A Communication Protocol of RFID Systems in Internet of Things
A Communication Protocol of RFID Systems in Internet of Things
A Communication Protocol of RFID Systems in Internet of Things
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
……<br />
……<br />
International Journal <strong>of</strong> Security and Its Applications<br />
Vol. 6, No. 2, April, 2012<br />
Certification Stage<br />
(1)Initialization: save H( EPCR i<br />
) <strong>in</strong> the reader i , save H( EPCR 1<br />
) H( EPC<br />
R 2<br />
) ......<br />
H( EPCR<br />
) and E<br />
N<br />
K<br />
( EPC<br />
1 T<br />
), E (<br />
2 T<br />
)...... (<br />
T<br />
)<br />
j j K<br />
EPC E<br />
j j K<br />
EPC <strong>in</strong> tag j as shown <strong>in</strong> Fig 2. And make<br />
Nj j<br />
sure H( EPCR<br />
) and E ( ),<br />
1<br />
K<br />
EPC<br />
1 j T<br />
H( EPC )<br />
j<br />
R<br />
and E ( )<br />
2<br />
K<br />
EPC<br />
2 j T<br />
...... H( EPC )<br />
j<br />
R N<br />
and EK Nj<br />
( EPCT<br />
j<br />
) put<br />
<strong>in</strong>to a one-to-one relationship. The key K1j , K2j......<br />
KNj<br />
with correspond<strong>in</strong>g<br />
E ( ),<br />
K<br />
EPC<br />
1 j T<br />
E ( )<br />
j K<br />
EPC<br />
2 j T<br />
...... E (<br />
j<br />
K Nj<br />
EPCT<br />
j<br />
) between all the readers and tag j saved <strong>in</strong> the<br />
<strong>RFID</strong> middleware database just as shown <strong>in</strong> Fig 3, and make sure K and EK<br />
( EPC<br />
1 T<br />
),<br />
K2 j<br />
and E ( EPC ) ...... K<br />
Nj<br />
and E ( EPCT<br />
) put <strong>in</strong>to a one-to-one relationship.<br />
K2 j Tj<br />
K Nj j<br />
1 j<br />
j<br />
j<br />
H( EPC<br />
R 1<br />
) EK<br />
( EPC<br />
1 T<br />
)<br />
j<br />
j<br />
H( EPC<br />
R 2<br />
) EK<br />
( EPC<br />
2 T<br />
)<br />
j<br />
j<br />
E ( EPC )<br />
K1 j Tj<br />
E ( EPC )<br />
K2 j Tj<br />
K<br />
1 j<br />
K<br />
2 j<br />
……<br />
……<br />
H( EPC ) E ( EPC<br />
T<br />
)<br />
RN<br />
K Nj j<br />
E ( EPC )<br />
K Nj T j<br />
K<br />
Nj<br />
Figure 2. Tag j <strong>in</strong>itialized<br />
Figure 3. Database Initialized<br />
(2)Reader i generates a random number r by random number generator Rand( x),<br />
generate an authentication request through the XOR H( EPC ) r t , sent rt , to the tag.<br />
(3)When receive certification request, tag j will search the<br />
Ri<br />
R i<br />
R i<br />
then<br />
H( EPC ) to satisfy<br />
H( EPC r)<br />
equal to the received t . If not found, authentication fails and the tag stops<br />
respond<strong>in</strong>g. Otherwise, cont<strong>in</strong>ue to perform the follow<strong>in</strong>g steps to f<strong>in</strong>d<br />
E ( EPC ), which is<br />
K ij T j<br />
one-to-one with reader EPC<br />
R i<br />
. Then hashes a H( EK ij<br />
( EPCT<br />
j<br />
) r)<br />
and send a to the reader.<br />
(4)When the reader receives tag response, sent a and random number r generated first to<br />
the <strong>RFID</strong> middleware.<br />
(5) After receiv<strong>in</strong>g a , <strong>RFID</strong> middleware will search the EK ij<br />
( EPC<br />
T j<br />
) to satisfy<br />
H( E ( EPC ) r)<br />
a . If it is found, certification is completed. Then cont<strong>in</strong>ue to perform the<br />
K ij T j<br />
follow<strong>in</strong>g steps, search<br />
K ,which is one-to-one with E ( EPC ).Otherwise, respond<strong>in</strong>g stops<br />
ij<br />
K ij T j<br />
to conduct DK<br />
( E (<br />
T<br />
))<br />
ij K<br />
EPC EPC<br />
ij j T<br />
symmetric decryption to obta<strong>in</strong> EPC<br />
j<br />
T j<br />
.After that, search<br />
the Info( EPC<br />
T<br />
) with EPC<br />
j<br />
T j<br />
through the <strong>in</strong>formation service system <strong>of</strong> <strong>Internet</strong> <strong>of</strong> Th<strong>in</strong>gs, and<br />
sent it to reader. If the tag needs to update the keys and transfer the ownership, cont<strong>in</strong>ue do<br />
the follow<strong>in</strong>g steps.<br />
Key Update Phase<br />
(1) <strong>RFID</strong> middleware databases generate a new key<br />
function, then encrypt<br />
K ij T j<br />
T j<br />
K H( K r)<br />
, by us<strong>in</strong>g Hash<br />
EPC with the key to generate new E ' ( EPC T<br />
) , then XOR<br />
E ( EPC ) and E ' ( EPC T<br />
) , that is e E ( EPCT<br />
) E ( EPC<br />
' T<br />
) ,then Hash function <strong>of</strong><br />
K ij<br />
j<br />
'<br />
ij<br />
Kij j K ij<br />
j<br />
ij<br />
K ij<br />
j<br />
96