Research of Ubiquitous Power Internet of Things Security Authentication Method Based on CPK and RIFD

As RFID system has fewer calculation and storage resources for RF tag, it is difficult to adopt the traditional encryption algorithm technology with higher security, which leads to the system being vulnerable to counterfeiting, tampering, leakage and other problems. To this end, a lightweight bidirectional security authentication method based on the combined public key is proposed. The method deals with the key management problem of the power Internet of things (IoT) in the terminal layer device by studying the combined public key (CPK) technology. The elliptic curve cryptosystem in the CPK has the advantages of short key length, fast calculation speed and small occupied bandwidth, which is very suitable for the hardware environment of RFID system with limited performance. It also ensures the security of the keys used in the access of the IoT terminal equipment to the authentication, and achieves overall optimization of speed, energy consumption, processing capacity and security.

[1]  Yuxi Liu,et al.  Key Technologies and Applications of Internet of Things , 2012, 2012 Fifth International Conference on Intelligent Computation Technology and Automation.

[2]  Norbert Felber,et al.  ECC Is Ready for RFID - A Proof in Silicon , 2008, Selected Areas in Cryptography.

[3]  Liu Yang,et al.  IOT Secure Transmission Based on Integration of IBE and PKI/CA , 2013 .

[4]  Hwajeong Seo,et al.  Implementation of an RFID Key Management System for DASH7 , 2014, J. Inform. and Commun. Convergence Engineering.

[5]  Zhang Jian-hua Research and security analysis on open RFID mutual authentication protocol , 2013 .

[6]  Wei Shi-min An Improved Elliptic Curve Digital Signature Algorithm , 2013 .

[7]  S. Micali,et al.  NOVOMODO : Scalable Certificate Validation and Simplified PKI Management , 2002 .

[8]  Mike Burmester,et al.  Robust, anonymous RFID authentication with constant key-lookup , 2008, ASIACCS '08.

[9]  Zhang Bin Study on Hybrid Key Management Mechanisms of RFID System Based on PKI and CPK , 2015 .

[10]  Hu Junru The improved elliptic curve digital signature algorithm , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.