Netinfo Security ›› 2021, Vol. 21 ›› Issue (5): 1-11.doi: 10.3969/j.issn.1671-1122.2021.05.001

Previous Articles     Next Articles

RFID Security Authentication Protocol Based on Blockchain Technology

LI Peng1,2(), ZHENG Tiantian1, XU He1,2, ZHU Feng1,2   

  1. 1. School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
    2. Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210023, China
  • Received:2020-12-19 Online:2021-05-10 Published:2021-06-22
  • Contact: LI Peng E-mail:lipeng@njupt.edu.cn

Abstract:

The security authentication protocol in the traditional RFID application field is mainly based on a centralized database, while the protocol based on the centralized database has problems such as data loss and tampering. As a distributed technology, blockchain has the characteristics of decentralization, higher reliability and transparency, and can effectively solve the data security problems that may be caused by the traditional RFID security authentication protocol central server. In this regard, the blockchain and RFID are combined to propose a RFID security authentication protocol based on blockchain technology, which uses exclusive OR, bit rotation and other operations to encrypt data, and transfers verification calculations to readers and block chain nodes. The identification of malicious readers is added to the protocol to reduce the cost of invalid calculation. In addition, the feasibility of the protocol is verified through smart contracts and truffle simulation of the protocol data exchange process, and the security of the protocol is verified through theoretical analysis and GNY proof, to ensure that the protocol effectively prevents various attacks such as eavesdropping, replay and decentralization.

Key words: blockchain, RFID, authentication, low-cost, smart contract

CLC Number: