04.07.2014 Views

A Communication Protocol of RFID Systems in Internet of Things

A Communication Protocol of RFID Systems in Internet of Things

A Communication Protocol of RFID Systems in Internet of Things

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

……<br />

……<br />

International Journal <strong>of</strong> Security and Its Applications<br />

Vol. 6, No. 2, April, 2012<br />

Certification Stage<br />

(1)Initialization: save H( EPCR i<br />

) <strong>in</strong> the reader i , save H( EPCR 1<br />

) H( EPC<br />

R 2<br />

) ......<br />

H( EPCR<br />

) and E<br />

N<br />

K<br />

( EPC<br />

1 T<br />

), E (<br />

2 T<br />

)...... (<br />

T<br />

)<br />

j j K<br />

EPC E<br />

j j K<br />

EPC <strong>in</strong> tag j as shown <strong>in</strong> Fig 2. And make<br />

Nj j<br />

sure H( EPCR<br />

) and E ( ),<br />

1<br />

K<br />

EPC<br />

1 j T<br />

H( EPC )<br />

j<br />

R<br />

and E ( )<br />

2<br />

K<br />

EPC<br />

2 j T<br />

...... H( EPC )<br />

j<br />

R N<br />

and EK Nj<br />

( EPCT<br />

j<br />

) put<br />

<strong>in</strong>to a one-to-one relationship. The key K1j , K2j......<br />

KNj<br />

with correspond<strong>in</strong>g<br />

E ( ),<br />

K<br />

EPC<br />

1 j T<br />

E ( )<br />

j K<br />

EPC<br />

2 j T<br />

...... E (<br />

j<br />

K Nj<br />

EPCT<br />

j<br />

) between all the readers and tag j saved <strong>in</strong> the<br />

<strong>RFID</strong> middleware database just as shown <strong>in</strong> Fig 3, and make sure K and EK<br />

( EPC<br />

1 T<br />

),<br />

K2 j<br />

and E ( EPC ) ...... K<br />

Nj<br />

and E ( EPCT<br />

) put <strong>in</strong>to a one-to-one relationship.<br />

K2 j Tj<br />

K Nj j<br />

1 j<br />

j<br />

j<br />

H( EPC<br />

R 1<br />

) EK<br />

( EPC<br />

1 T<br />

)<br />

j<br />

j<br />

H( EPC<br />

R 2<br />

) EK<br />

( EPC<br />

2 T<br />

)<br />

j<br />

j<br />

E ( EPC )<br />

K1 j Tj<br />

E ( EPC )<br />

K2 j Tj<br />

K<br />

1 j<br />

K<br />

2 j<br />

……<br />

……<br />

H( EPC ) E ( EPC<br />

T<br />

)<br />

RN<br />

K Nj j<br />

E ( EPC )<br />

K Nj T j<br />

K<br />

Nj<br />

Figure 2. Tag j <strong>in</strong>itialized<br />

Figure 3. Database Initialized<br />

(2)Reader i generates a random number r by random number generator Rand( x),<br />

generate an authentication request through the XOR H( EPC ) r t , sent rt , to the tag.<br />

(3)When receive certification request, tag j will search the<br />

Ri<br />

R i<br />

R i<br />

then<br />

H( EPC ) to satisfy<br />

H( EPC r)<br />

equal to the received t . If not found, authentication fails and the tag stops<br />

respond<strong>in</strong>g. Otherwise, cont<strong>in</strong>ue to perform the follow<strong>in</strong>g steps to f<strong>in</strong>d<br />

E ( EPC ), which is<br />

K ij T j<br />

one-to-one with reader EPC<br />

R i<br />

. Then hashes a H( EK ij<br />

( EPCT<br />

j<br />

) r)<br />

and send a to the reader.<br />

(4)When the reader receives tag response, sent a and random number r generated first to<br />

the <strong>RFID</strong> middleware.<br />

(5) After receiv<strong>in</strong>g a , <strong>RFID</strong> middleware will search the EK ij<br />

( EPC<br />

T j<br />

) to satisfy<br />

H( E ( EPC ) r)<br />

a . If it is found, certification is completed. Then cont<strong>in</strong>ue to perform the<br />

K ij T j<br />

follow<strong>in</strong>g steps, search<br />

K ,which is one-to-one with E ( EPC ).Otherwise, respond<strong>in</strong>g stops<br />

ij<br />

K ij T j<br />

to conduct DK<br />

( E (<br />

T<br />

))<br />

ij K<br />

EPC EPC<br />

ij j T<br />

symmetric decryption to obta<strong>in</strong> EPC<br />

j<br />

T j<br />

.After that, search<br />

the Info( EPC<br />

T<br />

) with EPC<br />

j<br />

T j<br />

through the <strong>in</strong>formation service system <strong>of</strong> <strong>Internet</strong> <strong>of</strong> Th<strong>in</strong>gs, and<br />

sent it to reader. If the tag needs to update the keys and transfer the ownership, cont<strong>in</strong>ue do<br />

the follow<strong>in</strong>g steps.<br />

Key Update Phase<br />

(1) <strong>RFID</strong> middleware databases generate a new key<br />

function, then encrypt<br />

K ij T j<br />

T j<br />

K H( K r)<br />

, by us<strong>in</strong>g Hash<br />

EPC with the key to generate new E ' ( EPC T<br />

) , then XOR<br />

E ( EPC ) and E ' ( EPC T<br />

) , that is e E ( EPCT<br />

) E ( EPC<br />

' T<br />

) ,then Hash function <strong>of</strong><br />

K ij<br />

j<br />

'<br />

ij<br />

Kij j K ij<br />

j<br />

ij<br />

K ij<br />

j<br />

96

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!