Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method for cloud-based low-cost radio frequency identification ntru

A radio frequency identification and authentication method technology, which is applied in the field of cloud-based low-cost radio frequency identification NTRU authentication, can solve the problems of high label calculation complexity, insecurity, and impact on applications, so as to improve deployment and management costs and simplify the authentication process , the effect of improving safety

Active Publication Date: 2019-07-16
XIDIAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme does not fully provide two-way authentication between the tag and the reader, as well as the tag and the cloud background database; and the key update process of this scheme cannot resist the leakage of the old key, and its key update uses a simple XOR operation, which does not meet the previous requirements. to safety
[0006] In summary, there are still some defects in the existing cloud-based RFID authentication protocols: many authentication protocols will introduce other trusted third parties or VPN agents and other fourth parts, so the maintenance and deployment of the fourth part will require cost , and it is easy to become the bottleneck of system security requirements, which makes the scheme complex, and the calculation complexity of the label is very high, which affects its actual application
At the same time, many existing protocols based on symmetric key algorithms need to consider the issue of key update synchronization. The design complexity of the protocol is high, exceeding the resource tolerance of low-cost tags, and the protocol only supports tags and readers. Mutual authentication between readers cannot verify the security of the cloud database, which is very insecure, so mutual authentication between the reader and the cloud database is also very important

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method for cloud-based low-cost radio frequency identification ntru
  • Authentication method for cloud-based low-cost radio frequency identification ntru

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0038] Step 1, the reader sends request information to the tag.

[0039] (1a) The reader generates the random number n of the first reader 1 .

[0040] (1b) The reader assigns its identity id R and the first reader random number n 1 Sent to the tag as request information.

[0041] Step 2, the tag responds to the request information, and then sends the response information to the reader.

[0042] (2a) The tag is received by the reader identity id R Find the reader id inside the tag R Corresponding public key PK R Whether it exists, if so, then execute step (2b), otherwise the communication ends.

[0043] (2b) Tag generates tag random number n 2 .

[0044] (2c) The tag passes the reader's identity id R Corresponding public key PK R , for the first reader random number n 1 , label random number n 2 and tag identity id T Encrypt to get the response...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method of low cost radio frequency identification NTRU based on cloud. In an existing radio frequency identification authentication method, system safety is poor and authentication cost is high. By using the method of the invention, the above technical problems are solved. The method comprises the following steps that (1) a reader sends request information to a tag; (2) the tag responds to the request information, generates response information through a reader public key and sends to the reader; (3) the reader decrypts the response information, generates encryption information through a session key KS and sends to a cloud database; (4) the cloud database authenticates a tag identity, and session data is acquired and is sent to the reader; and (5) the reader decrypts the session data so as to complete tag authentication. In the invention, mutual authentication among the tag, the reader and the cloud database is realized; RFID system authentication safety is increased; and simultaneously, system authentication cost is effectively reduced and the method can be suitable for RFID system authentication of small and medium-sized enterprises.

Description

technical field [0001] The invention belongs to the field of communication technology, and relates to a cloud-based low-cost radio frequency identification public key authentication method, in particular to a cloud-based low-cost radio frequency identification NTRU authentication method, through the cloud database, reader and tag in the radio frequency identification system Inter-authentication to improve the security of cloud-based RFID systems, can be used for RFID system certification of small and medium-sized enterprises. Background technique [0002] Radio Frequency Identification (RFID) is a key technology for non-contact object identification in the Internet of Things, and is the basis of object perception. RFID is widely used in data collection and processing in production, logistics, transportation, medical care, tracking and other fields. In the era of big data, cloud-based access and management of RFID application big data has become an important development tren...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3236H04L63/0442H04L2209/805
Inventor 董庆宽陶雅欣樊凯薄星吴克强李军辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products