Radio frequency identification data security authentication method and system, storage medium and terminal

A technology for data security and radio frequency identification, applied in security devices, transmission systems, electromagnetic radiation induction, etc., can solve desynchronization attacks and denial of service attacks without resistance, low-cost tags with limited computing power and storage capacity, bit operation encryption The method is easy to be cracked and other problems, so as to achieve the effect of anonymity and two-way authentication, resistance to desynchronization attacks and denial of service attacks, and reduction of storage space costs

Active Publication Date: 2020-09-01
XIDIAN UNIV
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because RFID technology uses radio frequency signals for communication, the data transmitted between the reader and the tag will be exposed in the public channel, and it is easy for attackers to obtain the session content during the authentication process through illegal channels. Apps are facing various security and privacy threats without exception
[0003] Since the reader and the tag communicate directly in the wireless environment, the data is completely exposed to external influences. Attackers may intercept, replay, and tamper with the communication content through illegal channels, and even track the tag, thereby destroying the RFID system. The existing ultra-lightweight In order to reduce the overhead, the high-level RFID authentication method uses various simple bit operations to encrypt the communication message, but it has been proved by experiments that it cannot resist all common attack methods, and the security is not high enough, so it is not suitable for medical privacy protection. An ultra-lightweight protocol that can achieve both low cost and high security is essential for medical privacy protection systems
[0004] Through the above analysis, the problems and defects of the existing technology are: the bit operation encryption method used in the existing ultra-lightweight RFID authentication protocol is easy to be cracked, especially for desynchronization attacks and denial of service attacks. security is not high enough
[0005] The difficulty of solving the above problems and defects is: (1) The computing power and storage capacity of low-cost tags are limited, so it is necessary to design an ultra-lightweight RFID authentication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio frequency identification data security authentication method and system, storage medium and terminal
  • Radio frequency identification data security authentication method and system, storage medium and terminal
  • Radio frequency identification data security authentication method and system, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0073] In view of the problems in the prior art, the present invention provides a radio frequency identification data security authentication method, system, storage medium, and terminal. The present invention will be described in detail below with reference to the accompanying drawings.

[0074] Such as figure 1 As shown, the radio frequency identification data security authentication method provided by the present invention includes the following steps:

[0075] S101: The reader generates two random numbers and sends an authentication request to the tag;

[0076] S102: After receiving the request, the tag sends the tag ps...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of wireless communication network security, and discloses a radio frequency identification data security authentication method and system, a storage medium, a terminal and a reader. The method comprises the steps: enabling the reader to generate two random numbers and sending an authentication request to a tag; after a label receives the request, sending a label pseudonym IDS of the round to the reader; after the reader receives the information, sending the information to a server; enabling the reader to calculate messages A and B and sending the messages A and B to the label; enabling the label to verify the reader according to the received message; enabling the reader to verify the label according to the received message; enabling the label toauthenticate the reader again and then updating the stored label information and key information. According to the method, the bit cross exclusive-or rearrangement operation Cro and the cyclic shiftoperation Rot are used for carrying out combined encryption on the communication message, the background server stores label information and key information used in the current round and the last round, desynchronization attacks and denial of service attacks are effectively resisted, and the storage space cost of the label is reduced.

Description

Technical field [0001] The invention belongs to the technical field of wireless communication network security, and in particular relates to a radio frequency identification (RFID) data security authentication method (CRMAP), a system, a storage medium, and a terminal. Background technique [0002] Currently, Radio Frequency Identification is a key technology for data exchange between electronic tags and terminal readers through wireless communication in the Internet of Things. As a wireless version of barcode, RFID technology has the advantages of waterproof, antimagnetic, high temperature resistance, long service life, large reading distance, large storage data capacity, and changeable storage information that barcodes do not have. There are related products in areas closely related to our lives, such as logistics, transportation, medical care, second-generation ID cards, and access control systems. In the past, due to the lack of mature visualization solutions for real-time t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/02H04W12/00H04W12/12H04L29/06H04W4/80G06K7/10G06K17/00G06K19/077G16H40/20
CPCH04W12/06H04W12/02H04L63/0869H04L63/0414H04W4/80G06K7/10297G06K17/0029G06K19/07749G16H40/20
Inventor 樊凯王幸苗康俊斌李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products