A radio frequency identification data security authentication method, system, storage medium, and terminal

A technology for data security and authentication methods, applied in the fields of radio frequency identification data security authentication methods, systems, storage media, and terminals, it can solve desynchronization attacks and denial-of-service attacks without resistance, low-cost tag computing capabilities and limited storage capabilities, Bit operation encryption method is easy to be cracked, etc., to achieve the effect of realizing anonymous and two-way authentication, resisting desynchronization attacks and denial of service attacks, and reducing storage space costs

Active Publication Date: 2022-04-01
XIDIAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because RFID technology uses radio frequency signals for communication, the data transmitted between the reader and the tag will be exposed in the public channel, and it is easy for attackers to obtain the session content during the authentication process through illegal channels. Apps are facing various security and privacy threats without exception
[0003] Since the reader and the tag communicate directly in the wireless environment, the data is completely exposed to external influences. Attackers may intercept, replay, and tamper with the communication content through illegal channels, and even track the tag, thereby destroying the RFID system. The existing ultra-lightweight In order to reduce the overhead, the high-level RFID authentication method uses various simple bit operations to encrypt the communication message, but it has been proved by experiments that it cannot resist all common attack methods, and the security is not high enough, so it is not suitable for medical privacy protection. An ultra-lightweight protocol that can achieve both low cost and high security is essential for medical privacy protection systems
[0004] Through the above analysis, the problems and defects of the existing technology are: the bit operation encryption method used in the existing ultra-lightweight RFID authentication protocol is easy to be cracked, especially for desynchronization attacks and denial of service attacks. security is not high enough
[0005] The difficulty of solving the above problems and defects is: (1) The computing power and storage capacity of low-cost tags are limited, so it is necessary to design an ultra-lightweight RFID authentication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A radio frequency identification data security authentication method, system, storage medium, and terminal
  • A radio frequency identification data security authentication method, system, storage medium, and terminal
  • A radio frequency identification data security authentication method, system, storage medium, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0073] Aiming at the problems existing in the prior art, the present invention provides a radio frequency identification data security authentication method, system, storage medium, and terminal. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0074] like figure 1 As shown, the radio frequency identification data safety authentication method provided by the present invention comprises the following steps:

[0075] S101: The reader generates two random numbers, and sends an authentication request to the tag;

[0076] S102: After receiving the request, the tag sends t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of wireless communication network security, and discloses a radio frequency identification data security authentication method, system, storage medium, and terminal. A reader generates two random numbers and sends an authentication request to a label; The reader sends the tag pseudonym IDS of this round; the reader sends it to the server after receiving it; the reader calculates messages A and B and sends them to the tag; the tag verifies the reader according to the received message; The tag is authenticated; the tag re-authenticates the reader and subsequently updates the stored tag information and key information. The present invention uses the bit cross XOR rearrangement operation Cro and the cyclic shift operation Rot to carry out combined encryption on the communication message, and the background server stores the label information and key information used in the current round and the previous round, effectively resisting desynchronization attacks and Denial of service attacks, reducing the cost of tag storage space.

Description

technical field [0001] The invention belongs to the technical field of wireless communication network security, and in particular relates to a radio frequency identification (RFID) data security authentication method (CRMAP), a system, a storage medium and a terminal. Background technique [0002] At present, radio frequency identification (Radio Frequency Identification) is a key technology in the Internet of Things to realize data exchange between electronic tags and terminal readers through wireless communication. As a wireless version of barcode, RFID technology has the advantages of waterproof, antimagnetic, high temperature resistance, long service life, large reading distance, large storage data capacity, and changeable storage information that barcodes do not have. There are related products in fields closely related to our lives, such as logistics, transportation, medical care, second-generation ID cards, and access control systems. In the past, due to the lack of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/069H04W12/02H04W12/47H04W12/122H04W12/0433H04L9/40H04W4/80G06K7/10G06K17/00G06K19/077G16H40/20
CPCH04W12/06H04W12/02H04L63/0869H04L63/0414H04W4/80G06K7/10297G06K17/0029G06K19/07749G16H40/20
Inventor 樊凯王幸苗康俊斌李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products