Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Ultra-lightweight RFID bidirectional authentication method based on label ID

A two-way authentication, ultra-lightweight technology, applied in the field of radio frequency identification, can solve the problems of increased implementation cost, increased label cost, security defects, etc., to achieve the effect of reducing introduction and storage, reducing storage costs, and reducing label costs

Active Publication Date: 2016-04-27
GUANGDONG UNIV OF TECH
View PDF6 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it was later pointed out that the output of the protocol has a large bias, which leads to weak privacy of tags and vulnerability to tracking attacks.
Since then, researchers introduced the MIXBITS function and proposed the Gossamer protocol, but some scholars found that it has security flaws such as denial of service attacks
[0007] In addition, the existing authentication methods still have the following deficiencies: (1) During the authentication process, the tag needs to generate a random number, so a random number generator must be installed on the tag, and the existence of the random number generator increases the number of tag gate circuits , leading to an increase in implementation costs; (2) The information transmitted between the tag and the reader is transmitted in plain text, and the attacker can easily obtain some privacy, which has serious security flaws; (3) Use HASH function and DES algorithm If the algorithm with a large amount of calculation is used for encryption operation, the entire authentication process takes a long time, so that the cost of the label cannot meet the requirements of the ultra-lightweight authentication protocol; (4) The amount involved in the authentication process is large, which will inevitably lead to The increase in the amount of calculation and the need to store more information on the tag will inevitably increase the storage space on the tag side, resulting in an increase in the overall cost of the tag

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ultra-lightweight RFID bidirectional authentication method based on label ID
  • Ultra-lightweight RFID bidirectional authentication method based on label ID
  • Ultra-lightweight RFID bidirectional authentication method based on label ID

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] This embodiment is based on the ultra-lightweight RFID two-way authentication method of tag ID, and its process is as follows figure 1 shown, including the following steps:

[0043] In the first step, the reader sends an authentication request command to the tag; for example, the string "Hello" is sent as the authentication request command;

[0044] In the second step, the tag sends the value ID_L of the first half of the identifier to the reader after receiving the authentication request command; the value ID_L of the first half of the identifier refers to the first half of the identifier ID stored in the tag;

[0045] In the third step, the reader judges whether the first half value ID_L of the received identifier has the same value in the stored data:

[0046] If it does not exist, it is judged that the label is forged, and the authentication ends;

[0047] If it exists, the reader calls the identifier ID' corresponding to the first half of the identifier ID_L, the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an ultra-lightweight RFID bidirectional authentication method based on a label ID. A bit operation method and a cyclic check code method are used for encrypting transmission information, so that the operation quantity of a label and a reader-writer is reduced, a communication protocol can reach an ultra-lightweight level, and the authentication time is shortened; the reader-writer generates a random number, so the cost of the label can be reduced; unique identifier information of the shared label of the label and the reader-writer is fully used to reduce the introduction and storage of the information; the reader-writer calculates a new shared key and transmits the new shared key to the label via simple encryption, and the label only needs to carry out simple xor operation to obtain the new shared key, so the operation quantity of the label is reduced; and the information transmitted between the label and the reader-writer is transmitted after being encrypted, so that an attacker is unlikely to obtain effective information, and thus the security performance can be effectively improved.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification, and more specifically, relates to an ultra-lightweight RFID bidirectional authentication method based on a tag ID. Background technique [0002] RFID (Radio Frequency Identification, Radio Frequency Identification) is a non-contact technology that automatically identifies people or objects without physical contact or any other visible contact. Today, RFID systems are widely used in supply chain management occasions, digital library management occasions, anti-counterfeiting electronic passport systems, and even building intelligent ad hoc network environments and so on. [0003] The RFID system includes three parts: the back-end database, the reader and the label. The communication channel between the back-end database and the reader is generally considered to be safe and reliable; the channel between the reader and the tag is exposed to the air, and it is very easy to be m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/085H04L9/0891H04L9/32H04L63/0807
Inventor 凌捷刘道微谢锐柳毅
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products