RFID system safety authentication method with ECC combining with lightweight Hash function

A system security and authentication method technology, applied in the field of implantable RFID, can solve the problems of large communication overhead and memory requirements, low security level, etc., and achieve the effect of reducing communication overhead, high security level, and superior performance

Active Publication Date: 2015-09-09
SICHUAN UNIVERSITY OF SCIENCE AND ENGINEERING
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an RFID system security authentication method combining ECC with a lightweight Hash function, aiming to solve the problems of low security level, large communication overhead and memory requirements in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID system safety authentication method with ECC combining with lightweight Hash function
  • RFID system safety authentication method with ECC combining with lightweight Hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to further understand the content, features and effects of the present invention, the following examples are given, and detailed descriptions are given below with reference to the accompanying drawings.

[0030] Such as figure 1 As shown, the present invention is achieved in that a kind of RFID system security authentication method that ECC combines lightweight Hash function comprises:

[0031] S101. When communicating between the tag and the reader, use the elliptic curve discrete logarithm method to authenticate and verify the identity of the reader;

[0032] S102. Use the elliptic curve digital signature algorithm of the Quark lightweight hash algorithm to authenticate and verify the tag identity.

[0033] Further, the methods for reader identity authentication and verification are:

[0034] Step 1. The reader selects a random number r 1 ∈ Z n and calculate R 1 = r 1 ;

[0035] Step 2: The reader initializes the corresponding i 1 value and will R 1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an RFID system safety authentication method with an ECC combining with a lightweight Hash function. When communication is performed between a label and a reader, first, an elliptic curve discrete logarithm method is used to perform authentication and verification on the identity of the reader, and then, an elliptic curve digital signature algorithm of a Quark lightweight Hash algorithm is used to perform authentication and verification on the identity of the label. Compared with a traditional scheme, the RFID system safety authentication method with the ECC combining with the lightweight Hash function has a higher security level, 48% of communication overhead is reduced, in the aspect of overall memory consumption, 24% of memory consumption is reduced, and performance in aspects of communication overhead and memory requirements is excellent.

Description

technical field [0001] The invention belongs to the field of implantable RFID, in particular to an RFID system security authentication method combining ECC with a lightweight Hash function. Background technique [0002] Implantable radio frequency identification (radio frequency identification, RFID) system is a health care solution based on Internet Of Things (IoT) technology. RFID can be implanted in the human body to collect human body information, and can save people in emergency situations. patient's life. The communication channel between the tag and the reader is risky, and the RFID system is a resource-limited system, therefore, the implantable RFID system needs a robust, optimized and lightweight security framework to meet the security level requirements and energy constraint. [0003] In the prior art, a random key mechanism based on elliptic curve cryptography, although this mechanism can effectively resist hacking attacks related to RFID systems, it still canno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K7/00
Inventor 黎远松彭龑刘小芳梁金明
Owner SICHUAN UNIVERSITY OF SCIENCE AND ENGINEERING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products