Unlock instant, AI-driven research and patent intelligence for your innovation.

Hash function-based MH lightweight security authentication system and method

A security authentication and lightweight technology, applied in the field of Internet of Things security, can solve the problems of less hardware resources of passive tags and the inability to apply security protocols, etc., and achieve the effect of low hardware resource requirements, strong anti-collision, and good security

Inactive Publication Date: 2017-02-01
LIAONING UNIVERSITY OF TECHNOLOGY
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes passive tags the most widely used in RFID systems, but the hardware resources of passive tags are less, which also makes some security protocols with higher security levels unable to be applied to passive tags.
[0004] Although the existing lightweight security protocols have low requirements on hardware resources, these protocols still have defects in the face of security problems such as masquerading attacks, location attacks, replay attacks, asynchronous attacks, and DNS attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash function-based MH lightweight security authentication system and method
  • Hash function-based MH lightweight security authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described in detail below in conjunction with the accompanying drawings, so that those skilled in the art can implement it with reference to the description.

[0027] like figure 1 As shown, the MH lightweight security authentication system based on the Hash function provided by the present invention includes an electronic tag 1 , a reader 2 and a background database 3 .

[0028] The background database terminal is used to compare the random number i and Hm(ID, i) received by the reader with the information stored in the background database. Execute the IF(Hm(ID,i)==Hm(ID',i)) operation, if they are equal, send the confirmation command Ack and Hm(ID',i) to the tag.

[0029] The tag reader side is a bridge for information interaction between the tag and the background database. It is mainly used to send ask request information, random number i and Hm(ID,i) to the tag, and send the collected information to the background database for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Hash function-based lightweight security authentication system. The system comprises an electronic tag, a background database and a tag reader, wherein the electronic tag internally stores an ID, can generate a random number i and performs encryption through an M-Hash function, and encrypted information is Hm(ID,i); the background server internally stores an ID' corresponding to the ID and can perform encryption through the M-Hash function to obtain encrypted information Hm(ID',i); and the tag reader is connected with the electronic tag and the background database to realize data transmission between the electronic tag and the background database. The invention furthermore provides a Hash function-based lightweight security authentication method. The method and the system have the characteristics that the information is encrypted, the protocol logic bit operation is reduced, low hardware resource demand is met, the impact resistance is good, the security is higher, the power consumption is low, the running efficiency is high, and the like.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things security, and in particular relates to an MH lightweight security authentication system and method based on a Hash class function. Background technique [0002] With the rise of the "Internet +" industry, the information industry has developed rapidly. In the field of Internet of Things information, RFID radio frequency identification systems have also been widely used, including some key areas, such as financial systems, technological military systems, and engineering building systems, so how to ensure the communication security of RFID systems is very important . [0003] The RFID system consists of three parts: tags, readers, and background databases. Among them, tags belong to external circulation equipment and are also the most frequent part of security vulnerabilities. Tags are further divided into passive tags and active tags, because passive tags have the characteristics of st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/10
CPCG06K7/10118G06K7/10198
Inventor 张兴周军史伟韩冬颜飞
Owner LIAONING UNIVERSITY OF TECHNOLOGY