An RFID Group Tag Authentication Protocol Based on Hash Function

A hash function and group identification technology, applied in the field of communication, can solve the problems of being unable to resist desynchronization attacks, privacy leakage, lack of forward security, etc.

Active Publication Date: 2021-10-26
XIDIAN UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, RFID security protocols mainly focus on the authentication of a single tag. Researchers have also proposed some group tag authentication protocols, but they all have defects such as privacy leakage, inability to resist desynchronization attacks, and lack of forward security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An RFID Group Tag Authentication Protocol Based on Hash Function
  • An RFID Group Tag Authentication Protocol Based on Hash Function
  • An RFID Group Tag Authentication Protocol Based on Hash Function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0054] This embodiment provides a hash function-based RFID group tag authentication protocol, including the following steps: step 1, the reader sends an inquiry request message to the tags within its reading range; step 2, the reader sends the response messages of all tags sent to the background database; Step 3 The background database determines the group identifier and invalid identifier of the tag according to the tag response message sent by the reader, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hash function-based RFID group tag authentication protocol, which includes the following steps: step 1, the reader sends an inquiry request message to the tags within its reading range; step 2, the reader sends the response of all tags The message is sent to the background database; step 3, the background database determines the group identifier and invalid identifier of the tag according to the tag response message sent by the reader, and selects one of the group identifiers; step 4, the background database checks the selected group All tags in the group are authenticated; step 5, the group tag authenticates the background database; step 6, the group tag and the background database update the group identifier. The invention adopts a one-way hash function to encrypt the message to be transmitted, and uses a random number to randomize the transmitted message, so as to realize the anonymity and untraceability of the label; meanwhile, by storing the old and new group identifiers in the background database This makes the present invention well resistant to desynchronization attacks. The present invention adopts a timeout retransmission mechanism to ensure that the response messages of all labels of the group are received, thereby ensuring the integrity of the group labels.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to the authentication problem of group tags in an RFID system. Background technique [0002] Radio Frequency Identification (RFID) is a non-contact automatic identification technology, which automatically identifies the target object through radio frequency wireless signals and obtains relevant data. A general RFID system consists of electronic tags, readers and background databases. The electronic tag is composed of a chip and an antenna, which is attached to the object to identify the target object. Each tag has a unique electronic code and stores the relevant information of the identified object. The reader is a device that uses radio frequency technology to read and write electronic tag information. The background database stores the identity information and relevant data related to the tags and readers, and processes and processes the messages sent by the readers. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3236H04L9/3271H04L9/3273H04L2209/805
Inventor 方建平李雪琴赵鹏
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products