Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Location Privacy Protection Method in Internet of Things Authentication

A privacy protection, Internet of Things technology, applied in the field of location privacy protection in IoT authentication, can solve problems such as label location exposure, and achieve the effect of protecting location privacy, ensuring location privacy security, and the method is simple and efficient

Active Publication Date: 2017-10-27
SOUTHEAST UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The location privacy problem in authentication can be found through examples: when an attacker uses a reader to search for an RF tag, he will complete the authentication process with the tag
During this process, the tag may give its own identification and other information to the reader, and the reader will know that there is a radio frequency tag nearby during the communication process, resulting in the exposure of the tag position

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Location Privacy Protection Method in Internet of Things Authentication
  • A Location Privacy Protection Method in Internet of Things Authentication
  • A Location Privacy Protection Method in Internet of Things Authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below in conjunction with the accompanying drawings.

[0034] The present invention provides a location privacy protection method in Internet of Things authentication. The main idea is to divide the perception layer authentication into two steps: the first step is that the reader / writer sends out information and searches for radio frequency tags. The radio frequency tag will verify the information with the legality of the reader's identity, and determine whether to return an answer; the second step, the radio frequency tag sends a message to complete the authentication answer. The reader will verify the information with the legality of the radio frequency tag to determine whether it passes the verification.

[0035] The main framework of the present invention is as follows: distribution of key material, design of search and authentication process, negotiation and generation of key. Two types of entities are defined: reade...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a location privacy protection method in Internet of Things authentication, belonging to the technical field of Internet of Things security. The method includes the following steps: (1) Key distribution stage, realizing the distribution of key material from the key server to radio frequency tags and reader-writers. (2) The search and authentication stage. In this stage, after the identity is encrypted through the designed square root algorithm, the reader and the radio frequency tag perform data communication to complete the identity authentication. (3) In the shared key generation stage, the reader and the tag calculate the shared key respectively, and use the key to transmit communication information such as the tag ID. The present invention ensures the location privacy and security of communication at the sensing layer of the Internet of Things, that is, only a legal reader can discover and know the location of the radio frequency tag, so that the location of the tag is hidden.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to a location privacy protection method in Internet of Things authentication. Background technique [0002] The Internet of Things is becoming more and more popular. The Internet of Things uses radio frequency identification (RFID), two-dimensional codes, wireless data communication and other technologies on the basis of the computer Internet to construct a network covering everything in the world. The Internet of Things is another wave of the information industry after computers, the Internet, and mobile communication networks. The Internet of Things can be divided into three layers: perception layer, network layer and application layer. Among them, the perception layer is equivalent to human skin and facial features, which can recognize objects and collect information. The perception layer is mainly composed of RFID and some other sensor networks. It is the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/28H04L9/08G06K7/10
Inventor 万长胜黄杰潘浩
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products