A Lightweight RFID Fast Authentication Method

An authentication method and lightweight technology, applied in the field of RFID, can solve the problems of limited resources and lack of practicability of passive RFID tags, and achieve the effect of ensuring lightweight

Active Publication Date: 2022-03-11
WUXI FANTAI TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These protocols solve the security problems in the authentication process to some extent, but considering the reality of the limited resources of passive RFID tags, most of them are not practical.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Lightweight RFID Fast Authentication Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be further described below in conjunction with drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention. In addition, it should be noted that, for ease of description, only part of the present invention is shown in the accompanying drawings but not all of the content. Unless otherwise defined, all technical and scientific terms used herein are related to the technical field of the present invention. The skilled person generally understands the same meaning. The terms used herein are for describing specific embodiments only, and are not intended to limit the present invention.

[0015] Please refer to figure 1 as shown, figure 1 It is a flow chart of a lightweight RFID rapid authentication method provided by the embodiment of the present invention. In the figure, Reader refers to a reader, and Tag refers to a tag. In ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight RFID fast authentication method, comprising the following steps: S101, the reader generates a random number R and sends a request message R to the tag; S102, after the tag receives the request message from the reader, calculates M=H (key) and and the left half of N N L and M sent to the reader; S103, the reader receives the message <M, N L > After that, judge whether M is equal to or not; S104, the tag receives N R After that, judge the self-calculated and N R Whether they are equal, if they are equal, the tag will authenticate the reader as valid and update the secret key; if they are not equal, the agreement will be terminated. The invention not only can ensure safe two-way authentication, but also can ensure the lightness of the protocol; only one Hash operation is performed on the label end, which meets the hardware resource limitation of the RFID label.

Description

technical field [0001] The invention relates to the technical field of RFID, in particular to a lightweight RFID fast authentication method. Background technique [0002] RFID is the key technology of the perception layer in the Internet of Things and an effective way to realize the Internet of Everything. Attaching the RFID electronic tag to the object and endowing the object with identity information can realize rapid object identification and authentication and obtain background data related to the object. However, the vulnerability of the air interface of wireless radio frequency technology causes it to suffer from various security threats. Attackers track tags by looking for the uniqueness of the data presented by the same tag during the authentication process. A replay attack is performed by tricking the reader by resending the legitimate message generated by the tag in the previous authentication. It is also possible for the attacker to combine the eavesdropped data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K7/10H04L9/32H04L9/40
Inventor 熊曾刚王康韩峰李智聪石峰周治平
Owner WUXI FANTAI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products