Lightweight RFID authentication method based on integer chaos

An authentication method and lightweight technology, applied in the field of RFID authentication, which can solve the problems of label storage burden, inability to resist denial-of-service attacks, and authentication termination, and achieve the effects of avoiding location tracking, preventing eavesdropping, and preventing replay attacks.

Active Publication Date: 2017-03-08
BEIJING INSTITUTE OF PETROCHEMICAL TECHNOLOGY
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the PRESENT algorithm is designed based on the S-box, which causes a certain burden on the storage of tags
In addition, a timing mechanism is designed in the protocol. If the response time is greater than the set time, the authentication will be stopped. This is not a good defense against denial of service attacks. Once the information is intercepted or delayed in transmission, the authentication will be terminated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight RFID authentication method based on integer chaos
  • Lightweight RFID authentication method based on integer chaos
  • Lightweight RFID authentication method based on integer chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] The flow chart of a lightweight RFID authentication method based on integer chaos provided by the embodiment of the present invention is as follows figure 1 As shown, it mainly includes the following steps:

[0040] Step 1. The reader generates two pseudo-random numbers R 1and R 2 , and the authentication request Query and the pseudo-random number R 1 Send to label.

[0041] In the embodiment of the present invention, the pseudo-random n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight RFID authentication method based on integer chaos. According to the invention, by use of pseudo random numbers, freshness of labels and communication contents of readers are ensured; and by use of the Hash function, confidentiality of the communication contents is ensured. Thus, common attack means such as counterfeiting attacking, replay attacking and eavesdropping can be resisted.

Description

technical field [0001] The invention relates to the technical field of RFID authentication, in particular to a lightweight RFID authentication method based on integer chaos. Background technique [0002] Radio Frequency Identification (RFID) technology is a non-contact automatic identification technology, its essence is the wireless communication between the reader and the electronic tag attached to the object to be identified. RFID technology can be widely used in various fields such as transportation, retail, logistics, etc., and is one of the important supporting technologies of the Internet of Things. However, the security problem of RFID system greatly restricts the application of RFID technology, and its main security problem is the authentication problem between the electronic tag and the reader. Therefore, it is necessary to study the authentication protocol suitable for RFID system. [0003] The Hash-Lock protocol uses metaID instead of the real ID of the tag to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/06H04L9/08H04L9/32H04L29/06H04B5/00
CPCH04B5/0062H04L9/001H04L9/0643H04L9/0866H04L9/0869H04L9/3273H04L63/0869
Inventor 刘建东王淑鸿张啸赵晨商凯胡辉辉
Owner BEIJING INSTITUTE OF PETROCHEMICAL TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products