CN108599958A - Extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud - Google Patents

Extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud Download PDF

Info

Publication number
CN108599958A
CN108599958A CN201810362401.XA CN201810362401A CN108599958A CN 108599958 A CN108599958 A CN 108599958A CN 201810362401 A CN201810362401 A CN 201810362401A CN 108599958 A CN108599958 A CN 108599958A
Authority
CN
China
Prior art keywords
label
reader
message
owner
new
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810362401.XA
Other languages
Chinese (zh)
Other versions
CN108599958B (en
Inventor
董庆宽
李随鑫
陈原
李庆春
霍玉荣
杨丰源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201810362401.XA priority Critical patent/CN108599958B/en
Publication of CN108599958A publication Critical patent/CN108599958A/en
Application granted granted Critical
Publication of CN108599958B publication Critical patent/CN108599958B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Electromagnetism (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention proposes a kind of extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud database, mainly solves the problems, such as that existing label ownership transfer safety is poor.Its implementation is:Reader sends certification request to label;Label is to requests verification and sends feedback information, and reader is handled and is sent to cloud database;Cloud database lookup corresponding informance returns to reader, and reader sends checking request and new label owner relevant information to label;Label Verification reader and fresh information;Reader and new label owner switch label information;New label owner sends certification request to label;The new label owner of label Verification simultaneously sends feedback information;New label owner verifies label and sends fresh information;The new label owner of label Verification and storage and feedback-related information.The present invention improves safety and the efficiency of extra lightweight label ownership transfer, the radio frequency identification system that can be used for requiring with low cost.

Description

Extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud
Technical field
The invention belongs to field of communication technology, more particularly to a kind of wireless radio frequency identification mark ownership transfer method can Radio frequency identification system for being required with low cost.
Background technology
Radio RF recognition technology is also known as radio frequency identification technology, is a kind of non-contact automatic identification technology, Automatic charging and the books in libraries classification and management etc. for being mainly used in logistics management, access control system, road and bridge are each A aspect.Traditional radio frequency identification system includes mainly electronic tag, reader, background server three parts.
It is connected using wire channel between the background server and reader of conventional wireless radio frequency identification authentication scheme, Although security of system is improved using this connection type, but the displacement volume of background data base is smaller and operation place is controlled It is dumb.With the development of Internet of Things, article is increasingly managed by radio RF recognition technology, identifies and certification, this Radio frequency identification system is required to need to support the application of big data and there are flexible reading conditions, so introducing cloud data The traditional background server of library substitution, this can be solved the problems, such as by carrying out framework radio frequency identification system.Simultaneously because less radio-frequency Identify that the remote ultra-traditional bar code of label cost, cost become the bottleneck of radio RF recognition technology popularization, and since it has The characteristics of inexpensive low cost, so extra lightweight wireless radio frequency identification mark started to become hot spot in recent years.And label at The logic gates of this and inside has a direct relationship, low cost also mean that superencipherment mode be it is unusable, Influence safety.
In the existing ownership transfer agreement based on extra lightweight radio frequency identification, when most of certification, label is The random number sent using reader is fed back, this just represents does not have initiative in authentication phase label, and opponent is attacking Also it is easy to the legal owner's progress information stealth that disguises oneself as when hitting, so as to cause the leakage of information, while rank is stored in information Section is required of all secret informations of reader stored tag, this will seriously affect the storage space of reader so as to cause drop " the EPC that poor efficiency, such as Niu. et al. were delivered in 2016 in IEEE Transaction on Mobie Computing It has been delivered in Gen2V2RFID Authentication and Ownership Management Protocol " a kind of ultralight The ownership management agreement of magnitude wireless radio frequency identification mark, the program first proposed a kind of certification association after being initialized View, protocol requirement label owner store all secret informations of label, and then reader sends authentication information to label, The secret information of storage is hidden using the method for big random number exclusive or in this certification message, then sends information integration To label, it is compared again with the information received after carrying out same treatment to itself storage information by label, it is backward by certification Reader returns to a confirmation message, and reader verifies label according to the information that confirmation message is extracted.Pass through certification Afterwards, reader sends ownership to label, then reader respectively to label send two containing secret information with it is identical random Several message, label receive and solve random number according to an information therein after message, carry out operation to random number and with second Message is compared, and confirms that errorless backward reader returns to the confirmation message for including secret key and random number, agreement terminates.This association What view used is after sending information while to send an authentication information, ensures that no secret information can be directly acquired, Communication uses new random number every time simultaneously, ensures freshness and safety using one-time pad.This radio frequency identification In label ownership management scheme, label does not have any initiative, and the random number of reader transmission is completely dependent in the response stage It is responded, not only easily leads to label and be easily subject to spoof attack, but also since scheme needs reader to store all labels Secret information and often wheel information cause working efficiency to reduce all by the way of two certification message.
Invention content
It is an object of the invention to overcome the problems of the above-mentioned prior art, propose a kind of extra lightweight based on cloud without Line RFID tag ownership transfer method improves the working efficiency of label ownership transfer to improve the initiative of label And safety.
The technical scheme is that:Label information is stored in cloud database by reader, and authentication phase label will be certainly It generates a random number and is then sent to reader for encrypting itself false identity;Reader is by the Kazakhstan of the label false identity received Uncommon value is sent to cloud, the label information that cloud is stored as indexed search, if search is less than returning to error message, if search To corresponding information, then corresponding information is sent to reader, specific implementation step includes as follows
(1) data initialization:
The secret key K of reader R will be used after tag identity ID, label information info, the K cascades of label secret keyREncryption storage In cloud database, label T false identities TID is stored in as index in cloud database in the form of H (TID), by reader Communication secret key K between cloudRC, label false identity TID is stored in cloud database C, and wherein H () represents Hash operation;
By tag identity ID, label false identity TID, label secret key K, reader identity RID, random number generator seed k1 Storage is in the label;
Reader identity RID, new label owner identity RID', reader and new label owner are shared into secret key KRR'、 Communication secret key K between reader and cloudRCIt is stored in reader;
Reader identity RID, new label owner identity RID' and reader and new label owner are shared into secret key KRR' It is stored in new label owner;
(2) reader generates the first random number N of reader1With reader first message It is sent to label, design PRNG random number generators generate label the first random number PRNG (k after label determines its legitimacy1), Regenerate label first message T1With label second message T2Reader is returned to, wherein:
{ } indicates one group of letter Breath,Indicate that exclusive or is handled, | | indicate that message cascade, cro () indicate to carry out operation of confusion, per () expressions pair to information Information carries out in-place computation, and PRNG () indicates to carry out non-linear stochastic number generation processing to seed data;
(3) reader obtains label false identity TID by two strip label message, calculates its cryptographic Hash H (TID), generation is read Read the second random number N of device2Afterwards, reader second message is regeneratedIt is sent to cloud database, cloud Database generates cloud messageReader is returned to, whereinIt represents and uses Operation is encrypted in shared secret key pair information between reader and cloud;
(4) reader obtains K, ID, info of label by cloud message, starts ownership request stage, generates reader Third random number N3With a communication secret key S, union generates four message R of reader3R4R5R6It is sent to label, wherein: Reader third messageThe 4th message of readerIt reads The 5th message of deviceThe 6th message of reader
(5) R that label passes through reader3R4R5R6This four message obtain reader third random number N3, communication secret key S it is new With label owner identity RID', design PRNG random number generators generate label the second random number PRNG (k2) after, regeneration Label third messageWith label Verification messageIt sends To reader, ownership transfer request stage is completed;
(6) reader generates the 4th random number N of reader4, according to the 4th random number N4Generate the 7th message of readerIt is sent to new label owner, after new label owner confirms its legitimacy Message Authentication Code MAC is generated according to the 7th message of reader, regenerates reader verification informationIt feeds Reader, reader are left the theatre, whereinIt represents and is carried out using the proprietary shared secret key pair information of reader and new label Encryption;
(7) new label owner generates new the first random number of label owner n1Afterwards, new label owner first is regenerated MessageIt is sent to label, label confirms that the new proprietary legitimacy of label, design PRNG are random Number generator generates label third machine number PRNG (k3) after, regenerate label third message And the 4th message of labelIt is sent to new label owner;
(8) new label owner is according to T3And T4This two strip labels message authentication label legitimacy, generates new label owner Second random number n2, after new label key K' and new label false identity TID', regenerate three new label owner's message r2r3r4 It is sent to label, tag update stores information, and design PRNG random number generators generate the 4th random number PRNG (k of label4) after, Regenerate two strip label message T4T5New label owner is fed back to, ownership transfer is completed, wherein:New label owner second MessageNew label owner's third messageNew label owner the 4thThe 4th Messages Message of labelThe 5th message of label
The present invention compared with prior art, has the following advantages that:
First, the present invention generates label random number by designing PRNG random number generators, and extra lightweight label is made also to have There is the ability for generating random number.
Second, the present invention replaces traditional database using cloud database, keeps the carry out of certification more convenient, and subtract significantly The small consumption to reader storage space, improves reader utilization rate and working efficiency.
Third, the present invention are sent after information is encrypted in all sentences, and ensureing all information all has well Confidentiality, even if opponent intercept and capture can not get any useful information, ensure that the safety of information.
4th, the operation method used in of the invention is extra lightweight operation method, is greatly reduced label and reads The computational burden for reading device, substantially increases operation efficiency.
Description of the drawings
Fig. 1 is the implementation flow chart of extra lightweight label ownership transfer method of the present invention;
Fig. 2 is the cro operation of confusion sub-process figures in the present invention;
Fig. 3 is the per in-place computation sub-process figures in the present invention;
Fig. 4 is the sub-process figure of the design PRNG random number generators in the present invention.
Specific implementation mode
Below in conjunction with the accompanying drawings, present invention is further described in detail.
Referring to Fig.1, steps are as follows for realization of the invention:
Step 1, data initialization.
The purpose of data initialization is in order to which institute's information in need is stored in advance in designated equipment, and specific implementation step is such as Under:
Label secret key K, setting reader secret key K 1a) are setR, the communication secret key between reader and cloud database is set KRC
1b) by 1a) key of setting and label, reader are included stores for information about:
Itself and tag identity ID, label information info and label secret key K are cascaded, reader secret key K is usedRTo fortune It calculates after result is encrypted and is stored in cloud database;
Hash function processing is carried out to label false identity TID, result H (TID) is stored in cloud as index by treated In database C;
By the communication secret key K between reader and cloud databaseRCWith label false identity TID there are in cloud database, wherein H () represents Hash operation;
By tag identity ID, label false identity TID, label secret key K, reader identity RID and random number generator seed k1It is stored in label T;
By the communication secret key between reader identity RID, new label owner identity RID' and reader and cloud database KRCIt is stored in reader R;
Reader identity RID, new label owner identity RID' are stored in new label owner R'.
Step 2, reader sends certification request to label.
(2a) reader generates the first random number of reader of 32bits using random digit generation method ANSI X9.17:
(2a1) chooses current time date DTiAs the input of random digit generation method ANSI X9.17, random selected kind Sub- Vi, self-defined 56-bits encryption secret keys s;
The overall process of (2a2) cryptographic calculation is encrypted including triple des three times, first by Time of Day DTiWith seed ViIt carries out XOR operation result is carried out triple des cryptographic calculation with encryption secret key s and obtains output R by XOR operationi, by Time of Day DTi And RiTriple des cryptographic calculation is carried out with encryption secret key s again after carrying out XOR operation, obtains new Vi+1As ultimately generate Random number;
Identity information and the first random number of reader are carried out cro operation of confusion by (2b),
With reference to Fig. 2, the processing step of cro operation of confusion is as follows:
(2b1) inputs the Bit String of identity information and two 32-bits of the first random number of reader;
(2b2) takes the bit of the 1st, 3,5 etc. odd positions of identity information total 16 and the first random number of reader The bit of 2nd, 4,6 etc. even numbers positions is 16 total, with the bit combination of taking-up at 32 new Bit String, as Cro operation of confusion is put as a result, wherein selecting the bit come according to the position in former Bit String;
(2c) reader is by result and the first random number N of reader after operation of confusion1Cascade obtains reader first and disappears Cease R1, by R1It is sent to label, wherein{ } indicates a group information,Indicate different Or processing, | | indicate message cascade.
Step 3, label responds the request of reader.
(3a) label receives reader first message R1Afterwards, the first random number N of reader is directly read1, to itself storage Owner's identity carries out the identical operation of confusion with step (2b) and handles, and the operation of confusion result and R that will be obtained1Compared It is right:
If the two result is consistent, certification reader first message R1For legitimate messages, execute (3b);
If the two result is inconsistent, label thinks reader first message R1For illegal message, communication is terminated;
(3b) label uses initial seed k1Generate label the first random number PRNG (k1):
With reference to Fig. 4, PRNG random number generators generate random number, and steps are as follows:
(3b1) is by initial seed k1It is sequentially inputted in linear feedback shift register in a manner of from 1 to 32, uses one The primitive polynomial y=x that a number is 3232+x18+x17+ x+1 is to initial seed k1It is iterated processing, generates one every time newly Number and by new numerical order input linear feedback shift register, while deleting last position and obtaining ki+1
(3b2) 32-bit number in current linear feedback shift register is input in Boolean function filter carry out it is non- Linear process obtains one-bit digital;
Above (3b1) and (3b2) two step is carried out continuously 32 times by (3b3), obtains 32 outputs, and as PRNG random numbers are given birth to The final output grown up to be a useful person, the final output are the random number that label generates;
(3c) label generates two tag messages to reader:
(3c1) label is by the first random number PRNG (k of reader identity RID and oneself1) carry out XOR operation after, then with Reader identity RID carries out per in-place computations,
With reference to Fig. 3, per in-place computations comprise the concrete steps that:If two isometric input bit strings are x, y, by 1 place in x Then position ordinal number where 0 is arranged by sequence from big to small, is obtained by being arranged from small to large by position ordinal number One new position ordinal number calendar, then the bit in y is rearranged according to this new position ordinal number calendar, it is raw At label first message
(3c2) label is to the first random number N of reader1And the first random number PRNG (k of oneself1), false identity TID carries out XOR operation generates label second message
(3c3) label is by the first message T of oneself1With second message T2It is sent to reader.
Step 4, reader is obtained to cloud database transmission data and is asked.
(4a) reader is to the label first message T that receives1Inverse per in-place computations are carried out, the first random number of label is obtained PRNG(k1), reuse own identification RID and label the first random number PRNG (k1) and label first message T1Carry out XOR operation Obtain label false identity TID;
Identical method generates the second random number N of reader to the use of (4b) reader with step (2a)2, while to label False identity TID carries out Hash operation, obtains its cryptographic Hash H (TID):
(4b1) inserts 128 label false identity information, and 1 is filled at the 129th, fills 318 0 later, makes entire number Row length is 512, and ensures that entire ordered series of numbers result after the processing of mould 512 is 448;
(4b2) arbitrarily chooses 64 bits, it is indicated the length before message is filled in a manner of little-endian, It is stored in highest address by highest 64, most end is stored in lowest address, this 512 bit message is divided into 16 in order The string of 32 bits;
(4b3) initializes program internal module, and intermediate result and final Kazakhstan are stored with the buffering area of 128 bit longs It wishes as a result, being expressed as the register (A, B, C, D) of 4 32 bit longs with buffering area, each register is with little-endian Mode stores data, and initial value is taken as A=01234567, B=89ABCDEF, C=FEDCBA98, D=76543210;
(4b4) uses compression function HMD5Compression processing is carried out to 16 32 Bit Strings successively, obtained operation result is to breathe out Uncommon value H (TID);
(4c) reader is by its second random number N2Cascaded with the cryptographic Hash of label false identity, and using reader and Communication secret key K between cloud databaseRCRC4 encryptions are carried out to result after cascade:
(4c1) sets the length of key core S-box as 128, and communication key length is 128, uses key- Scheduling algorithms carry out the byte sequence in the S-box of initialization key core;
(4c2) is handled key core S-box and communication key using pseudorandom password generating algorithm, is obtained To sub-key sequence, sub-key sequence and plaintext are subjected to XOR operation, obtain encrypted result;
(4d) reader is by the second random number N of encrypted result and reader2It is cascaded to obtain reader second messageAnd it is sent to cloud database.
Step 5, cloud database feeds back requested information to reader.
(5a1) cloud database root is according to reader second message R2Directly read the second random number N of reader2, then to reading Operation is decrypted in device second message, obtains the second random number N of reader2, the N that will obtain at this time2With directly read second with Machine number N2It is compared:
If comparison result is inconsistent, description messages are tampered, and cloud database generates warning message warning, and terminates This communication;
If comparison result is consistent, step (5a2) is carried out;
(5a2) cloud database is scanned for using the index value of acquisition:
For not searching corresponding storage element, then cloud database side generates an error message and returns to reader And terminate to communicate, reader believes that the label communicated before is illegal label after receiving error message;
For searching corresponding storage element, then by the label false identity TID of storage, other storage informationWith the second random number N of reader2It is cascaded, is then used symmetrical between cloud database and reader Communication secret key is encrypted, and obtains cloud database messageAnd it is sent to reading Device.
Step 6, reader sends ownership transfer request to label.
(6a) reader is by the label false identity received in cloud database message M and the label false identity that receives from tab end It is compared:
If comparison result is inconsistent, reader assert that the data of cloud database side are invaded, distorted or damaged;
If comparison result is consistent, the identity ID of reader stored tag, these are secret by label key K, label information info Confidential information, and execute step (6b);
(6b) reader generates reader third random number N3With communication secret key S:
Reader use with step (2a) and step (4b) identical random digit generation method generate reader third with Machine number N3
Reader will carry out XOR operation by label key K and arbitrarily with random number isometric label key K, be communicated Secret key S;
(6c) reader generates four reader information and sendings to label:
Reader is by the first random number of label, reader third random number N3XOR operation is carried out with label key K, is generated Reader third message
Reader is by the third random number N of oneself3Exclusive or is carried out with tag identity, then by XOR operation result and label Identity carries out per in-place computations, obtains the 4th message of reader
Label key K and communication key S is carried out XOR operation by reader, and by the third of XOR operation result and oneself Random number N3Per in-place computations are carried out, the 5th message of reader is obtained
Oneself identity and new label owner identity are carried out XOR operation by reader, and by operation result and communication key S carries out per in-place computations, obtains the 6th message of reader
Reader is by the third message R of oneself3, the 4th message R4, the 5th message R5With the 6th message R6It is sent to label.
Step 7, fresh information is stored after smart-tag authentication reader and returns to confirmation message.
In (7a) smart-tag authentication reader stage, label is by the first random number of label, label key K and reader third message R3XOR operation is carried out, reader third random number N is obtained3, use reader third random number N3It is first carried out with own identification different Or operation, then XOR operation result and own identification are subjected to per in-place computations, then by in-place computation result and reader the Four message R4It is compared:
If comparison result is consistent, label assert that sender is legal, continues step (7b);
If comparison result is inconsistent, label assert that sender is illegal, terminates communication;
(7b) tag memory fresh information:
Label uses reader third random number N3To the 5th message R of reader5Inverse per in-place computations are carried out, displacement is transported It calculates result and carries out XOR operation with label key K, obtain communication key S and store;
Label is using communication key S to the 6th message R of reader6Carry out inverse per in-place computations, then by in-place computation result New label owner identity RID' is obtained with reader identity progress exclusive or and is stored;
(7c) label returns to confirmation message to reader:
The use of (7c1) label and identical random digit generation method in step (3b), use seed k2Generate label second Random number PRNG (k2);
(7c2) label sends two strip label message to reader:
Label is by the second random number PRNG (k of oneself2), communication secret key S and reader third random number N3Carry out exclusive or fortune It calculates, generates label third message
Label by the new label owner identity RID' received and communication secret key S respectively with the second random number of label PRNG (k2) XOR operation is carried out, two XOR operation results, which are then carried out per in-place computations, generates label Verification message
Label is by label third message T3With label Verification message T4It is sent to reader.
Step 8, reader confirms that label has successfully received fresh information.
Reader receives label third message T3Afterwards, by its with communicate secret key S, reader third random number N3Do exclusive or fortune Calculation obtains label the second random number PRNG (k2), then by new label owner identity RID' and communication secret key S respectively with label the Two random number PRNG (k2) XOR operation is carried out, finally again by result and label Verification message T4It is compared:
If comparing result is consistent, care label correctly obtained the proprietary identity of new label and with new label Proprietary communication secret key, reader then proceed by step 9;
If comparing result is inconsistent, care label does not receive correct information, then reader will re-start related letter The transmission and verification of breath.
Step 9, reader confirms that new label owner receives label information.
(9a) reader sends label information to new label owner:
Identical random digit generation method generates reading with step (2a), step (4b) and step (6b) for reader use The 4th random number N of device4
Reader is by the identity RID of oneself, label false identity TID, tag identity ID, label information info, communication key S With the 4th random number N of reader4After being cascaded, the communication secret key K between reader and new label owner is usedRR'With with Operation is encrypted to cascade result in identical encryption method in step (4c), generates the 7th message of readerAnd the 7th message is sent to new label owner;
(9b) new label owner directly reads the 4th random number N of reader4, then the 7th message of reader is solved It is close, and the reader identity obtained after decryption is compared with the reader identity of storage:
If comparison result is inconsistent, new label owner qualified information sender is illegal, terminates communication;
If comparison result is consistent, new label owner qualified information sender is legal, stores the label for including in information Information simultaneously carries out step (9c);
(9c) new label owner by the secret information use received with step (4b) identical Hash operation method into Row operation obtains Message Authentication Code MAC, by Message Authentication Code MAC and the 4th random number N of reader received4After being cascaded, Reuse the communication secret key K between reader and new label ownerRR' with with identical cipher mode in step (4c) to grade It is coupled fruit to be encrypted, obtains reader and verify messageAnd the verification message is sent to reading Device;
(9d) reader receives reader verification message r1Afterwards, the corresponding information for being included to MAC is verified:
If the MAC received is incorrect, the new label owner of reader identification is not properly received label information, reads Device will retransmit label information;
If the MAC received is correct, the new label owner of reader identification correctly received the corresponding information of label, Reader is left the theatre.
Step 10, ownership transfer.
New label owner use and generating random number side in step (2a), step (4b), step (6b) and step (8a) The identical method of method generates the new proprietary first random number n of label1, and by new the first random number of label owner n1With itself Identity carries out exclusive or processing, by XOR operation result and own identification carry out after cro operation of confusion again with new label owner the One random number n1Cascade, obtains new label owner first messageAnd by owner first Message is sent to label;
Step 11, new label owner verifies label.
(11a) label receives new label owner first message r1Afterwards, new the first random number of label owner is directly read n1, after new label owner identity and its of storage are carried out cro operation of confusion, with the new label owner first message received r1It is compared:
If comparison result is consistent, label believes that sender is legal, is carried out at the same time step (11b);
If comparison result is inconsistent, label thinks that message sender is illegal, and label terminates communication;
(11b) label sends two message to new label owner:
The use of (11b1) label and identical random digit generation method in step (3b), step (7c1) generate label third Random number PRNG (k3);
(11b2) label is by new label owner identity and label third random number PRNG (k3) carry out XOR operation after again Per in-place computations, which are carried out, with new label owner identity generates label third message
Own identification, label third random number are carried out XOR operation generation by (11b3) label with new label owner identity The 4th message of label
(11b4) label is by the third message T of oneself3With the 4th message T of oneself4It is sent to new label owner;
After (11c) new label owner receives the third and fourth message of label, per displacement fortune is carried out to label third message It calculates, obtains label the second random number PRNG (k2), label the second random number PRNG (k that new label owner will receive2), itself The 4th message T of identity RID' and label4XOR operation is done, obtains label false identity TID, and carry out with the label false identity of storage It compares:
If comparison result is inconsistent, new label owner assert that label is illegal, and new label owner reports an error to reader And the communication of termination and label;
If comparison result is consistent, new label owner assert that label is legal, stored tag the second random number PRNG (k2) Afterwards, step 12 is carried out;
Step 12, information update is carried out to label.
(12a) new label owner use and phase in step (2a), step (4b), step (6b), step (8a) and step 9 Same random digit generation method, generates new the second random number of label owner n2
(12b) new label owner generates the newer label information of labeling requirement:
(12b1) new label owner randomly selects a random number isometric with communication key, is carried out with communication key different Or operation, obtain new label key K';
(12b2) new label owner randomly selects a random number isometric with label false identity, with label false identity into Row XOR operation obtains new label false identity TID';
(12c) new label owner sends three new label owner's message to label:
New label owner is by label the second random number PRNG (k2), new label key K' and new label owner second with Machine number n2It carries out XOR operation and obtains new label owner second message
After new label key K' and communication key S are carried out exclusive or by new label owner, with new label owner second with Machine number n2It carries out per in-place computations and generates new label owner third message
After label false identity and new label false identity are carried out XOR operation by new label owner, with new traffic secret key K' into Row per in-place computations generate new the 4th message of label owner
The second message of oneself, third message and the 4th message are sent to label by new label owner;
(12d) tag update information simultaneously deletes reader information
(12d1) label receives new label owner second message and PRNG (k after information2) XOR operation is carried out, it obtains New label the second random number of owner n2, then use new the second random number of label owner n2Disappear to new label owner third Breath carries out inverse per in-place computations, then result is carried out XOR operation with secret key S is communicated, and obtains new traffic secret key K' and stores;
(12d2) label carries out anti-per in-place computations using new traffic secret key K' to new the 4th message of label owner, then In-place computation result and itself false identity are subjected to XOR operation, new label false identity TID' is obtained and stores;
(12d3) label deletes original label false identity TID and communication secret key K.
Step 13, label sends update to new label owner and completes confirmation message.
The use of (13a) label and identical random digit generation method in step (3b), step (7c1), with k3It is given birth to for seed At label third random number PRNG (k3);
(13b) label generates two strip label message and is sent to new label owner:
Label is by label third random number PRNG (k3), new label secret key K' and new the second random number of label owner n2Into Row XOR operation obtains the 5th message of label
Label by new label false identity TID' respectively with new label key K', label third random number PRNG (k3) carry out it is different Or operation, and the result of the two XOR operation is subjected to per in-place computations, obtain the 6th message of label
Label is by the 5th message T of oneself5With the 6th message T6It is sent to new label owner.
Step 14, new label owner confirms label information update status.
(14a) new label owner is by the 5th message T of label5, new label key K' and new label owner second it is random Number n2XOR operation is carried out, operation obtains label third random number PRNG (k3);
(14b) new label owner is by label third random number PRNG (k3) respectively with new label false identity TID' and newly Label key K' carries out XOR operation, then carries out per in-place computations to two XOR operation results, and by per in-place computations As a result it is compared with the 6th message of label:
If comparison result is inconsistent, new label owner assert that label is not properly received fresh information, new label institute Someone will send update request to label again;
If comparison result is consistent, new label owner assert that label correctly received fresh information and succeed more Newly, ownership transfer success, sign off.
Above description is only example of the present invention, does not constitute any limitation of the invention, it is clear that for It, all may be without departing substantially from the principle of the invention, knot after having understood present disclosure and principle for one of skill in the art In the case of structure, various modifications in form and details and change are carried out, but these amendments based on inventive concept and change Become still within the claims of the present invention.

Claims (9)

1. a kind of extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud database, includes the following steps:
(1) data initialization:
The secret key K of reader R will be used after tag identity ID, label information info, the K cascades of label secret keyREncryption is stored in cloud number According in library, label T false identities TID is stored in as index in cloud database in the form of H (TID), by reader and cloud it Between communication secret key KRC, label false identity TID is stored in cloud database C, and wherein H () represents Hash operation;
By tag identity ID, label false identity TID, label secret key K, reader identity RID, random number generator seed k1Storage In the label;
Reader identity RID, new label owner identity RID', reader and new label owner are shared into secret key KRR', read Communication secret key K between device and cloudRCIt is stored in reader;
Reader identity RID, new label owner identity RID' and reader and new label owner are shared into secret key KRR'Storage In new label owner;
(2) reader generates the first random number N of reader1With reader first messageHair Label is given, design PRNG random number generators generate label the first random number PRNG (k after label determines its legitimacy1), then Generate label first message T1With label second message T2Reader is returned to, wherein:
{ } indicates a group information, Indicate exclusive or processing, | | indicate message cascade, cro () indicate to information carry out operation of confusion, per () indicate to information into Line replacement operation, PRNG () indicate to carry out non-linear stochastic number generation processing to seed data;
(3) reader obtains label false identity TID by two strip label message, calculates its cryptographic Hash H (TID), generates reader Second random number N2Afterwards, reader second message is regeneratedIt is sent to cloud database, cloud data Library generates cloud messageReader is returned to, whereinIt represents using reading Operation is encrypted in shared secret key pair information between device and cloud;
(4) reader obtains K, ID, info of label by cloud message, starts ownership request stage, generates reader third Random number N3With a communication secret key S, union generates four message R of reader3R4R5R6It is sent to label, wherein:It reads Device third messageThe 4th message of readerReader Five messageThe 6th message of reader
(5) R that label passes through reader3R4R5R6This four message obtain reader third random number N3, communication secret key S is new and mark Owner identity RID' is signed, design PRNG random number generators generate label the second random number PRNG (k2) after, regenerate label Third messageWith label Verification messageHair Reader is given, ownership transfer request stage is completed;
(6) reader generates the 4th random number N of reader4, according to the 4th random number N4Generate the 7th message of readerIt is sent to new label owner, new label owner confirms its legitimacy Message Authentication Code MAC is generated according to the 7th message of reader afterwards, regenerates reader verification informationFeedback To reader, reader is left the theatre, whereinRepresent using reader and the proprietary shared secret key pair information of new label into Row encryption;
(7) new label owner generates new the first random number of label owner n1Afterwards, new label owner first message is regeneratedIt is sent to label, label confirms the new proprietary legitimacy of label, designs PRNG random numbers Generator generates label third machine number PRNG (k3) after, regenerate label third messageAnd the 4th message of labelIt is sent to new mark Sign owner;
(8) new label owner is according to T3And T4This two strip labels message authentication label legitimacy, generates new label owner second Random number n2, after new label key K' and new label false identity TID', regenerate three new label owner's message r2r3r4It sends To label, tag update stores information, and design PRNG random number generators generate the 4th random number PRNG (k of label4) after, regeneration At two strip label message T4T5New label owner is fed back to, ownership transfer is completed, wherein:New label owner's second messageNew label owner's third messageNew label owner the 4thThe 4th Messages Message of labelThe 5th message of label
2. according to the method described in claim 1, wherein PRNG generating random numbers are designed in step (2), (5), (7) in (8) Device realizes that steps are as follows:
First, by initial seed k1It sequentially inputs in linear feedback shift register, uses one time in a manner of from 1 to 32 The primitive polynomial y=x that number is 3232+x18+x17+ x+1 is to initial seed k1It is iterated processing, generates a new number every time And by new numerical order input linear feedback shift register, while deleting last position;
Then, non-linear place will be carried out in the 32-bit number input Boolean function filter at this moment linear feedback shift register Reason, obtains one-bit digital:
Finally, above two step is carried out continuously 32 times, obtains 32 outputs, as the final output knot of PRNG random number generators Fruit, the random number that the final output, that is, label generates.
3. according to the method described in claim 1, label confirms the legitimacy of reader identity wherein in step (2), realizes Steps are as follows:
(2a) label is from reader first message R1Directly read the first random number N of reader1, by the reading of itself and itself storage Device identity carries out XOR operation, and the reader identity information of operation result and itself storage is carried out cro operation of confusion;
(2b) is by the result of operation of confusion and the reader first message R that receives1It is compared:
If comparison result is consistent, label assert that reader is legal reader, continues to communicate;
If comparison result is inconsistent, label assert that reader is illegal reader, without responding and terminating communication.
4. according to the method described in claim 1, reader generates communication key S wherein in step (4), is first to randomly select One random number N identical with label key K bit length, then this random number and label key K are subjected to XOR operation, operation The result obtained afterwards is communication key
5. according to the method described in claim 1, four message R that wherein label passes through reader in step (5)3R4R5R6It obtains Obtain new label owner identity RID', reader third random number N3With communication secret key S, realize that steps are as follows:
(5a) label is by label the first random number PRNG (k1), label key K and reader third message R3XOR operation is carried out, Obtain reader third random number N3
(5b) label is by the reader third random number N of acquisition3Per in-place computations are carried out with the identity ID of oneself, and displacement is tied Fruit and the 4th message R of reader4It is compared:
If the two result is identical, label determines that the reader message received is not tampered with, and label continues step (5c);
If the two result is different, label determines that the reader message received has been tampered with, and label terminates communication;
(5c) label is according to the reader third random number N obtained in step (5b)3, to the 5th message R of reader5Carry out inverse per In-place computation, and by the operation resultXOR operation is carried out with label key, obtains communication key S;
(5d) label is according to communication key S, to the 6th message R of reader6Carry out inverse per in-place computations, and by the operation resultXOR operation is carried out with reader identity RID, obtains new label owner identity RID'.
6. according to the method described in claim 1, new label owner is according to the 7th message R of reader wherein in step (6)7 Message Authentication Code MAC is generated, realizes that steps are as follows:
(6a) new label owner is from the 7th message R of reader7It directly reads and reads the 4th random number N4
(6b) new label owner uses the shared secret key K of reader and oneselfRR'To the 7th message R of reader7It is decrypted, obtains To reader identity RID, label false identity TID, tag identity ID, label relevant information info, communication key S and reading the 4th Random number N4
The reader identity obtained after decryption is compared (6c) new label owner with the reader identity stored:
If comparison result is consistent, new label owner determines that the 7th informed source of reader is legal, continues step (6d);
If comparison result is inconsistent, new label owner determines that the 7th informed source of reader is illegal, terminates communication;
(6d) new label owner by after decryption the 4th random number of reader and the reader that is directly read from step (6a) 4th random number is compared:
If the two is consistent, new label owner determines the 7th message R of reader7It is not tampered with, and stored tag false identity TID, tag identity ID, label relevant information info, communication key S and the 4th random number N of reading4, continue step (6d);
If the two is inconsistent, new label owner determines that the 7th message of reader is tampered, and error message is returned to reader error;
(6e) new label owner carries out label false identity TID, tag identity ID, label relevant information info, communication key S After cascade, Hash operation is carried out to it and obtains result to be Message Authentication Code MAC.
7. according to the method described in claim 1, wherein label confirms the legal of new label owner identity in step (7) Property, realize that steps are as follows:
(7a) label is from reader first message r1Directly read the first random number of reader n1, by the reading of itself and itself storage Device identity carries out XOR operation, and the reader identity information of operation result and itself storage is carried out cro operation of confusion;
(7b) label is by the result of operation of confusion and the reader first message r that receives1It is compared:
If comparison result is consistent, label assert that new label owner is legal, continues to communicate;
If comparison result is inconsistent, label assert that new label owner is illegal, without responding and terminating communication.
8. according to the method described in claim 1, new label owner is according to T wherein in step (8)3And T4This two strip label Message authentication label legitimacy realizes that steps are as follows:
(8a) new label owner is using own identification RID' to label third message T3Inverse per in-place computations are carried out, label is obtained Third random number PRNG (k3);
(8b) new label owner is by own identification RID', label third random number PRNG (k3) and the 4th message T of label4It carries out XOR operation obtains label false identity, and obtained label false identity is compared with the label false identity of storage:
If the two is consistent, then it is assumed that tag identity is legal, continues to communicate;
If the two is inconsistent, then it is assumed that tag identity is illegal and terminates communication.
9. according to the method described in claim 1, tag update stores information wherein in step (8), realizes that steps are as follows:
(9a) label is by the 4th random number PRNG (k of label4), communication key S and new label owner second message r2Carry out exclusive or Operation obtains as new the second random number of label owner n2
(9b) label uses new the second random number of label owner n2To new label owner third message r3Inverse per is carried out to replace Operation, then the operation result and communication key S are subjected to XOR operation, it obtains new label key K " and stores;
(9c) label is using new label key K " to new the 4th message r of label owner4Carry out inverse per in-place computations, then by the fortune It calculates result and carries out XOR operation with itself false identity TID, obtain new label false identity TID' and store;
(9d) label deletes label false identity TID, the label secret key K stored when initialization and and reading device identity RID.
CN201810362401.XA 2018-04-20 2018-04-20 Cloud-based ultra-lightweight radio frequency identification tag ownership transfer method Active CN108599958B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810362401.XA CN108599958B (en) 2018-04-20 2018-04-20 Cloud-based ultra-lightweight radio frequency identification tag ownership transfer method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810362401.XA CN108599958B (en) 2018-04-20 2018-04-20 Cloud-based ultra-lightweight radio frequency identification tag ownership transfer method

Publications (2)

Publication Number Publication Date
CN108599958A true CN108599958A (en) 2018-09-28
CN108599958B CN108599958B (en) 2021-07-27

Family

ID=63613838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810362401.XA Active CN108599958B (en) 2018-04-20 2018-04-20 Cloud-based ultra-lightweight radio frequency identification tag ownership transfer method

Country Status (1)

Country Link
CN (1) CN108599958B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110190966A (en) * 2019-05-17 2019-08-30 西安电子科技大学 A kind of wireless radio frequency identification mark ownership transfer method based on cloud storage
CN111615108A (en) * 2020-04-12 2020-09-01 西安电子科技大学 Radio frequency identification data security authentication method, system, storage medium and terminal
CN113726777A (en) * 2021-08-30 2021-11-30 浙江工商大学 Electronic tag ownership transfer method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114270A1 (en) * 2003-11-21 2005-05-26 International Business Machines Corporation Merchandise-integral transaction receipt and auditable product ownership trail
CN103281194A (en) * 2013-06-15 2013-09-04 杨涛 Safe and lightweight class RFID ownership transferring method based on bilinear pairings
CN103701785A (en) * 2013-12-13 2014-04-02 天津大学 Ownership transfer and key array-based RFID (radio frequency identification) security authentication method
CN105100112A (en) * 2015-08-25 2015-11-25 西安电子科技大学 Cloud-storing based radio frequency identification (RFID) group tag ownership transferring method
CN106066975A (en) * 2016-05-30 2016-11-02 广东工业大学 A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic
CN106712927A (en) * 2016-11-30 2017-05-24 广东工业大学 Super lightweight group RFID label ownership transfer method based on word synthesis operation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114270A1 (en) * 2003-11-21 2005-05-26 International Business Machines Corporation Merchandise-integral transaction receipt and auditable product ownership trail
CN103281194A (en) * 2013-06-15 2013-09-04 杨涛 Safe and lightweight class RFID ownership transferring method based on bilinear pairings
CN103701785A (en) * 2013-12-13 2014-04-02 天津大学 Ownership transfer and key array-based RFID (radio frequency identification) security authentication method
CN105100112A (en) * 2015-08-25 2015-11-25 西安电子科技大学 Cloud-storing based radio frequency identification (RFID) group tag ownership transferring method
CN106066975A (en) * 2016-05-30 2016-11-02 广东工业大学 A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic
CN106712927A (en) * 2016-11-30 2017-05-24 广东工业大学 Super lightweight group RFID label ownership transfer method based on word synthesis operation

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110190966A (en) * 2019-05-17 2019-08-30 西安电子科技大学 A kind of wireless radio frequency identification mark ownership transfer method based on cloud storage
CN111615108A (en) * 2020-04-12 2020-09-01 西安电子科技大学 Radio frequency identification data security authentication method, system, storage medium and terminal
CN113726777A (en) * 2021-08-30 2021-11-30 浙江工商大学 Electronic tag ownership transfer method and system

Also Published As

Publication number Publication date
CN108599958B (en) 2021-07-27

Similar Documents

Publication Publication Date Title
JP4477616B2 (en) Signature system and signature method
KR101360696B1 (en) Non-networked rfid-puf authentication
CN105530263B (en) A kind of extra lightweight RFID mutual authentication methods based on tag ID
CN103905202B (en) A kind of RFID lightweight mutual authentication methods based on PUF
TWI463857B (en) Weight authentication and secret retrieval
US20200106600A1 (en) Progressive key encryption algorithm
CN110752919B (en) Two-party authentication and session key exchange method based on BST-PUF
US20090083833A1 (en) Authentication with physical unclonable functions
CN104112106B (en) A kind of RFID light-weight authentication method unclonable based on physics
US20190140819A1 (en) System and method for mekle puzzles symeteric key establishment and generation of lamport merkle signatures
Oren et al. A low-resource public-key identification scheme for RFID tags and sensor nodes
CN109756893A (en) A kind of intelligent perception Internet of Things anonymous authentication method based on chaotic maps
CN107911354B (en) Composite parallel data encryption method
CN112637161B (en) Data transmission method and storage medium
CN109274485B (en) Data encryption method, data authentication method, related equipment and system
TWI398153B (en) Certification methods, authentication systems and electronic tags
CN102640448A (en) System and method for securely identifying and authenticating devices in a symmetric encryption system
CN108599958A (en) Extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud
US6640303B1 (en) System and method for encryption using transparent keys
CN113378148A (en) Internet of things equipment identity authentication system and method based on block chain
CN111931533B (en) Authentication method for multi-owner RFID tag
CN113114475A (en) PUF identity authentication system and protocol based on bit self-checking
CN113259116A (en) Sensor data uplink method and system based on aggregated signature
CN116108410A (en) Identity credential generation method and device
CN108199836B (en) Method and device for binding and unbinding key and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant