Computer and Modernization ›› 2021, Vol. 0 ›› Issue (03): 46-50.

Previous Articles     Next Articles

Two-way Security Authentication RFID Protocol Based on Random Hash Chain

  

  1. (1. NARI Group Co. Ltd. (State Grid Electric Power Research Institute Co. Ltd.), Nanjing 210061, China; 
    2. Beijing Energy Technology Branch, NARI Technology Co. Ltd., Beijing 100085, China; 
    3. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;  
    4. School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China;  
    5. Center for Network and Information Education Technology, Shanxi University of Finance and Economics, Taiyuan 030006, China)
  • Online:2020-03-30 Published:2021-03-24

Abstract: Radio Frequency IDentification (RFID) technology is widely used in the field of Internet of Things. But the RFID system is easy to be stolen and forged during the information transmission process, RFID system has exposed serious security problems. Aiming at the problem of counterfeit attacks in the current mainstream Hash chain protocol cluster, a two-way security authentication protocol based on random Hash chain is proposed. In the process of mutual authentication, the reader verifies the validity of the response message by identifying the value of the random number K, the tag detects the legitimacy of the reader by detecting the tag attributes of the returned message, the reader prevents the label from being counterfeited by detecting the preset identity of the label and ensure the authenticity of data in the system. It can effectively improve the systems forward security, anti-counterfeiting and anti-location tracking and other security features. Finally, this paper uses BAN logic to perform security verification on the proposed protocol, the experimental results show that there is the security of mutual authentication between the tag and the reader.

Key words: IoT, RFID, Hash chain, two-way security certification