A lightweight RFID rapid authentication method

An authentication method and a lightweight technology, applied in the RFID field, can solve the problems of limited resources and impracticality of passive RFID tags, and achieve the effect of ensuring lightness

Active Publication Date: 2019-05-03
WUXI FANTAI TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These protocols solve the security problems in the authentication process to some extent, but considering the reality of the limited resources of passive RFID tags, most of them are not practical.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A lightweight RFID rapid authentication method
  • A lightweight RFID rapid authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be further described below in conjunction with drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention. In addition, it should be noted that, for the convenience of description, only some parts related to the present invention are shown in the accompanying drawings but not the whole content. Unless otherwise defined, all technical and scientific terms used herein are related to the technical field of the present invention. The skilled person generally understands the same meaning. The terms used herein are for describing specific embodiments only, and are not intended to limit the present invention.

[0015] Please refer to figure 1 as shown, figure 1 It is a flow chart of a lightweight RFID rapid authentication method provided by the embodiment of the present invention. In the figure, Reader refers to a reader, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight RFID rapid authentication method. The method comprises the following steps: S101, a reader generating a random number R and sending a request message R to a tag;S102, after the tag receives the request message of the reader, calculating M=H(key) and (img file), and sending the left half part NL and the left half part M of N to the reader; S103, after the reader receives the message <M,NL>, judging whether M is equal to M (shown in the description) or not; S104, the label receives the NR; judging whether the calculated NR is equal to the NR (Noise Ratio) or not according to the formula shown in the specification, and judging whether the calculated NR is equal to the NR or not according to the formula shown in the specification; and if the number of thetag authentication readers is equal to the number of the updated secret keys, the tag authentication readers are legal, and if the number of the updated secret keys is not equal to the number of theupdated secret keys, the protocol is terminated. According to the invention, secure bidirectional authentication can be ensured, and the lightness of the protocol can be ensured; and only one Hash operation is carried out at the tag end, so that the limitation of the RFID tag hardware resources is met.

Description

technical field [0001] The invention relates to the technical field of RFID, in particular to a lightweight RFID fast authentication method. Background technique [0002] RFID is the key technology of the perception layer in the Internet of Things and an effective way to realize the Internet of Everything. Attaching the RFID electronic tag to the object and endowing the object with identity information can realize rapid object identification and authentication and obtain background data related to the object. However, the vulnerability of the air interface of wireless radio frequency technology causes it to suffer from various security threats. Attackers track tags by looking for the uniqueness of the data presented by the same tag during the authentication process. A replay attack is performed by tricking the reader by resending the legitimate message generated by the tag in the previous authentication. It is also possible for the attacker to combine the eavesdropped data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/10H04L9/32H04L29/06
Inventor 熊曾刚王康韩峰李智聪石峰周治平
Owner WUXI FANTAI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products