A vehicle network RFID security authentication method based on key distribution center

A technology of key distribution center and security authentication, which is applied in the field of vehicle network RFID security certification based on the key distribution center, can solve problems such as insecure channel communication of the vehicle network RFID system, background server DoS attack, etc., to prevent forward security performance, preventing tracking attacks, and preventing retransmission attacks

Active Publication Date: 2021-07-30
广东行致互联科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention mainly solves the communication problem of the unsafe channel in the RFID system of the Internet of Vehicles, especially the DoS attack problem that the attacker easily initiates to the background server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A vehicle network RFID security authentication method based on key distribution center
  • A vehicle network RFID security authentication method based on key distribution center
  • A vehicle network RFID security authentication method based on key distribution center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Such as figure 2 As shown, in the parking lot toll station scenario, the RFID security authentication method for the Internet of Vehicles based on the key distribution center, specifically.

[0047] A. Initialization

[0048] Each tag stores its ID i As its unique identity, the ID i Assigned by the background server, that is, only the tag and the back server share the ID i . id r It is the ID of the reader, and is shared by the reader and the background server. k i,j Represents identity as ID i The private key of the j-th session of the label is allocated and shared by the KDC. After each session is completed, the KDC and the label update the private key synchronously. KDC is the key distribution center, which stores a key authorization list L, when KDC receives the random number r sent by the reader r When , first combine the stored key authorization list L with the random number r r Perform the operation, and then refresh the key authorization list L. Befo...

Embodiment 2

[0067] Such as image 3 As shown, in the mobile identification, the vehicle network RFID security authentication method based on the key distribution center, specifically.

[0068] A. Initialization

[0069] Each tag stores its ID i As its unique identity, the ID i Assigned by the background server, that is, only the tag and the back server share the ID i . id r It is the ID of the reader, and is shared by the reader and the background server. k i,j Represents identity as ID i The private key of the j-th session of the label is allocated and shared by the KDC. After each session is completed, the KDC and the label update the private key synchronously. KDC is the key distribution center, which stores a key authorization list L, when KDC receives the random number r sent by the reader r When , first combine the stored key authorization list L with the random number r r Perform the operation, and then refresh the key authorization list L. Before the tag can communicate...

Embodiment 3

[0086] Such as Figure 4 As shown, in the vehicle-road coupling system, the RFID security authentication method for the Internet of Vehicles based on the key distribution center, specifically.

[0087] A. Initialization

[0088] Each tag stores its ID i As its unique identity, the ID i Assigned by the background server, that is, only the tag and the back server share the ID i . id r It is the ID of the reader, and is shared by the reader and the background server. k i,j Represents identity as ID i The private key of the j-th session of the label is allocated and shared by the KDC. After each session is completed, the KDC and the label update the private key synchronously. KDC is the key distribution center, which stores a key authorization list L, when KDC receives the random number r sent by the reader r , first combine the stored list with the random number r r Perform the operation, and then refresh the key authorization list L. Before the tag can communicate wit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vehicle network RFID security authentication method based on a key distribution center. In the protocol process stage, the r generated by the reader r sent to the label, and the r r Sent to KDC; tag receives r r after generation r t , calculate b=H(ID i ||r r ||r t ), and a,r t , b is sent to the reader; the reader sends a, r t ,b is sent to KDC; KDC receives a,r t ,b, search for a value that matches a, if there is, the authentication label is legal, KDC generates R, and R,b,r r ,r t Send it to the background server; if not, the authentication label is invalid and the communication is terminated; the background server receives R,b,r r ,r t Afterwards, query the ID value, and calculate c=H(ID j ||r r ||R), and send c, d to the reader; after the authentication tag is invalid, the communication is terminated; the reader forwards c, d to the tag, after the reader is authenticated, the tag updates the key synchronously, otherwise the authentication The reader / writer is invalid, and the communication is terminated. The invention can effectively prevent counterfeit attack, retransmission attack, tracking attack and DoS attack.

Description

technical field [0001] The invention relates to the technical field of Internet of Vehicles and communication, in particular to an RFID security authentication method for Internet of Vehicles based on a key distribution center. Background technique [0002] RFID (Radio Frequency Identification) radio frequency identification technology is a communication technology that can identify specific targets and read and write related data through radio signals. It is also one of the core technologies of the Internet of Vehicles. The license plate of a car is the ID that stores the vehicle information. The traditional license plate is mainly recognized by visual and image processing technology. The environmental impact is large, the recognition speed is slow, the operating cost is high, and complex software algorithms are required. Therefore, this type of method has been difficult to adapt to the current development trend of intelligent transportation and Internet of Vehicles, and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06G06K7/00G06K7/10
CPCG06K7/0008G06K7/10257H04L9/083H04L63/1458
Inventor 肖剑李文江耿洪杨翟英博杨枝黄玲麟侯文毅
Owner 广东行致互联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products