Position privacy protection method in Internet-of-Things authentication

An Internet of Things authentication and privacy protection technology, which is applied in the field of location privacy protection in Internet of Things authentication, can solve problems such as label location exposure, and achieve the effect of protecting location privacy, ensuring location privacy security, and a simple and efficient method

Active Publication Date: 2014-04-30
SOUTHEAST UNIV
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The location privacy problem in authentication can be found through examples: when an attacker uses a reader to search for an RF tag, he will complete the authentication process with the tag
During this process, the tag may give its own identification and other information to the reader, and the reader will know that there is a radio frequency tag nearby during the communication process, resulting in the exposure of the tag position

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Position privacy protection method in Internet-of-Things authentication
  • Position privacy protection method in Internet-of-Things authentication
  • Position privacy protection method in Internet-of-Things authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below in conjunction with the accompanying drawings.

[0034] The present invention provides a location privacy protection method in Internet of Things authentication. The main idea is to divide the perception layer authentication into two steps: the first step is that the reader / writer sends out information and searches for radio frequency tags. The radio frequency tag will verify the information with the legality of the reader's identity, and determine whether to return an answer; the second step, the radio frequency tag sends a message to complete the authentication answer. The reader will verify the information with the legality of the radio frequency tag to determine whether it passes the verification.

[0035] The main framework of the present invention is as follows: distribution of key material, design of search and authentication process, negotiation and generation of key. Two types of entities are defined: reade...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a position privacy protection method in Internet-of-Things authentication, and belongs to the technical field of Internet-of-Things safety. The position privacy protection method includes the following steps: (1) secret key distribution is carried out: secret key contents are distributed from a secret key server to a radio frequency tag and a read-writer; (2) searching and authentication are carried out: identity encryption is carried out through a designed square root algorithm, and then the reader-writer is in data communication with the radio frequency tag to complete identity authentication; (3) a shared secret key is generated: the reader-writer and the radio frequency tag respectively calculate to obtain the shared secret key, and communication information such as the ID of the radio frequency tag is transmitted through the secret key. According to the position privacy protection method, the position privacy safety of communication of a perception layer of the Internet of Things is guaranteed, namely, only the legal reader-writer can find and know the position of the radio frequency tag, and therefore the position of the radio frequency tag is hidden.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to a location privacy protection method in Internet of Things authentication. Background technique [0002] The Internet of Things is becoming more and more popular. The Internet of Things uses radio frequency identification (RFID), two-dimensional codes, wireless data communication and other technologies on the basis of the computer Internet to construct a network covering everything in the world. The Internet of Things is another wave of the information industry after computers, the Internet, and mobile communication networks. The Internet of Things can be divided into three layers: perception layer, network layer and application layer. Among them, the perception layer is equivalent to human skin and facial features, which can recognize objects and collect information. The perception layer is mainly composed of RFID and some other sensor networks. It is the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/28H04L9/08G06K7/10
Inventor 万长胜黄杰潘浩
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products