Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

RFID group label authentication protocol based on Hash function

A technology of hash function and authentication protocol, applied in the field of group label authentication, which can solve the problems of lack of forward security, inability to resist desynchronization attacks, privacy leakage, etc.

Active Publication Date: 2019-08-30
XIDIAN UNIV
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, RFID security protocols mainly focus on the authentication of a single tag. Researchers have also proposed some group tag authentication protocols, but they all have defects such as privacy leakage, inability to resist desynchronization attacks, and lack of forward security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID group label authentication protocol based on Hash function
  • RFID group label authentication protocol based on Hash function
  • RFID group label authentication protocol based on Hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0053] This embodiment provides a hash function-based RFID group tag authentication protocol, including the following steps: step 1, the reader sends an inquiry request message to the tags within its reading range; step 2, the reader sends the response messages of all tags sent to the background database; Step 3 The background database determines the group identifier and invalid identifier of the tag according to the tag response message sent by the reader, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an RFID group label authentication protocol based on a Hash function. The RFID group label authentication protocol comprises the following steps: step 1, a reader sends an inquiry request message to a label in a reading range of the reader; step 2, the reader sends the response messages of all the tags to a background database; step 3, the background database determines a group identifier and an invalid identifier of the label according to the label response message sent by the reader, and selects one group identifier; 4, the background database authenticates all the labels in the selected group; 5, the group label authenticates the background database; and step 6, the group identifier is updated by the group label and the background database. A one-way hash function is adopted to encrypt a message needing to be transmitted, and a random number is used to randomize the transmitted message, so that anonymity and non-traceability of the label are realized; and meanwhile, the new and old group identifiers are stored in the background database, so that the method can well resist the desynchronization attack. A timeout retransmission mechanism is adopted to ensure that the response messages of all the tags in the group are received, and the integrity of the tags in the group is ensured.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to the authentication problem of group tags in an RFID system. Background technique [0002] Radio Frequency Identification (RFID) is a non-contact automatic identification technology, which automatically identifies the target object through radio frequency wireless signals and obtains relevant data. A general RFID system consists of electronic tags, readers and background databases. The electronic tag is composed of a chip and an antenna, which is attached to the object to identify the target object. Each tag has a unique electronic code and stores the relevant information of the identified object. The reader is a device that uses radio frequency technology to read and write electronic tag information. The background database stores the identity information and relevant data related to the tags and readers, and processes and processes the messages sent by the readers. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3236H04L9/3271H04L9/3273H04L2209/805
Inventor 方建平李雪琴赵鹏
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products