Chinese remainder theorem based location privacy method in Internet-of-Things sensing layer authentication

A technology of the Chinese remainder theorem and the Internet of Things, applied in electromagnetic radiation induction, user identity/authority verification, electrical components, etc., can solve the problems of label location exposure, data source location exposure, etc., and achieve the effect of hiding the label location

Inactive Publication Date: 2014-06-04
SOUTHEAST UNIV
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These communication processes will let the reader know that there is a radio frequency tag nearby, resulting in the exposure of the tag position
[0005] The second issue is the location privacy issue in routing
This leads to the exposure of the location of the data source

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chinese remainder theorem based location privacy method in Internet-of-Things sensing layer authentication
  • Chinese remainder theorem based location privacy method in Internet-of-Things sensing layer authentication
  • Chinese remainder theorem based location privacy method in Internet-of-Things sensing layer authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] This embodiment completes the initialization phase of the system. The purpose of this stage is to generate the key material, and then write it into the radio frequency tag and reader to provide the basis for the subsequent stage. represented by the following steps:

[0028] steps

content

100

The key server generates two prime numbers (p 1 ,q 1 ).

102

calculate b 1 , b 2 , n 1 .

104

(n 1 ,p 1 ,q 1 , b 1 , b 2 ) into the reader and RF tags.

[0029] The specific description in the first embodiment is as follows:

[0030] Step 100: The key server randomly generates two large prime numbers (p1, q1).

[0031] Step 102: Calculate b 1 =q 1 -1 modp 1 , b 2 =p 1 -1 modq 1 , n 1 =p 1 q 1 .

[0032] Step 104: the key server writes (n1, p1, q1, b1, b2) into the reader-writer and the radio frequency tag.

Embodiment 2

[0034] This embodiment completes the search and authentication process. The purpose of this stage is to ensure that only legitimate readers can find tags nearby and hide the location of tags. represented by the following steps:

[0035]

[0036] The specific description in embodiment two is as follows:

[0037] Step 106: The reader generates two numbers randomly Then calculate V 1 =r 1 b 1 q 1 + r 2 b 2 p 1 modn 1 , and M 1 =(r 1 , r 2 , V 1 ) to the label.

[0038] Step 108: Tag receives M 1 After verifying If the above formula is established, it means that the reader is legal. Otherwise, the reader is considered to be an attacker and does not make any response, thereby preventing the attacker from knowing its own position. The purpose of location privacy protection is achieved.

[0039] Step 110: The tag randomly generates two numbers Then calculate V 2 = r 3 b 1 ·q 1 + r 4 b 2 ·p 1 modn 1 , and M 2 =(r 3 ,r 4 ,V 2 ) to the reader.

[0...

Embodiment 3

[0042] This embodiment is the symmetric key negotiation generation stage. The purpose of this stage is to generate a shared key and transmit information such as tag ID under the protection of this key. represented by the following steps:

[0043] steps

content

114

The reader and the tag calculate the shared key k 1 .

116

Tag ID transmission.

[0044] The specific description in embodiment three is as follows:

[0045]Step 114: After the search phase and the tag response phase, the reader and the tag can respectively calculate the shared key as follows: k 1 =h(r 1 | r 2 | r 3 | r 4 |p 1 |q 1 ). h(-) is a hash function and exists as a key algorithm. This key is used to protect the integrity and confidentiality of subsequent communications.

[0046] Step 116: In this process, the tag and the reader share the key k 1 Under the protection of the label, information such as tag ID can be transmitted.

[0047] It can be seen fr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Chinese remainder theorem based location privacy method in Internet-of-Things sensing layer authentication, and belongs to the technical field of Internet-of-Things safety. The method comprises the following steps that (1) at the distribution stage of key material, the key material is distributed from a key server and written into a radio frequency tag and a reader-writer; (2) at a search and authentication stage, the reader-writer and the radio frequency tag conduct data communication and authenticate validity of each other; (3) at the negotiated generating stage of a symmetric key, the reader-writer and the radio frequency tag calculates the shared key respectively, and the ID of the tag and other information are transmitted under the protection of the key. The method guarantees safety of location privacy in sensing layer authentication, and meets the requirement for safety of passive RFID. The method can enable the position of the tag to be hidden very well, namely, only the legal reader-writer can found that the tag exists nearby, and information of the tag is read; an illegal reader-writer can not found whether the tag exists nearby, and the purpose of hiding the position of the tag is achieved.

Description

technical field [0001] The invention relates to the issue of location privacy at the perception layer, and belongs to the technical field of Internet of Things security. Specifically, it is a solution to location privacy in perceptual layer authentication based on the Chinese remainder theorem. Background technique [0002] The Internet of Things is based on the computer Internet, using radio frequency identification (RFID), two-dimensional code, wireless data communication and other technologies to realize automatic identification of items and Internet sharing of information. The Internet of Things is divided into three layers: perception layer, network layer and application layer. The perception layer is equivalent to the skin and facial features of the human body, the network layer is equivalent to the nerve center and brain of the human body, and the application layer is equivalent to the social division of labor. [0003] The perception layer plays the role of identify...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06K7/10
Inventor 万长胜黄杰仇瑞腾
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products