back-end database, but also makes it a means for the back-end database, the reader and the tag to dynamically update the shared key. Seeds to achieve shared key security and random dynamic update; the scheme adopts the method of storing historical shared keys in separate tables in the background database and dynamically adding and deleting them, so as to ensure that the shared keys between readers, tags and the background database can be saved after being attacked keys are kept in sync. The invention can prevent multiple security attacks aimed at the mobile RFID system, and has high efficiency in key label performance.

Description

technical field [0001] The invention relates to radio frequency identification technology, in particular to a safety authentication method based on random dynamic shared key related to mobile radio frequency identification. Background technique [0002] Radio Frequency Identification (RFID) is one of the key implementation technologies of the Internet of Things. While RFID is promoting the rapid development of the Internet of Things, it is accompanied by serious security threats. The two most important aspects are identity authentication and privacy protection. In the mobile RFID system, the mobile reader communicates with the background database, the mobile reader and the tag in an unsafe open channel in the form of wireless signals. Therefore, the security risks faced by mobile RFID systems are more serious and diverse. [0003] Among the authentication methods proposed by scholars at home and abroad, most of them are designed for traditional RFID systems. These methods ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06
CPCH04W12/04H04W12/06
Inventor 王国伟张敏郭海儒薛曼君彭维平贾宗璞
Owner HENAN POLYTECHNIC UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products