| Radio frequency identification(RFID)is one of the core sensing technologies of the Internet of Things.It realizes sensing communication through wireless signals and is widely used in various fields by virtue of its advantages of fast identification speed and strong adaptability to harsh environments.However,due to the heterogeneous and.complex working environment of the RFID system and the limited computing power and storage resources of tags,the wireless channel between the reader and tags in the RFID system faces the problem of private data leakage.Existing security solutions mainly combine traditional cryptography-related technologies to propose authentication protocols.Due to the poor encryption effect of encryption algorithms in traditional protocols,the high consumption of computing resources,and the unreasonable authentication mechanism of protocols,they are not suitable for RFID systems with lowcost requirements.Therefore,a lightweight encryption algorithm(Narrative Cross,NCross),to avoid the label consumption of excessive computing resources,and on this basis,put forward a security authentication protocol for RFID,further solving the problem of privacy data leakage.The research work carried out in this paper is as follows:(1)Aiming at the limited storage capacity of RFID tags,a lightweight crossover encryption algorithm NCross is proposed.First of all,the algorithm takes the dynamic session key as input,adopts the form of three-input and one-output encryption,compresses the data length of the session key,and reduces the consumption of label storage.Then,the processed input is encrypted by XOR,shift,and other logical operations.Finally,the length of output data is shortened by bitwise XOR logic operation to reduce the computational cost and complexity.(2)To solve the problems of tag anonymity privacy and data security in the RFID system authentication process,a Lightweight Norm Cross Protocol for RFID(LNCP)is proposed based on the encryption algorithm NCross.First of all,the protocol takes dynamic changes to participate in the authentication of the tag.All the tags transmitted during the authentication process need to be encrypted by logical operations and then encrypted as the input of the NCross algorithm.Then,in the authentication process,the correctness of the transmitted data needs to be checked to ensure the legitimacy of the identity of the protocol participants and the security of the transmitted data.Finally,after the server authenticates the tag identity,the session key and tag are updated.After encryption,transmission,and verification,the tag authenticates the server.(3)The effectiveness of the proposed encryption algorithm NCross was verified by simulation experiments.The experimental results show that the proposed protocol has low hardware implementation cost,less storage resource occupation,high authentication efficiency,and reduces label computing and storage resources.In addition,this paper also analyzes the security of the LNCP protocol from two aspects of formalization and nonformalization.The analysis shows that LNCP is resistant to replay attacks,analog reader attacks,analog tag attacks,and traceability attacks. |