Unlock instant, AI-driven research and patent intelligence for your innovation.

An ultra-lightweight RFID two-way authentication method based on tag id

A two-way authentication, ultra-lightweight technology, applied in the field of radio frequency identification, can solve the problems of increased implementation costs, denial of service attacks, and weak label privacy, and achieve the effect of reducing storage costs, shortening authentication time, and improving security performance.

Active Publication Date: 2018-06-12
GUANGDONG UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it was later pointed out that the output of the protocol has a large bias, which leads to weak privacy of tags and vulnerability to tracking attacks.
Since then, researchers introduced the MIXBITS function and proposed the Gossamer protocol, but some scholars found that it has security flaws such as denial of service attacks
[0007] In addition, the existing authentication methods still have the following deficiencies: (1) During the authentication process, the tag needs to generate a random number, so a random number generator must be installed on the tag, and the existence of the random number generator increases the number of tag gate circuits , leading to an increase in implementation costs; (2) The information transmitted between the tag and the reader is transmitted in plain text, and the attacker can easily obtain some privacy, which has serious security flaws; (3) Use HASH function and DES algorithm If the algorithm with a large amount of calculation is used for encryption operation, the entire authentication process takes a long time, so that the cost of the label cannot meet the requirements of the ultra-lightweight authentication protocol; (4) The amount involved in the authentication process is large, which will inevitably lead to The increase in the amount of calculation and the need to store more information on the tag will inevitably increase the storage space on the tag side, resulting in an increase in the overall cost of the tag

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An ultra-lightweight RFID two-way authentication method based on tag id
  • An ultra-lightweight RFID two-way authentication method based on tag id

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] The ultra-lightweight RFID two-way authentication method based on tag ID in this embodiment, the process is as followsfigure 1 shown, including the following steps:

[0043] In the first step, the reader sends an authentication request command to the tag; for example, a string "Hello" is sent as the authentication request command;

[0044] In the second step, the tag sends the first half of the identifier ID_L to the reader after receiving the authentication request command; the first half of the identifier ID_L refers to the first half of the identifier ID stored in the tag;

[0045] In the third step, the reader judges whether the first half of the received identifier ID_L has the same value in the stored data:

[0046] If it does not exist, it is determined that the label is forged and the authentication is over;

[0047] If there is, the reader fetches the identifier ID' corresponding to the first half of the identifier ID_L, the second half of the identifier ID_R'...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an ultra-lightweight RFID bidirectional authentication method based on a label ID. A bit operation method and a cyclic check code method are used for encrypting transmission information, so that the operation quantity of a label and a reader-writer is reduced, a communication protocol can reach an ultra-lightweight level, and the authentication time is shortened; the reader-writer generates a random number, so the cost of the label can be reduced; unique identifier information of the shared label of the label and the reader-writer is fully used to reduce the introduction and storage of the information; the reader-writer calculates a new shared key and transmits the new shared key to the label via simple encryption, and the label only needs to carry out simple xor operation to obtain the new shared key, so the operation quantity of the label is reduced; and the information transmitted between the label and the reader-writer is transmitted after being encrypted, so that an attacker is unlikely to obtain effective information, and thus the security performance can be effectively improved.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification, and more particularly, to an ultra-lightweight RFID two-way authentication method based on tag ID. Background technique [0002] RFID (Radio Frequency Identification, radio frequency identification) is a non-contact technology that automatically identifies people or objects without physical contact or any other visible contact. Today, RFID systems are widely used in supply chain management occasions, digital library management occasions, anti-counterfeiting electronic passport systems, and even building intelligent self-organizing network environments. [0003] The RFID system includes three parts: back-end database, reader and tag. The communication channel between the back-end database and the reader is generally considered to be safe and reliable; the channel between the reader and the tag is exposed to the air and can be easily monitored. Further, the reader or tag can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/085H04L9/0891H04L9/32H04L63/0807
Inventor 凌捷刘道微谢锐柳毅
Owner GUANGDONG UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More