Elliptic curve radio frequency identification authentication method based on resource-constrained tag

An elliptic curve and radio frequency identification technology, applied in the information field, can solve the problems of high communication overhead, consumption of storage resources, poor security performance, etc., and achieve the effect of wide application range, low security and strong practicability

Active Publication Date: 2018-09-11
XIDIAN UNIV
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to address the deficiencies in the prior art above, and propose an elliptic curve radio frequency identification authentication method based on resource-constrained tags,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Elliptic curve radio frequency identification authentication method based on resource-constrained tag

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Attached below figure 1 , further describe the concrete steps of the present invention:

[0057] Step 1, calculate the protocol initial value.

[0058] The reader generates a random number r v , using the operation of multiplying the point on the elliptic curve by the base point, a pair of stored values ​​(r v ,U v ).

[0059] The reader uses the Photon hash function to combine the reader's private key with the stored value (r v ,U v ) in U v The dot product value is hashed to get a session key k v .

[0060] Step 2, write protocol initial value.

[0061] The identity information of the electronic tag and the public key of the electronic tag are pre-stored in the reader.

[0062] The reader will store the value (r v ,U v ), session key k v And the identity information of the reader is written into the electronic tag in advance.

[0063] The initial value of the reader writing protocol refers to that the reader pre-writes a pair of storage values ​​(r v ,U...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an elliptic curve radio frequency identification authentication method based on a resource-constrained tag in order to mainly solve problems of constrained storage resources oftags, power consumption restriction and constraint of the calculating capability of the conventional radio frequency identification RFID authentication. The realization steps of the method include: (1) initializing protocol parameters; (2) authenticating a reader by an electronic tag; (3) updating the protocol parameters; and (4) authenticating the electronic tag by the reader. According to the method, compared with the prior art, mutual authentication between the electronic tag and the reader is realized, the calculating amount and occupied resources of the electronic tag are effectively reduced, the communication safety is guaranteed, and the method can be better applicable to a radio frequency identification RFID authentication system of the resource-constrained tag.

Description

technical field [0001] The invention belongs to the field of information technology, and further relates to an elliptic curve radio frequency identification (RFID) authentication method based on resource-limited tags in the field of information security technology. According to the resource-limited electronic tag, the present invention pre-writes the initial value of the protocol and updates the initial value of the protocol by the reader, adopts light-weight Hash function Photon encryption based on the sponge structure, and performs the communication between the tag and the reader in the radio frequency identification RFID system mutual authentication. Background technique [0002] Radio frequency identification (RFID) is a key technology for object identification in the Internet of Things. Because radio frequency identification (RFID) technology has the advantages of non-contact, no need for visibility, convenience, rapid identification, and multiple tags can be identified...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K7/10H04L9/32H04L9/08H04L9/30
CPCG06K7/10257H04L9/0869H04L9/3066H04L9/3236H04L9/3273
Inventor 董庆宽王俊梅陈原李随鑫周翔宇董已平胡杰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products