Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet-of-vehicles RFID safety certificating method based on key distribution center

A technology of key distribution center and security authentication, which is applied in the field of RFID security authentication of the Internet of Vehicles based on the key distribution center, and can solve problems such as background server DoS attacks, insecure channel communication of the RFID system of the Internet of Vehicles, etc.

Active Publication Date: 2018-11-16
CHANGAN UNIV
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention mainly solves the communication problem of the unsafe channel in the RFID system of the Internet of Vehicles, especially the DoS attack problem that the attacker easily initiates to the background server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-of-vehicles RFID safety certificating method based on key distribution center
  • Internet-of-vehicles RFID safety certificating method based on key distribution center
  • Internet-of-vehicles RFID safety certificating method based on key distribution center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Such as figure 2 As shown, in the parking lot toll station scenario, the RFID security authentication method for the Internet of Vehicles based on the key distribution center, specifically.

[0047] A. Initialization

[0048] Each tag stores its ID i As its unique identity, the ID i Assigned by the background server, that is, only the tag and the back server share the ID i . id r It is the ID of the reader, and is shared by the reader and the background server. k i,j Represents identity as ID i The private key of the j-th session of the label is allocated and shared by the KDC. After each session is completed, the KDC and the label update the private key synchronously. KDC is the key distribution center, which stores a key authorization list L, when KDC receives the random number r sent by the reader r When , first combine the stored key authorization list L with the random number r r Perform the operation, and then refresh the key authorization list L. Befo...

Embodiment 2

[0067] Such as image 3 As shown, in the mobile identification, the vehicle network RFID security authentication method based on the key distribution center, specifically.

[0068] A. Initialization

[0069] Each tag stores its ID i As its unique identity, the ID i Assigned by the background server, that is, only the tag and the back server share the ID i . id r It is the ID of the reader, and is shared by the reader and the background server. k i , j Represents identity as ID i The private key of the j-th session of the label is allocated and shared by the KDC. After each session is completed, the KDC and the label update the private key synchronously. KDC is the key distribution center, which stores a key authorization list L, when KDC receives the random number r sent by the reader r When , first combine the stored key authorization list L with the random number r r Perform the operation, and then refresh the key authorization list L. Before the tag can communic...

Embodiment 3

[0086] Such as Figure 4 As shown, in the vehicle-road coupling system, the RFID security authentication method for the Internet of Vehicles based on the key distribution center, specifically.

[0087] A. Initialization

[0088] Each tag stores its ID i As its unique identity, the ID i Assigned by the background server, that is, only the tag and the back server share the ID i . id r It is the ID of the reader, and is shared by the reader and the background server. k i , j Represents identity as ID i The private key of the j-th session of the label is allocated and shared by the KDC. After each session is completed, the KDC and the label update the private key synchronously. KDC is the key distribution center, which stores a key authorization list L, when KDC receives the random number r sent by the reader r , first combine the stored list with the random number r r Perform the operation, and then refresh the key authorization list L. Before the tag can communicate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an Internet-of-vehicles RFID safety certificating method based on a key distribution center. The method comprises the steps of a protocol process period, transmitting a generated rr to a label by a reader-and-writer, and transmitting the rr to a KDC; generating an rt by the label after receiving the rr, performing calculation according to formulae which are shown in the description, and transmitting a, rt and b to the reader-and-writer; transmitting a, rt and b to the KDC by the reader-and-writer; after the KDC receives a, rt and b, searching a value which matches a, ifthe value exists, authorizing legal of the label, generating an R by the KDC, and transmitting R, b, rr and rt to a background server; and if the value does not exist, authorizing illegal of the labeland stopping communication; after a background server receives the R, b, rr and rt, searching an ID value, after the legal label is authorized, performing calculation according to formulae which arerepresented in the description, and transmitting c and d to the reader-and-writer; after the illegal label is authorized, stopping communication; forwarding the c and the d to the label by the reader-and-writer, after the legal reader-and-writer is authorized, synchronously updating the key by the label according to a formula which is represented in the description, and otherwise, after the illegal reader-and-writer is authorized, stopping communication. The Internet-of-vehicles RFID safety certificating method can effectively prevent counterfeit attack, retransmission attack, tracking attackand DoS attack.

Description

technical field [0001] The invention relates to the technical field of Internet of Vehicles and communication, in particular to an RFID security authentication method for Internet of Vehicles based on a key distribution center. Background technique [0002] RFID (Radio Frequency Identification) radio frequency identification technology is a communication technology that can identify specific targets and read and write related data through radio signals. It is also one of the core technologies of the Internet of Vehicles. The license plate of a car is the ID that stores the vehicle information. The traditional license plate is mainly recognized by visual and image processing technology. The environmental impact is large, the recognition speed is slow, the operating cost is high, and complex software algorithms are required. Therefore, this type of method has been difficult to adapt to the current development trend of intelligent transportation and Internet of Vehicles, and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06G06K7/00G06K7/10
CPCG06K7/0008G06K7/10257H04L9/083H04L63/1458
Inventor 肖剑李文江耿洪杨翟英博杨枝黄玲麟侯文毅
Owner CHANGAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products