Electronic Science and Technology ›› 2025, Vol. 38 ›› Issue (2): 78-83.doi: 10.16180/j.cnki.issn1007-7820.2025.02.010

Previous Articles     Next Articles

Research on the Security and Privacy Preserving Method of RFID Systems

SHI Zhicai1,2()   

  1. 1. School of Electronic and Electrical Engineering,Shanghai University of Engineering Science, Shanghai 201620,China
    2. School of Information Engineering,Shanghai Zhongqiao Vocational and Technical University,Shanghai 201514,China
  • Received:2023-08-04 Revised:2023-09-04 Online:2025-02-15 Published:2025-01-16
  • Supported by:
    The Scientific and Technological Innovation 2030-Major Project of New Generation Artificial Intelligence(2020AAA0109300)

Abstract:

In view of the problems of privacy leakage and security attack in RFID(Radio Frequency IDentification) system due to the simple structure of radio frequency tag and the wireless transmission of data between reader and RFID system, this study proposes to protect the security and privacy of RFID system through two-way lightweight authentication protocol. The protocol generates session messages by randomizing the secret information of tags and then Hashing them, and adopts secondary mutual authentication between tags and readers, which improves the security of the protocol.The protocol ensures the confidential transmission and integrity of session information in the authentication process through Hash operation. The randomization of each session message sent by the tag side ensures the freshness of the message, and the update of the system secret information ensures the forward security of the protocol. RFID authentication protocol can not only resist attacks such as eavesdropping, tracking, replay, and de-synchronization, but also meet the security and privacy protection needs of RFID systems.

Key words: RFID system, authentication protocol, security, privacy, Hash function, radio frequency tag, confidentiality, integrity, pseudo random number

CLC Number: 

  • TP393.08