HomeNewCase ShowRFID Book ManagementDesign scheme of library security authentication protocol based on RFID
Design scheme of library security authentication protocol based on RFID
2022-12-02
Radio Frequency Identification (RFID) is a non-contact automatic identification technology, which automatically identifies target objects and obtains relevant data through radio frequency signals. RFID can be widely used in many fields such as industrial automation, commercial automation, transportation control management, library management system, etc. It is listed as one of the top ten important technologies in this century.
The application practice of RFID technology in the field of libraries is booming: Molnar pointed out in 2004 that there are more than 130 libraries in North America using RFID systems. In China, Chengyi College of Xiamen Jimei University took the lead in becoming the first library in China to use RFID collection management system in February 2006; then the new Shenzhen Library also chose RFID system as a technical means to improve the library service system. Then , Wuhan Library became the third library to develop and use the RFID intelligent collection management system across the board.
Security issues such as confidentiality and authentication are the current research hotspots of RFID technology, and different application fields have different requirements for RFID security. In order to guarantee the security of the RFID system in the application environment of the library, it is necessary to conduct a systematic research on the security requirements and propose a security solution.
This paper will aim at the application of RFID technology in library document management, to discuss the issue of its authentication protocol. This paper first analyzes the structure of the RFID system and the research status of the security protocol authentication protocol. On the basis of constructing the security model of the library RFID system, it designs an authentication protocol to ensure the secure communication of the library RFID system: PA-Lock protocol. , analyzed the security performance of the PA-LOCK protocol and compared it with other protocols.
2 RFID system composition and security protocol status quo
This part briefly introduces the basic composition structure, communication model and security protocol research status of RFID system.
2.1 Composition of RFID system
RFID system generally consists of three parts: RFID tag (tag), RFID reader (reader) and back-end database (database, back-end server).
1) RFID tag: It consists of a chip and a coupling element (antenna). The chip is used for computing, and the antenna is used for wireless communication. The computing and storage capabilities of the chip are very limited. Each tag has a unique electronic code.
2) RFID reader: It is composed of a radio frequency interface and a control unit, and its computing power and storage capacity are relatively large. The RFID reader obtains the data in the tag through the radio frequency interface and transmits it to the back-end database. The channel between the RFID reader and the tag is an insecure channel.
3) RFID back-end database: Receive data from RFID readers, store tagged information or associated information, and there is a secure channel between RFID readers and back-end databases.
2.2 Research Status of RFID Security Authentication Protocol
The characteristics of RFID technology such as wireless transmission, signal broadcasting, and tags with only weak computing power have put forward special requirements for the design of RFID system security mechanisms. Designing a safe, efficient, and low-cost RFID protocol has always been a challenging topic. .
Using cryptographic methods to design RFID security authentication protocols is a major research method. So far, many RFID security authentication protocols have been proposed. These protocols can be roughly divided into two categories: one is designed from the general security aspects of the protocol, such as Hash-Lock protocol, Hash chain protocol, hash-based ID change protocol, etc. These authentication protocols mainly solve the problem in the label identification process. Security issues, such as confidentiality, information leakage, and untraceability, etc.: the other is to design RFID security authentication protocols from the particularity of the application field. Through the detailed analysis of the characteristic process of the application, the targeted design of RFID security issues is made to meet the needs of the application field, such as the general and combinable secure RFID communication protocol in the supply chain environment, which is through the supply chain management field In-depth research on the security mechanism of RFID technology in order to design an application-specific RFID security authentication protocol.
Like other specific RFID application fields, the characteristics of the library document resource management field also put forward special requirements for RFID security protocols. Its characteristics are mainly manifested in the following aspects:
ADDING-BOTTOM: 0px; MARGIN: 20px 0px 0px; WORD-SPACING: 0px; FONT: 14px/25px Arial, arial; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; PADDING-TOP: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; Background-COLOR: rgb(255,255,255); orphans: 2; widows: 2; -stroke-width: 0px"> 1) Books have two statuses during the entire circulation period: in-library collection status and loan status. In library management, there are different constraint rules for books in different statuses, such as for in-library collection status Books are not allowed to be taken out of the library, but books that are on loan can enter and leave the library freely.
2) The state changes of books are periodic. Each book starts from the state of collection in the library, and then returns to the state of collection in the library through the loan state, and it goes round and round, changing cyclically.
3) Book management requires real-time tracking, status location and statistical analysis of books. Analyze the use status and utilization rate of books. At present, there is no in-depth research on the RFID security mechanism in library document resource management. The focus of this paper is to analyze and design a security authentication protocol for RFID tag authentication and identification for various main processes in library document resource management, so as to ensure that only authorized users can identify specific tags, and attackers cannot track these tags.
3 Library RFID Security Requirements Modeling
An important prerequisite for designing an RFID security authentication protocol is to define the security model of the RFID system. The security model is closely related to the actual application scenarios of the system. Therefore, before designing the security authentication protocol of the library RFID system, it is first necessary to analyze the application model of the library RFID system, the main security threats and the security requirements of the system in detail.
3.1 Library RFID system model
Usually, the library RFID system consists of three parts: tags, readers and background databases. Since there is a secure channel between the reader and the background database, we consider these two parts as a whole when designing the security protocol. Therefore, we mainly care about the reader and the tag. For labels, we assume that there are both legitimate and malicious labels. There are four main types of readers: label converters, shelf racks, self-service lending machines, and security detection doors. The label converter is mainly used to realize the fast conversion from barcode to RFID, and is responsible for the writing operation of relevant information. The shelving device scans the RFID tags of the books and combines the layer tags to perform positioning and inventory, and the amount of information that needs to be obtained is small. The self-service borrowing and returning machine scans the RFID, borrows and returns the books, and needs to connect to the back-end database. The security detection gate identifies the books and determines whether the books are in the borrowing state.
The RFID tags used in the library are mainly passive tags with a working frequency of 13.56MHZ. This kind of tag has a small storage capacity and can only store a small amount of book information such as book titles and shelf numbers; at the same time, the computing power of the tag is also very weak, and it can only compare the size of two numbers, perform hash hashing, generate random numbers, and retrieve its own Simple functions such as information, these functions are easy to implement on the label of the Class 1 Generation 2 standard.
3.2 Major Security Threats
Combined with the characteristics of the library RFID system application model, the following important assumptions can be made:
Hypothesis: The communication between the reader and the tag inside the library is safe and can be transmitted in plain text; there is a security threat in the communication outside the library, and confidentiality and authentication measures are required.
Based on this security assumption, the security threats faced by the library RFID system mainly include the following:
1) As a normal reader, the attacker has the ability to scan tags.
2) The attacker has the ability to clone the label, that is, rewrite the content of the label.
The application practice of RFID technology in the field of libraries is booming: Molnar pointed out in 2004 that there are more than 130 libraries in North America using RFID systems. In China, Chengyi College of Xiamen Jimei University took the lead in becoming the first library in China to use RFID collection management system in February 2006; then the new Shenzhen Library also chose RFID system as a technical means to improve the library service system. Then , Wuhan Library became the third library to develop and use the RFID intelligent collection management system across the board.

Security issues such as confidentiality and authentication are the current research hotspots of RFID technology, and different application fields have different requirements for RFID security. In order to guarantee the security of the RFID system in the application environment of the library, it is necessary to conduct a systematic research on the security requirements and propose a security solution.
This paper will aim at the application of RFID technology in library document management, to discuss the issue of its authentication protocol. This paper first analyzes the structure of the RFID system and the research status of the security protocol authentication protocol. On the basis of constructing the security model of the library RFID system, it designs an authentication protocol to ensure the secure communication of the library RFID system: PA-Lock protocol. , analyzed the security performance of the PA-LOCK protocol and compared it with other protocols.
2 RFID system composition and security protocol status quo
This part briefly introduces the basic composition structure, communication model and security protocol research status of RFID system.
2.1 Composition of RFID system
RFID system generally consists of three parts: RFID tag (tag), RFID reader (reader) and back-end database (database, back-end server).
1) RFID tag: It consists of a chip and a coupling element (antenna). The chip is used for computing, and the antenna is used for wireless communication. The computing and storage capabilities of the chip are very limited. Each tag has a unique electronic code.
2) RFID reader: It is composed of a radio frequency interface and a control unit, and its computing power and storage capacity are relatively large. The RFID reader obtains the data in the tag through the radio frequency interface and transmits it to the back-end database. The channel between the RFID reader and the tag is an insecure channel.
3) RFID back-end database: Receive data from RFID readers, store tagged information or associated information, and there is a secure channel between RFID readers and back-end databases.
2.2 Research Status of RFID Security Authentication Protocol
The characteristics of RFID technology such as wireless transmission, signal broadcasting, and tags with only weak computing power have put forward special requirements for the design of RFID system security mechanisms. Designing a safe, efficient, and low-cost RFID protocol has always been a challenging topic. .
Using cryptographic methods to design RFID security authentication protocols is a major research method. So far, many RFID security authentication protocols have been proposed. These protocols can be roughly divided into two categories: one is designed from the general security aspects of the protocol, such as Hash-Lock protocol, Hash chain protocol, hash-based ID change protocol, etc. These authentication protocols mainly solve the problem in the label identification process. Security issues, such as confidentiality, information leakage, and untraceability, etc.: the other is to design RFID security authentication protocols from the particularity of the application field. Through the detailed analysis of the characteristic process of the application, the targeted design of RFID security issues is made to meet the needs of the application field, such as the general and combinable secure RFID communication protocol in the supply chain environment, which is through the supply chain management field In-depth research on the security mechanism of RFID technology in order to design an application-specific RFID security authentication protocol.
Like other specific RFID application fields, the characteristics of the library document resource management field also put forward special requirements for RFID security protocols. Its characteristics are mainly manifested in the following aspects:
ADDING-BOTTOM: 0px; MARGIN: 20px 0px 0px; WORD-SPACING: 0px; FONT: 14px/25px Arial, arial; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; PADDING-TOP: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; Background-COLOR: rgb(255,255,255); orphans: 2; widows: 2; -stroke-width: 0px"> 1) Books have two statuses during the entire circulation period: in-library collection status and loan status. In library management, there are different constraint rules for books in different statuses, such as for in-library collection status Books are not allowed to be taken out of the library, but books that are on loan can enter and leave the library freely.
2) The state changes of books are periodic. Each book starts from the state of collection in the library, and then returns to the state of collection in the library through the loan state, and it goes round and round, changing cyclically.
3) Book management requires real-time tracking, status location and statistical analysis of books. Analyze the use status and utilization rate of books. At present, there is no in-depth research on the RFID security mechanism in library document resource management. The focus of this paper is to analyze and design a security authentication protocol for RFID tag authentication and identification for various main processes in library document resource management, so as to ensure that only authorized users can identify specific tags, and attackers cannot track these tags.
3 Library RFID Security Requirements Modeling
An important prerequisite for designing an RFID security authentication protocol is to define the security model of the RFID system. The security model is closely related to the actual application scenarios of the system. Therefore, before designing the security authentication protocol of the library RFID system, it is first necessary to analyze the application model of the library RFID system, the main security threats and the security requirements of the system in detail.
3.1 Library RFID system model
Usually, the library RFID system consists of three parts: tags, readers and background databases. Since there is a secure channel between the reader and the background database, we consider these two parts as a whole when designing the security protocol. Therefore, we mainly care about the reader and the tag. For labels, we assume that there are both legitimate and malicious labels. There are four main types of readers: label converters, shelf racks, self-service lending machines, and security detection doors. The label converter is mainly used to realize the fast conversion from barcode to RFID, and is responsible for the writing operation of relevant information. The shelving device scans the RFID tags of the books and combines the layer tags to perform positioning and inventory, and the amount of information that needs to be obtained is small. The self-service borrowing and returning machine scans the RFID, borrows and returns the books, and needs to connect to the back-end database. The security detection gate identifies the books and determines whether the books are in the borrowing state.
The RFID tags used in the library are mainly passive tags with a working frequency of 13.56MHZ. This kind of tag has a small storage capacity and can only store a small amount of book information such as book titles and shelf numbers; at the same time, the computing power of the tag is also very weak, and it can only compare the size of two numbers, perform hash hashing, generate random numbers, and retrieve its own Simple functions such as information, these functions are easy to implement on the label of the Class 1 Generation 2 standard.
3.2 Major Security Threats
Combined with the characteristics of the library RFID system application model, the following important assumptions can be made:
Hypothesis: The communication between the reader and the tag inside the library is safe and can be transmitted in plain text; there is a security threat in the communication outside the library, and confidentiality and authentication measures are required.
Based on this security assumption, the security threats faced by the library RFID system mainly include the following:
1) As a normal reader, the attacker has the ability to scan tags.
2) The attacker has the ability to clone the label, that is, rewrite the content of the label.