A puf-based lightweight RFID tag ownership transfer communication authentication method

An RFID tag and authentication method technology, applied in the field of lightweight RFID tag ownership transfer communication authentication, can solve the problems of unpredictable response, security and privacy threats, randomness, etc., to reduce hardware overhead, reduce computational overhead, and ensure privacy. sexual effect

Active Publication Date: 2022-06-07
YANGZHOU UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

PUF is verified through a challenge-response mechanism. The principle is based on the unique differences generated during the PUF fabrication process, which will generate countless and unique challenge-response pairs. The mapping between challenge and response depends on factors such as temperature and voltage supply. , aging and electromagnetic interference and other noises, so the output of PUF is random and uncertain, and the response to the same challenge is also unpredictable
[0006] Many scholars have proposed a series of RFID tag ownership transfer protocols, such as: Li et al. in the literature (Li N, Mu Y, Susilo W, et al. Shared RFID ownership transfer protocols [J]. Computer Standards & Interfaces, 2015, 42: 95-104 .) proposed a shared RFID ownership transfer protocol based on the Hash hash function, which does not rely on any trusted third party, literature (Taqieddin E, Al-DahoudH, Niu H, et al.Tag ownership transfer in Radio Frequency Identificationsystems: a survey of existing protocols and open challenges[J].IEEE Access,2018,6:32117-32155.) pointed out that this scheme is not suitable for low-cost passive RFID tags; Osaka et al. in the literature (Osaka K, Takagi T, Yamazaki K, et al. An efficient and secure RFID security method with ownership transfer[M] / / RFID security. Springer, Boston, MA, 2008:147-176.) Proposed tag ownership transfer protocol, the The protocol is based on the Hash hash function and symmetric cryptosystem. The literature (Dimitriou T.Key evolving RFID systems: Forward / backward privacy and ownership transfer of RFID tags[J].Ad Hoc Networks,2016,37:195-208.) points out that this The scheme cannot resist desynchronization attacks, replay attacks, etc.; and there are various security and privacy threats in other proposed schemes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A puf-based lightweight RFID tag ownership transfer communication authentication method
  • A puf-based lightweight RFID tag ownership transfer communication authentication method
  • A puf-based lightweight RFID tag ownership transfer communication authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order to describe the solution and advantages of the method of the present invention more clearly, the method of the present invention will be further described in detail below in conjunction with the above-mentioned drawings.

[0071] like figure 1 It is a communication relationship diagram between the tag, the original owner of the tag, and the new owner of the tag in the PUF-based lightweight RFID tag ownership transfer communication authentication method of the present invention;

[0072] figure 1 It shows that an RFID system mainly includes three components: RFID tag (Tag), RFID reader (Reader) and back-end database (Database);

[0073] figure 1 The main communication authentication relationship of the PUF-based lightweight RFID tag ownership transfer communication authentication method of the present invention is shown in the present invention, that is, the two-way authentication between the original tag owner and the tag, the original tag owner and the new t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a PUF-based lightweight RFID tag ownership transfer communication authentication method, which belongs to the technical field of RFID. The method of the present invention first carries out two-way authentication communication between the original owner of the label and the label, then transmits the key information related to the label between the original owner of the label and the new owner of the label, and finally performs the communication between the new owner of the label and the label. Two-way authenticated communication. During the tag ownership transfer process, the original tag owner and the new tag owner communicate directly to transmit tag-related key information, so in this method, the tag ownership transfer operation can be completed directly without relying on a trusted third party. The method of the invention realizes the lightweight ownership transfer authentication of the low-cost RFID tag, and ensures the communication security in the tag transfer authentication process.

Description

technical field [0001] The invention discloses a PUF-based lightweight RFID tag ownership transfer communication authentication method, which belongs to the technical field of RFID. Background technique [0002] Radio Frequency Identification (RFID) is a technology that uses radio frequency technology to automatically identify targets such as objects and people in an open environment. The RFID system generally includes three parts: the back-end database, the reader and the tag. The communication channel between the back-end database and the reader is generally considered safe; while the communication between the reader and the tag is through an unsafe wireless channel, so in The interactive information transmitted between the two ends is very vulnerable to various malicious attacks such as cloning attacks, forgery attacks, eavesdropping attacks, and desynchronization attacks. [0003] Low-cost passive RFID tags attached to the surface of items are often used in the supply c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/40H04L9/08H04L9/00H04B5/00
CPCH04L9/3278H04L63/0869H04L9/0869H04L9/002H04L63/1441H04L63/123H04B5/0062
Inventor 殷新春黄可可刘亚丽
Owner YANGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products