WO2024021060A1 - 认证方法和设备 - Google Patents
认证方法和设备 Download PDFInfo
- Publication number
- WO2024021060A1 WO2024021060A1 PCT/CN2022/109094 CN2022109094W WO2024021060A1 WO 2024021060 A1 WO2024021060 A1 WO 2024021060A1 CN 2022109094 W CN2022109094 W CN 2022109094W WO 2024021060 A1 WO2024021060 A1 WO 2024021060A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sequence
- key
- downlink
- service command
- scrambling code
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 244
- 238000004422 calculation algorithm Methods 0.000 claims description 189
- 230000006854 communication Effects 0.000 claims description 120
- 238000004891 communication Methods 0.000 claims description 119
- 238000012545 processing Methods 0.000 claims description 102
- 230000008569 process Effects 0.000 claims description 98
- 230000015654 memory Effects 0.000 claims description 40
- 238000004590 computer program Methods 0.000 claims description 32
- 238000004364 calculation method Methods 0.000 claims description 27
- 238000003860 storage Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 description 38
- 125000004122 cyclic group Chemical group 0.000 description 37
- 238000003672 processing method Methods 0.000 description 27
- 230000011664 signaling Effects 0.000 description 26
- 238000010586 diagram Methods 0.000 description 17
- 238000005516 engineering process Methods 0.000 description 17
- 230000003993 interaction Effects 0.000 description 13
- 238000001228 spectrum Methods 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 7
- 238000003306 harvesting Methods 0.000 description 7
- 238000012360 testing method Methods 0.000 description 7
- 238000011144 upstream manufacturing Methods 0.000 description 6
- 101100117236 Drosophila melanogaster speck gene Proteins 0.000 description 5
- 230000007774 longterm Effects 0.000 description 5
- 239000011159 matrix material Substances 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 230000001413 cellular effect Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 230000005284 excitation Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 238000004220 aggregation Methods 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 2
- 230000003190 augmentative effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 238000005242 forging Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005674 electromagnetic induction Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000017105 transposition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the present application relates to the field of communications, and more specifically, to an authentication method and device.
- Embodiments of the present application provide an authentication method, equipment, computer-readable storage media, computer program products, and computer programs.
- the embodiment of this application provides an authentication method, including:
- the first device receives a downlink signal; the downlink signal carries first information, and the first information is generated by the second device based on the first key;
- the first device authenticates the first information carried in the received downlink signal based on a first sequence and obtains an authentication result; the first sequence is generated based on the second key.
- the embodiment of this application provides an authentication method, including:
- the second device sends a downlink signal; the downlink signal carries first information, and the first information is generated by the second device based on the first key; the first information is used for the first device to perform authentication and obtain an authentication result.
- the embodiment of the present application provides a first device, including:
- a first communication unit configured to receive downlink signals; the downlink signals carry first information, and the first information is generated by the second device based on the first key;
- the first processing unit is configured to authenticate the first information carried in the received downlink signal based on a first sequence and obtain an authentication result; the first sequence is generated based on the second key.
- This embodiment of the present application provides a second device, including:
- the second communication unit is used to send downlink signals; the downlink signals carry first information, and the first information is generated by the second device based on the first key; the first information is used for authentication by the first device, Get certification results.
- An embodiment of the present application provides a first device, including a processor and a memory.
- the memory is used to store computer programs, and the processor is used to call and run the computer program stored in the memory, so that the first device performs the above method.
- This embodiment of the present application provides a second device, including a processor and a memory.
- the memory is used to store computer programs, and the processor is used to call and run the computer program stored in the memory, so that the second device performs the above method.
- An embodiment of the present application provides a chip for implementing the above method.
- the chip includes: a processor, configured to call and run a computer program from a memory, so that the device installed with the chip executes the above method.
- Embodiments of the present application provide a computer-readable storage medium for storing a computer program, which when the computer program is run by a device, causes the device to perform the above method.
- An embodiment of the present application provides a computer program product, which includes computer program instructions, and the computer program instructions cause a computer to execute the above method.
- An embodiment of the present application provides a computer program that, when run on a computer, causes the computer to perform the above method.
- the first device authenticates the downlink signal carrying the first information based on the first sequence, and obtains the authentication result; where the first information is generated by the second device based on the first key. , the first sequence is generated based on the second key. In this way, since the key is used for authentication processing, computing attacks can be avoided and the security of the authentication processing is ensured.
- Figure 1 is a schematic diagram of an application scenario according to an embodiment of the present application.
- FIG. 2 is a schematic flowchart 1 of an authentication method according to an embodiment of the present application.
- FIG. 3 is a schematic flowchart 2 of an authentication method according to an embodiment of the present application.
- FIG. 4 is a schematic flowchart three of an authentication method according to an embodiment of the present application.
- FIG. 5 is a schematic flowchart 4 of an authentication method according to an embodiment of the present application.
- Figure 6 is a schematic flow chart 5 of an authentication method according to an embodiment of the present application.
- FIG. 7 is a schematic flowchart 6 of an authentication method according to an embodiment of the present application.
- Figure 8 is a schematic diagram of an attack scenario according to an embodiment of the present application.
- Figure 9 is a schematic diagram comparing the probability curves of missed alarms when using various numbers of antennas according to the present application.
- Figure 10 is a schematic diagram of the legal signal power and miss alarm probability curves under the condition of various antenna numbers according to the present application.
- Figure 11 is a schematic block diagram of a first device according to an embodiment of the present application.
- Figure 12 is a schematic block diagram of a second device according to an embodiment of the present application.
- Figure 13 is a schematic block diagram of a second device according to another embodiment of the present application.
- Figure 14 is a schematic diagram of a zero-power communication system based on backscattering according to an embodiment of the present application.
- Figure 15 is a schematic scenario diagram of a hybrid zero-power communication system based on cellular and/or sideline communication according to an embodiment of the present application.
- Figure 16 is a schematic block diagram of a communication device according to an embodiment of the present application.
- Figure 17 is a schematic block diagram of a chip according to an embodiment of the present application.
- Figure 18 is a schematic block diagram of a communication system according to an embodiment of the present application.
- GSM Global System of Mobile communication
- CDMA Code Division Multiple Access
- WCDMA broadband code division multiple access
- GPRS General Packet Radio Service
- LTE Long Term Evolution
- LTE-A Advanced long term evolution
- NR New Radio
- NTN Non-Terrestrial Networks
- UMTS Universal Mobile Telecommunication System
- WLAN Wireless Local Area Networks
- WiFi wireless fidelity
- 5G fifth-generation communication
- the communication system in the embodiment of the present application can be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, a dual connectivity (Dual Connectivity, DC) scenario, or an independent ( Standalone, SA) network deployment scenario.
- CA Carrier Aggregation
- DC Dual Connectivity
- SA Standalone
- the communication system in the embodiment of the present application can be applied to unlicensed spectrum, where the unlicensed spectrum can also be considered as shared spectrum; or, the communication system in the embodiment of the present application can also be applied to Licensed spectrum, where licensed spectrum can also be considered as unshared spectrum.
- the embodiments of this application describe various embodiments in combination with network equipment and terminal equipment.
- the terminal equipment may also be called user equipment (User Equipment, UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user device, etc.
- User Equipment User Equipment
- the terminal device can be a station (ST) in the WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, or a personal digital processing unit.
- ST station
- SIP Session Initiation Protocol
- WLL Wireless Local Loop
- PDA Personal Digital Assistant
- the terminal device can be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted; it can also be deployed on water (such as ships, etc.); it can also be deployed in the air (such as aircraft, balloons and satellites). superior).
- the terminal device may be a mobile phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiver function, a virtual reality (Virtual Reality, VR) terminal device, or an augmented reality (Augmented Reality, AR) terminal.
- the terminal device may also be a wearable device.
- Wearable devices can also be called wearable smart devices. It is a general term for applying wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes, etc.
- a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are not just hardware devices, but also achieve powerful functions through software support, data interaction, and cloud interaction.
- wearable smart devices include full-featured, large-sized devices that can achieve complete or partial functions without relying on smartphones, such as smart watches or smart glasses, and those that only focus on a certain type of application function and need to cooperate with other devices such as smartphones.
- the network device may be a device used to communicate with mobile devices.
- the network device may be an access point (Access Point, AP) in WLAN, or a base station (Base Transceiver Station, BTS) in GSM or CDMA.
- BTS Base Transceiver Station
- it can be a base station (NodeB, NB) in WCDMA, or an evolutionary base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, a wearable device, and an NR network network equipment (gNB) or network equipment in the future evolved PLMN network or network equipment in the NTN network, etc.
- AP Access Point
- BTS Base Transceiver Station
- NodeB, NB base station
- Evolutional Node B, eNB or eNodeB evolution base station
- gNB NR network network equipment
- the network device may have mobile characteristics, for example, the network device may be a mobile device.
- the network device can be a satellite or balloon station.
- the satellite can be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a geosynchronous orbit (geostationary earth orbit, GEO) satellite, a high elliptical orbit (High Elliptical Orbit, HEO) satellite ) satellite, etc.
- the network device may also be a base station installed on land, water, etc.
- network equipment can provide services for a cell, and terminal equipment communicates with the network equipment through transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell.
- the cell can be a network equipment ( For example, the cell corresponding to the base station), the cell can belong to the macro base station, or it can belong to the base station corresponding to the small cell (Small cell).
- the small cell here can include: urban cell (Metro cell), micro cell (Micro cell), pico cell ( Pico cell), femto cell (Femto cell), etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-rate data transmission services.
- FIG. 1 illustrates a communication system 100.
- the communication system includes a network device 110 and two terminal devices 120.
- the communication system 100 may include multiple network devices 110 , and the coverage of each network device 110 may include other numbers of terminal devices 120 , which is not limited in this embodiment of the present application.
- the communication system 100 may also include other network entities such as a Mobility Management Entity (MME), an Access and Mobility Management Function (AMF), etc.
- MME Mobility Management Entity
- AMF Access and Mobility Management Function
- network equipment may include access network equipment and core network equipment. That is, the wireless communication system also includes multiple core networks used to communicate with access network equipment.
- the access network equipment can be a long-term evolution (long-term evolution, LTE) system, a next-generation (mobile communication system) (next radio, NR) system or authorized auxiliary access long-term evolution (LAA- Evolutionary base station (evolutional node B, abbreviated as eNB or e-NodeB) macro base station, micro base station (also known as "small base station"), pico base station, access point (access point, AP), Transmission point (TP) or new generation base station (new generation Node B, gNodeB), etc.
- LTE long-term evolution
- NR next-generation
- LAA- Evolutionary base station evolutional node B, abbreviated as eNB or e-NodeB
- eNB next-generation
- NR next-generation
- LAA- Evolutionary base station evolutional node B, abbreviated as eNB or e-NodeB
- the communication equipment may include network equipment and terminal equipment with communication functions.
- the network equipment and terminal equipment may be specific equipment in the embodiments of the present application, which will not be described again here; the communication equipment also It may include other devices in the communication system, such as network controllers, mobility management entities and other network entities, which are not limited in the embodiments of this application.
- the "instruction” mentioned in the embodiments of this application may be a direct instruction, an indirect instruction, or an association relationship.
- a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also mean that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association between A and B. relation.
- radio frequency identification (RFID, Radio Frequency Identification) authentication protocols of upper-layer cryptography are roughly divided into five categories according to the calculation overhead and the operations supported by the tag: the first category is highly complex
- the second type is a protocol of general complexity, and the authentication protocol label of this type needs to support a random number generator and a one-way hash function;
- the third type is a lightweight protocol, which The tags in the first type of authentication protocol need to support the National Institute of Standards and Technology (NIST) lightweight encryption algorithm;
- the fourth type is a lightweight protocol, which means that only random numbers are required in the authentication protocol.
- the above-mentioned authentication scheme based on upper-layer cryptography may have problems such as being unable to resist computing attacks, consuming additional communication overhead, and reducing data throughput.
- the authentication scheme based on upper-layer cryptography essentially determines whether there is an attack by verifying whether the parameters meet the preset matching conditions. Its security comes from the difficulty of solving mathematical problems; the attacker can obtain the encryption key. Verification materials may be cracked if the attacker improves their computing power. Therefore, the above-mentioned authentication scheme of upper-layer cryptography may be unable to resist computing attacks.
- the authentication scheme based on upper-layer cryptography requires the exchange of some additional message bits carrying identity verification information between the legitimate communication parties. In a zero-power system based on small data packets, deploying an authentication scheme based on upper-layer cryptography The authentication scheme will consume a lot of additional communication overhead and reduce data throughput.
- correlate can mean that there is a direct correspondence or indirect correspondence between the two, it can also mean that there is an associated relationship between the two, or it can mean indicating and being instructed, configuration and being. Configuration and other relationships.
- FIG 2 is a schematic flow chart of an authentication method according to an embodiment of the present application. This method can optionally be applied to the system shown in Figure 1, but is not limited thereto. The method includes at least part of the following.
- the first device receives a downlink signal; the downlink signal carries first information, and the first information is generated by the second device based on the first key;
- the first device authenticates the first information carried in the received downlink signal based on a first sequence, and obtains an authentication result; the first sequence is generated based on the second key.
- FIG 3 is a schematic flow chart of an authentication method according to another embodiment of the present application. This method can optionally be applied to the system shown in Figure 1, but is not limited thereto. The method includes at least part of the following.
- the second device sends a downlink signal; the downlink signal carries first information, and the first information is generated by the second device based on the first key; the first information is used for authentication by the first device, and the authentication is obtained result.
- the first device and the second device may vary with different scenarios.
- the first device may be a zero-power consumption device, such as a Tag
- the second device may be a Reader.
- the second device i.e., reader
- the first device Devices can be Internet of Things (IoT) devices, Passive Internet of Things (Passive IoT) devices, etc.
- IoT Internet of Things
- Passive IoT Passive Internet of Things
- the aforementioned second device may be a network device, and the network device may specifically be an access network device (such as a base station, eNB, gNB, etc.). Further, the second device may be a network device equipped with multiple antennas. Specifically, the second device may be an access network device equipped with multiple antennas.
- the processing of the second device may also include: the second device sends authentication request signaling to the first device; the authentication request signaling may be For powering the first device and for the first device to determine to start entering the authentication process.
- the processing by the first device may also include: the first device receives the authentication request signaling sent by the second device, and starts entering the authentication processing process. This is because the first device is a zero-power consumption device, so the second device needs to send power to the first device by sending the authentication request signaling to the first device and enable the first device to start the authentication process.
- the authentication process may include the first device performing the aforementioned processing of S210 to S220, and correspondingly, the second device performing the aforementioned processing of S310.
- the aforementioned S310 can be directly performed, that is, the downlink signal is directly sent; accordingly, the first device performs the aforementioned S210.
- the first device may also include: the first device processes the second key based on a preset algorithm to obtain a third sequence; The first device sends the first pilot carrying the third sequence.
- the second device receives the first pilot.
- the second key may be pre-configured on the first device.
- the second key may be unchanged; in another example, the second key may be a key obtained based on a key stream generator.
- the preset algorithm may be set according to actual conditions, and the preset algorithm may be one of the following: a random number algorithm or a cryptographic algorithm.
- the random number algorithm can be: an algorithm specified in the Electronic Product Code (EPCTM) protocol, which can be specifically implemented by a pseudo-random number generator specified in the protocol, which is not limited here.
- the cryptographic algorithm may be: a lightweight cryptographic algorithm; for example, the lightweight cryptographic algorithm may include any one of the following: SPECK algorithm, SIMON algorithm; it should be understood that this is only a description of the cryptographic algorithm.
- any other type of cryptographic algorithm can be used in actual processing, which is within the protection scope of this embodiment, but is not exhaustive.
- the first device processes the second key based on the preset algorithm to obtain the third sequence.
- the preset algorithm is a random number algorithm, specifically implemented based on a pseudo-random number generator
- the first device processes the second key based on the preset algorithm to obtain the third sequence.
- the following can be used Formula implementation: s PRNG(K 2 ); where K 2 represents the second key; PRNG( ⁇ ) represents the random number algorithm used by the pseudo-random number generator; s represents the third sequence.
- the preset algorithm is a lightweight cryptographic algorithm
- the first device processes the second key based on the preset algorithm to obtain the third sequence.
- the first device and the second device need to use the same preset algorithm in the processing process.
- both the first device and the second device The SIMON algorithm is used.
- the first device and the second device both use the random number algorithm. As long as the first device and the second device use the same preset algorithm, it is within the protection scope of the embodiments of this application. This does not apply to all Possible situations are exhausted.
- the first device sending the first pilot carrying the third sequence may refer to: the first device performs signal modulation to generate and send the first pilot based on the third sequence.
- the first pilot may be obtained by modulating the third sequence onto the carrier.
- the specific modulation method is not limited in this embodiment.
- the downlink signal sent by the second device can carry different contents according to different scenarios.
- the first device will also perform different processing based on the downlink signal carrying different contents.
- the following is a description of various implementation methods based on different scenarios:
- the downlink signal only carries the first information.
- the first information is generated by the second device based on a second sequence, and the second sequence is generated based on the first key.
- the second device receives the first pilot; after receiving the first pilot, the second device performs the aforementioned S310.
- the first information is generated by the second device based on a channel estimation value and a second sequence; the channel estimation value is a channel estimation performed by the second device on the received first pilot based on the second sequence. owned.
- the second device sends a downlink signal, which may include: the second device processes the first key based on a preset algorithm to obtain a second sequence; the second device processes the first key based on the preset algorithm; Two sequences, generating first information; the second device sends the downlink signal carrying the first information.
- the second device generates the first information based on the second sequence, including: the second device performs channel estimation on the received first pilot based on the second sequence to obtain a channel estimate value; The second device generates first information based on the second sequence and the channel estimate value.
- the dimension of the channel estimate value is related to the number of antennas of the second device.
- the first pilot received by the second device is a signal containing Gaussian noise on the second device side after channel transmission.
- the first pilot received by the second device can be expressed as:
- Y R is the first pilot received by the second device
- H TR can be the channel estimation matrix between the first device and the second device
- r is the number of antennas of the second device, r is a positive integer greater than or equal to 1
- N R is the Gaussian noise on the second device side, and is the noise power
- s is the third sequence carried by the first pilot.
- the preset algorithm is the same as the preset algorithm used by the first device. The details have been described in the foregoing embodiments and will not be described again here.
- the first key is a key preset on the second device side.
- the first key is the same as the aforementioned second key.
- the first key may be unchanged.
- the first key may be a key obtained based on the key stream generator; it should be understood that if the second key is a key obtained based on the key stream generator, the first key is also is the key obtained by the key stream generator, that is, the first device and the second device generate keys respectively.
- the keys generated by the two devices in one interaction are the same, for example, in the first A device generates a second key based on the key stream generator for the first time, and generates and sends a first pilot based on the second key; correspondingly, when the second device receives the first pilot, it generates a second key based on the key stream.
- the generator generates the first key for the first time. Since in this interaction, the first device and the second device both generate keys for the first time, the second key and the first key should theoretically be the same. .
- the second device processes the first key based on a preset algorithm to obtain the second sequence. Specifically, the second device directly calculates the first key based on the preset algorithm to obtain the second sequence.
- the aforementioned second sequence can be specifically expressed as: Among them, s R represents the second sequence, L is the length of the second sequence, and the length of the second sequence is the same as the length of the aforementioned third sequence; Represents the value of the nth bit in the second sequence, n is an integer greater than or equal to 1 and less than or equal to L, that is to say then represents the value of each bit in the second sequence; if the second key is the same as the first key and uses the same preset algorithm, then the value of the nth bit in the second sequence Should be the same as the value s tn of the nth position in the third sequence.
- the preset algorithm is a lightweight cryptographic algorithm
- the second device performs channel estimation on the received first pilot based on the second sequence to obtain a channel estimate value.
- the second device may combine the received first pilot with the aforementioned second sequence. Divide to obtain the channel estimate.
- the channel estimate obtained by the second device is expressed as If the second sequence generated by the second device is the same as the third sequence in the first pilot, the obtained channel estimate value It should be approximate to the aforementioned channel estimation matrix H TR .
- the second device can be a network device, specifically an access network device, such as any one of a base station, eNB, and gNB; the access network device usually has multiple antennas, so this embodiment
- the second device may be a device with multiple antennas. Assuming that the number of antennas of the second device is r, then the aforementioned channel estimate
- the dimensions of the aforementioned channel estimation matrix H are all r (r is a positive integer greater than or equal to 1).
- the channel estimation value is expressed as: Assume that the i-th bit in the channel estimate value is expressed as The i-th bit can represent the channel estimation value corresponding to the i-th antenna, i is an integer greater than or equal to 1 and less than or equal to r, the The length is equal to L.
- the second device generates the first information based on the second sequence and the channel estimate value, which may be: the second device performs a function on the second sequence and the channel estimate value based on a first preset function. Calculate and generate the first information.
- the first preset function can be expressed as ⁇
- the corresponding first information X can be expressed as:
- the calculation of the first preset function may be to divide the second sequence by the channel estimate value corresponding to each antenna in the channel estimate value, and then the process of obtaining the first information X may be expressed by the following formula:
- n is an integer greater than or equal to 1 and less than or equal to L, that is to say then represents the value of each bit in the second sequence; to Any one of them can be expressed as The description is also the same as that of the previous embodiment and will not be repeated.
- the second device may carry the first information through a downlink signal and send it to the first device.
- the downlink signal may be a radio frequency signal.
- the second device may carry the first information in the downlink signal through modulation. The specific modulation method is not limited here.
- the first device After the first device receives the downlink signal, the aforementioned S220 can be performed.
- the first device authenticates the first information carried in the received downlink signal based on the first sequence, and obtains the authentication result, which includes: When the similarity between the first sequence and the first information carried in the received downlink signal satisfies the preset conditions, the first device determines that the authentication result is authentication passed; and/ Or, if the similarity between the first sequence and the first information carried in the received downlink signal does not meet a preset condition, the first device determines that the authentication result is Authentication failed.
- the first sequence is the same as the aforementioned third sequence. That is to say, the aforementioned first device can generate the third sequence when executing S210 and save the third sequence; when the first device executes S220, the third sequence can be generated by the first device.
- the third sequence serves as the first sequence, and the first information in the received downlink signal is authenticated based on the first sequence to obtain an authentication result.
- the first sequence and the third sequence are the same, for the sake of understanding, the first sequence is represented as s T .
- the downlink signal received by the first device is different from the downlink signal sent by the second device. This is because the downlink signal received by the first device is also a downlink signal transmitted through the channel.
- H RT H TR , that is, the channel estimation matrices on the first device side and the second device side are the same.
- the similarity between the first sequence and the first information carried in the received downlink signal may be calculated based on Euclidean distance, or may be based on cosine similarity. , or the similarity can be calculated based on the Manhattan distance, or the similarity can be calculated based on the Chebyshev distance, or the similarity can be calculated based on the Jaccard distance, or other methods can be used to calculate the similarity. This is not exhaustive.
- the preset condition may be that the similarity is within a preset certain range. The corresponding preset condition may be set according to the actual similarity calculation method, which is not limited in this embodiment.
- the method further includes: the first device performs calculation based on the first sequence and the first information carried in the received downlink signal to obtain a first value; If the first value is within a preset threshold range, the similarity between the first sequence and the first information carried in the received downlink signal is determined to satisfy the preset condition. In addition, it may also include: when the first value is not within a preset threshold range, determining the similarity between the first sequence and the first information carried in the received downlink signal, The preset conditions are not met.
- the first device performs calculation based on the first sequence and the first information in the received downlink signal to obtain a first value, where the calculation may use the following formula: in, represents the real part; y T represents the first information, and its representation method has been explained in the previous embodiments and will not be repeated; s T represents the first sequence, s T T represents the transposition of the first sequence; t represents the first numerical value .
- y T s R + NT
- s R is a real number
- s R and s T T are directly multiplied to a real number
- N T is the Gaussian noise on the first device side, which may be a complex number
- the multiplication of N T s T T may have an imaginary part, so use Indicates that only the real part after multiplication calculation is retained.
- the downlink signal (or the first information in the downlink signal) originates from a legal reader/writer (i.e., a legal second device);
- the downlink signal (or the first information in the downlink signal) does not originate from a legal reader/writer (i.e. a legal second device);
- the aforementioned first value i.e. t
- the mean value of t is the product of s R and s T T
- the variance is in, Specifically it can be About L and The description is the same as the previous embodiment and will not be repeated.
- the aforementioned preset threshold range can be obtained based on a given target false alarm probability.
- the target false alarm probability can be set according to the actual situation. For example, it can be less than 0.05, or less than 0.01, or larger or smaller. This is not correct. It is limited.
- the first device side determines whether the first value t calculated from the received downlink signal and the first sequence generated locally by the first device is within the preset threshold range; if it is within the preset threshold range, it is determined is true, determine the similarity between the first sequence and the first information in the received downlink signal, satisfy the preset condition, and then determine that the authentication result is authentication passed. In addition, if it is not within the preset threshold range, determine the similarity between the first sequence and the first information in the received downlink signal, and the preset condition is not met, and then determine the authentication result. Authentication failed.
- the aforementioned preset threshold range may be less than or equal to a preset value ⁇ ; correspondingly, if the first device determines that the aforementioned first value t is less than ⁇ , it determines that the first value t is within the preset threshold range.
- the aforementioned S310 can be directly performed, that is, the downlink signal is directly sent; accordingly, the first device performs the aforementioned S210.
- the first information may only include the aforementioned second sequence.
- the second device sending a downlink signal includes: the second device processes the first key based on a preset algorithm to obtain a second sequence; the second device generates first information based on the second sequence; The second device sends the downlink signal carrying the first information.
- the generation method of the second sequence is the same as the previous embodiment and will not be described again here.
- the way in which the first device generates the first sequence after receiving the downlink signal, and the process of authenticating the first information carried in the received downlink signal based on the first sequence is consistent with the previous embodiment. are all the same, except that in this embodiment, the aforementioned first information
- the first value When the first value is calculated based on the first information, the first value may be different from the foregoing value, and the preset threshold range adopted may be different, and is not specifically limited.
- the processing by the first device may further include: when the authentication result is authentication passed, the first device sends an uplink signal carrying the first uplink service data.
- the processing by the second device may further include: the second device receiving an uplink signal carrying the first uplink service data sent by the first device.
- the first device when the authentication result is that the authentication is passed, sends an uplink signal carrying the first uplink service data. Specifically, it may include: when the authentication result is that the authentication is passed, the first device sends an uplink signal carrying the first uplink service data. The first device determines whether there is uplink service data to be transmitted, and if so, uses the uplink service data to be transmitted as the first uplink service data, and sends an uplink signal carrying the first uplink service data.
- the first device performs authentication based on the aforementioned downlink signal and the authentication result is that the authentication is passed, it can be confirmed that the second device is a legal device. Therefore, the first device can be used when there is uplink service data to be transmitted.
- the uplink service data is carried in the uplink signal and sent to the second device; accordingly, after receiving the uplink signal carrying the first uplink service data, the second device can parse the uplink signal and obtain the first result of this transmission.
- the upstream business data is subjected to subsequent processing. The possible processing will not be described in detail here.
- it may also include: when the authentication result is authentication failure, the first device may end the processing and wait for the next reception of the authentication request signaling to perform the next processing.
- S401 The reader/writer sends authentication request signaling to the tag.
- the authentication request signaling is used to power the tag and enable the tag to start the authentication process.
- S402 The tag sends the first pilot to the reader.
- the specific description of the sequence and sending the first pilot is the same as in the previous embodiment, and will not be repeated.
- the reader/writer processes the first key based on the preset algorithm to obtain a second sequence, performs channel estimation on the received first pilot based on the second sequence, and obtains a channel estimate value, based on the second sequence and the channel estimate value to generate first information.
- the specific description of Y R is the same as the previous embodiment. To elaborate.
- the descriptions about the first key and the second key are the same as those in the previous embodiments and will not be repeated; the generation methods of the channel estimation value, the second sequence and the first information are the same as those in the previous embodiments. No further details will be given.
- the reader/writer sends a downlink signal; the downlink signal carries first information, and the first information is generated by the second device based on the first key.
- the first information is generated by the second device based on a second sequence, and the second sequence is generated based on the first key. Specifically, the first information is generated by the second device based on the channel estimation value and the second sequence; the channel estimation value is the first pilot received by the second device based on the second sequence. Obtained by channel estimation.
- the tag authenticates the first information carried in the received downlink signal based on the first sequence, and obtains an authentication result; the first sequence is the same as the third sequence.
- the method to check whether the pilot sequence originates from a legitimate reader is to determine whether the test statistic t calculated from the received signal and the local private pilot is within the threshold range. When t ⁇ , it is judged to be true and the downlink service is executed. command; otherwise false, authentication fails.
- the tag can confirm that the reader/writer is a legal reader/writer, and then send an uplink signal carrying the first uplink service data.
- the reader/writer receives the uplink signal carrying the first uplink service data sent by the tag, and the reader/writer can perform subsequent processing on the first uplink service data, which will not be described in detail here.
- the downlink signal in addition to carrying the first information, also carries a first downlink service command.
- the first downlink service command is an original downlink service command sent by the second device to the first device; its specific content is not limited in this embodiment.
- the second device receives the first pilot; after receiving the first pilot, the second device performs the aforementioned S310.
- the first information is generated by the second device based on a channel estimation value and a second sequence; the channel estimation value is a channel estimation performed by the second device on the received first pilot based on the second sequence. owned.
- the second device sends a downlink signal, which may include: the second device processes the first key based on a preset algorithm to obtain a second sequence; the second device based on the second sequence, Generate first information; the second device sends the downlink signal carrying the first information.
- the second device generates the first information based on the second sequence, including: the second device performs channel estimation on the received first pilot based on the second sequence to obtain a channel estimate value; The second device generates first information based on the second sequence and the channel estimate value.
- first pilot received by the second device is the same as in the previous embodiment, and will not be repeated; it should be understood that in this embodiment, the first pilot received by the second device is also Same as the previous embodiment, it can be expressed as: The parameter definitions are also the same as those in the previous embodiment and will not be described again.
- the second sequence is generated by the second device based on the first key and the first downlink service command.
- the second device processes the first key based on the preset algorithm to obtain the second sequence, including: the second device processes the first key and the first key based on the preset algorithm.
- the downlink service command is processed to obtain the second sequence.
- Processing the downlink service command to obtain the second sequence may include: the second device calculates a first cyclic redundancy check code based on the first downlink service command; and based on the random number algorithm, The first key and the first cyclic redundancy check code are calculated to obtain the second sequence.
- the first cyclic redundancy check code calculated by the second device based on the first downlink service command may be generated by using a preset cyclic redundancy encoder, and the preset cyclic redundancy encoder may It is a cyclic redundancy encoder inherent or specified in the EPC protocol, and this embodiment does not limit its specific processing method.
- the second device processes the first key and the first downlink service command based on the preset algorithm to obtain the second sequence.
- the second sequence may include: the second device calculates the first key and the first downlink service command based on the lightweight cryptographic algorithm to obtain the second sequence.
- the second sequence obtained based on the processing of this embodiment can be expressed in the same specific manner as the aforementioned second sequence, which is also: Regarding the specific definitions of the parameters, we will not repeat them here.
- the second device performs channel estimation on the received first pilot based on the second sequence to obtain a channel estimate value.
- the second device may combine the received first pilot with the aforementioned second sequence. Divide to obtain the channel estimate.
- the channel estimate obtained by the second device is expressed as If the second sequence generated by the second device is the same as the third sequence in the first pilot, the obtained channel estimate value It should be approximate to the aforementioned channel estimation matrix H TR .
- this embodiment is compared with the aforementioned processing method of generating the second sequence based only on the first key. Since the second sequence is generated in a different manner, the channel estimation value obtained by the second device is different from the aforementioned embodiment. However, regarding The specific processing method for the second device to obtain the channel estimate value is the same as the previous embodiment, so the specific processing method will not be repeated.
- the second device generates the first information based on the second sequence and the channel estimate value, which may be: the second device performs a function on the second sequence and the channel estimate value based on a first preset function. Calculate and generate the first information.
- the first preset function can be expressed as ⁇
- the corresponding first information X can be expressed as: The specific description is the same as the previous embodiment and will not be repeated.
- this embodiment has a different generation method of the second sequence, so the specific content of the first information obtained by the second device is different from the previous embodiment. , but the specific processing method for the second device to obtain the first information and the first preset function are the same as those in the previous embodiment, so the description will not be repeated.
- the second device may carry the first information through the first signal part of the downlink signal, carry the first downlink service command through the second signal part of the downlink signal, and send the downlink signal to the first device.
- the downlink signal may be a radio frequency signal
- the second device may carry the first information and the first downlink service command in the downlink signal through modulation
- the downlink signal may be a portion of the first signal in the time domain.
- the second signal part for example, the first signal part may be transmitted first and then the second signal part, or vice versa, both are within the protection scope of this embodiment, and the specific modulation method used by the second device is not limited here.
- the aforementioned S220 can be performed.
- the first device authenticates the first information carried in the received downlink signal based on the first sequence, and obtains an authentication result.
- the first sequence is different from the aforementioned third sequence.
- the way in which the first device generates the first sequence may include: the first device generates the second key and the first downlink service based on a preset algorithm. The command is processed to obtain the first sequence.
- the first device processes the second key and the first downlink service command based on a preset algorithm. Before obtaining the first sequence, it may include: the first device obtains the first sequence from the received downlink signal. First issue a business command.
- the second cyclic redundancy check code calculated by the first device based on the first downlink service command may be generated by using a preset cyclic redundancy encoder, and the preset cyclic redundancy encoder may It is a cyclic redundancy encoder inherent or specified in the EPC protocol, and this embodiment does not limit its specific processing method.
- the second cyclic redundancy check code CRC (Command 1 ) 2 should be the same as the first downlink service command. Cyclic redundancy check code CRC(Command 1 ) 1 is the same.
- the first sequence may include: the first device calculates the second key and the first downlink service command based on the lightweight cryptographic algorithm to obtain the first sequence.
- the downlink signal received by the first device is different from the downlink signal sent by the second device. This is because the downlink signal received by the first device is also a downlink signal transmitted through the channel.
- H RT H TR
- the first device authenticates the first information in the received downlink signal based on the first sequence, and the process of obtaining the authentication result is also the same as in the previous embodiment, and will not be described again.
- the aforementioned S310 can be directly performed, that is, the downlink signal is directly sent; accordingly, the first device performs the aforementioned S210.
- the downlink signal carries the first information and the first downlink service command; the first information may only include the aforementioned second sequence.
- the generation method of the second sequence which is generated by the second device based on the first key and the first downlink service command
- the specific description is the same as the previous embodiment, and will not be described again here.
- the way in which the first device generates the first sequence after receiving the downlink signal, and the process of authenticating the first information carried in the received downlink signal based on the first sequence is consistent with the previous embodiment.
- the aforementioned first information When the information is calculated and the first value is obtained, the first value may be different from the aforementioned value, and the preset threshold range adopted may be different, and the specific value is not limited.
- the processing by the first device may further include: when the authentication result is authentication passed, the first device executes the first downlink service command. In addition, it may also include: when the authentication result is authentication failure, the first device may end the processing and wait for the next reception of the authentication request signaling to perform the next processing.
- the first device may also include: when the authentication result is authentication passed, the first device sends an uplink signal carrying the first uplink service data.
- the processing by the second device may further include: the second device receiving an uplink signal carrying the first uplink service data sent by the first device.
- S501 The reader/writer sends authentication request signaling to the tag.
- the authentication request signaling is used to power the tag and enable the tag to start the authentication process.
- S502 The tag sends the first pilot to the reader.
- the reader/writer processes the first key and the first downlink service command based on the preset algorithm to obtain a second sequence; performs channel estimation on the received first pilot based on the second sequence, A channel estimate is obtained; and first information is generated based on the second sequence and the channel estimate.
- the specific description of the first pilot received by the reader/writer is the same as in the previous embodiment, and will not be described again. Among them, the descriptions about the first key and the second key are the same as those in the previous embodiments and will not be repeated; the generation methods of the channel estimation value, the second sequence and the first information are the same as those in the previous embodiments. No further details will be given.
- the reader/writer sends a downlink signal; the downlink signal carries first information, and the first information is generated by the second device based on the first key; the downlink signal also carries a first downlink service command.
- the channel estimation value is obtained by the reader/writer performing channel estimation on the received first pilot based on the second sequence; the second sequence is generated by the reader/writer based on the first key.
- the process of the reader/writer generating the second sequence may include: the reader/writer processes the first key and the first downlink service command based on the preset algorithm to obtain the second sequence.
- the tag receives the downlink signal, processes the second key and the first downlink service command based on the preset algorithm, and obtains the first sequence.
- S506 The label authenticates the first information carried in the received downlink signal based on the first sequence, and obtains an authentication result; if the authentication result is authentication passed, perform S507; if the authentication result is authentication In case of failure, processing ends.
- the authentication processing method is the same as the previous embodiment and will not be described again.
- S507 The tag executes the first downlink service command.
- the downlink signal in addition to carrying the first information, also carries a first downlink service command.
- the first downlink service command is obtained by the second device scrambling the second downlink service command based on the first scrambling code; the first scrambling code is obtained by the second device based on the first encryption code. key generated.
- the second device receives the first pilot; after receiving the first pilot, the second device performs the aforementioned S310.
- the second device sends a downlink signal, which may include: the second device processes the first key based on a preset algorithm to obtain a second sequence; the second device based on the second sequence, Generate first information; the second device sends the downlink signal carrying the first information.
- the second device generates the first information based on the second sequence, including: the second device performs channel estimation on the received first pilot based on the second sequence to obtain a channel estimate value; The second device generates first information based on the second sequence and the channel estimate value.
- the specific description of the first pilot received by the second device is the same as the previous embodiment, and will not be repeated.
- the second sequence is generated by the second device based on the first key and the second downlink service command.
- the second device processes the first key based on the preset algorithm to obtain the second sequence, including: the second device processes the first key and the second key based on the preset algorithm.
- the downlink service command is processed to obtain the second sequence.
- obtaining the second sequence may include: the second device calculates a third cyclic redundancy check code based on the second downlink service command; and based on the random number algorithm, calculates the first key and The third cyclic redundancy check code is calculated to obtain the second sequence.
- the third cyclic redundancy check code calculated by the second device based on the second downlink service command may be generated using a preset cyclic redundancy encoder, and the preset cyclic redundancy encoder may be This embodiment does not limit the specific processing method of the cyclic redundancy encoder inherent or specified in the EPC protocol.
- the second device processes the first key and the second downlink service command based on the preset algorithm to obtain the second sequence.
- the method includes: the second device calculates the first key and the second downlink service command based on the lightweight cryptographic algorithm to obtain the second sequence.
- the second sequence obtained based on the processing of this embodiment can be expressed in the same specific manner as the aforementioned second sequence, which is also: The specific definitions of the parameters will not be repeated here.
- the second device performs channel estimation on the received first pilot based on the second sequence to obtain a channel estimate value.
- the second device may combine the received first pilot with the aforementioned second sequence. Divide to obtain the channel estimate.
- this embodiment is compared with the aforementioned processing method of generating the second sequence based only on the first key. Since the second sequence is generated in a different manner, the channel estimation value obtained by the second device is different from the aforementioned embodiment.
- the specific processing method for the second device to obtain the channel estimate value is the same as the previous embodiment, so the specific processing method will not be repeated.
- the second device generates the first information based on the second sequence and the channel estimate value, which may be: the second device performs a function on the second sequence and the channel estimate value based on a first preset function. Calculate and generate the first information.
- this embodiment has a different generation method of the second sequence, so the first information obtained by the second device is different from the aforementioned embodiment.
- the specific processing method by which the second device obtains the first information and the first preset function are the same as those in the previous embodiment, and therefore will not be repeatedly described.
- the second downlink service command is also scrambled.
- the specific method further includes: the second device generates a first scrambler based on the first key. code; the second device scrambles the second downlink service command based on the first scrambling code to obtain the first downlink service command.
- the process of generating the first scrambling code by the second device based on the first key may be implemented based on a cryptographic algorithm.
- the cryptographic algorithm can specifically be a lightweight cryptographic algorithm, such as SPECK, SIMON algorithm, etc., and we will not exhaustively list all possible cryptographic algorithms here.
- the aforementioned scrambling method may be a multiplication method.
- the second device scrambles the second downlink service command based on the first scrambling code to obtain the first downlink service command, which may be based on the first scrambling code. Multiplied by the second downlink service command, the first downlink service command is obtained. It should be understood that this is only an exemplary description, and other scrambling methods can also be used in actual processing, and this embodiment is not exhaustive.
- the same preset algorithm is used when generating the first sequence, the third sequence, and the second sequence on the first device and the second device side.
- the preset algorithm may also be lightweight. level cryptographic algorithm; the lightweight cryptographic algorithm used to generate the first scrambling code and the lightweight cryptographic algorithm used to generate the first sequence, the third sequence, and the second sequence can be the same or different, and can be based on the actual situation. The situation is set, and this embodiment does not limit it.
- the second device may carry the first information through the first signal part of the downlink signal, carry the first downlink service command through the second signal part of the downlink signal, and send the downlink signal to the first device.
- the specific sending method is the same as the previous embodiment and will not be described again.
- the aforementioned S220 can be performed.
- the first device authenticates the first information carried in the received downlink signal based on the first sequence, and obtains an authentication result.
- the first sequence is different from the aforementioned third sequence.
- the method for the first device to generate the first sequence may include: the first device generates the second key and the third sequence based on a preset algorithm. Three downstream service commands are processed to obtain the first sequence.
- the first device processes the second key and the third downlink service command based on a preset algorithm. Before obtaining the first sequence, it may include: the first device processes the second key and the third downlink service command based on a second scrambling code. The first downlink service command carried in the received downlink signal is descrambled to obtain a third downlink service command; wherein the second scrambling code is generated based on the second key.
- the method of generating the second scrambling code may include: the first device generating the second scrambling code based on the second key.
- the first device may implement the aforementioned process of generating the second scrambling code based on a cryptographic algorithm.
- the cryptographic algorithm used by the first device is the same as that of the aforementioned second device.
- the cryptographic algorithm can be a lightweight cryptographic algorithm, such as SPECK, SIMON algorithm, etc. All possible cryptographic algorithms are not exhaustive here. In the case where the second key and the first key of the first device and the second device are the same and the cryptographic algorithms used are the same, the second scrambling code and the first scrambling code should be the same.
- the third downlink service command obtained by descrambling by the first device should be the same as the second downlink service command sent by the second device.
- Processing the service command to obtain the first sequence may include: the first device calculates a fourth cyclic redundancy check code based on the third downlink service command; and based on the random number algorithm, calculates the fourth cyclic redundancy check code based on the third downlink service command.
- the second key and the fourth cyclic redundancy check code are calculated to obtain the first sequence.
- the fourth cyclic redundancy check code calculated by the first device based on the third downlink service command may be generated using a preset cyclic redundancy encoder, and the preset cyclic redundancy encoder may be This embodiment does not limit the specific processing method of the cyclic redundancy encoder inherent or specified in the EPC protocol.
- the fourth cyclic redundancy check code CRC (Command 3 ) 4 is the same as the aforementioned third cyclic redundancy check code CRC
- the check code CRC(Command 2 ) 3 should be the same.
- Obtaining the first sequence may include: the first device calculating the second key and the third downlink service command based on the lightweight cryptographic algorithm to obtain the first sequence.
- the downlink signal received by the first device is different from the downlink signal sent by the second device. This is because the downlink signal received by the first device is also a downlink signal transmitted through the channel.
- the first device authenticates the first information in the received downlink signal based on the first sequence, and the process of obtaining the authentication result is also the same as in the previous embodiment, and will not be described again.
- the aforementioned S310 can be directly performed, that is, the downlink signal is directly sent; accordingly, the first device performs the aforementioned S210.
- the downlink signal carries the first information and the first downlink service command; the first information may only include the aforementioned second sequence.
- the first downlink service command is obtained by scrambling the second downlink service command based on the first scrambling code by the second device; the first scrambling code is generated by the second device based on the first key.
- the specific description is the same as the previous embodiment.
- the generation method of the second sequence the second sequence is generated by the second device based on the first key and the second downlink service command.
- the way in which the first device generates the first sequence after receiving the downlink signal, and the process of authenticating the first information carried in the received downlink signal based on the first sequence, is consistent with the previous embodiment. are all the same, except that in this embodiment, the aforementioned first information
- the first value When the first value is calculated based on the first information, the first value may be different from the foregoing value, and the preset threshold range adopted may be different, and is not specifically limited.
- the processing by the first device may further include: when the authentication result is authentication passed, the first device executes the third downlink service command. It should be understood that if the aforementioned second key and first key are the same, and the first scrambling code and the second scrambling code are the same, then the third downlink service command should be the same as the original command issued by the second device, that is, the second downlink service command. The commands are the same.
- the first device may also include: when the authentication result is authentication failure, the first device may end the processing and wait for the next reception of the authentication request signaling to perform the next processing. In addition, if the first device passes the authentication, it can also send uplink service data to the second device. Specifically, the first device can include the following two methods:
- Method 1 When the authentication result is authentication passed, the first device sends an uplink signal carrying uplink service data. Specifically, when the authentication result is authentication passed, the first device executes the first downlink service command, and the first device determines whether there is uplink service data to be transmitted, and if so, sends The uplink signal carrying the uplink service data.
- the processing by the second device may further include: the second device receiving an uplink signal carrying the uplink service data sent by the first device.
- the processing of the first device may also include: when the authentication result is authentication passed, the first device scrambles the first uplink service data based on the third scrambling code to obtain the second uplink service data. ; Wherein, the third scrambling code is generated based on a third key; the first device sends an uplink signal carrying the second uplink service data.
- the processing by the second device may further include: the second device receiving the uplink signal carrying the second uplink service data sent by the first device; the second device generating a fourth scrambling code based on the fourth key; The second device descrambles the received second uplink service data based on the fourth scrambling code to obtain fourth uplink service data.
- the third key and the fourth key need to be the same.
- the third key and the aforementioned second key may be the same or different; the fourth key and the aforementioned first key may be the same or different.
- the third key is the same as the second key
- the fourth key The same as the aforementioned first key
- the third key is the same as the fourth key.
- the third key is different from the second key
- the fourth key is different from the aforementioned first key
- the third key is the same as the fourth key
- the second key is the same as the first key.
- the first device and the second device use a new password for each interaction. It can be that the first device and the second device use the same password for each interaction, but after completing this interaction, they are updated to obtain new passwords.
- this processing method requires the first device and the second device to use a key stream; here, the key stream may specifically include different keys generated by the key stream generator at different times.
- the method of generating the third scrambling code may include: the first device generating a third scrambling code based on the third key.
- the first device may implement the aforementioned process of generating the third scrambling code based on a cryptographic algorithm.
- the cryptographic algorithm can specifically be a lightweight cryptographic algorithm, such as SPECK, SIMON algorithm, etc., and we will not exhaustively list all possible cryptographic algorithms here.
- the second device generates a fourth scrambling code based on the fourth key, and may process the fourth key based on a cryptographic algorithm to obtain the fourth scrambling code.
- the cryptographic algorithm used by the second device is the same as that of the first device.
- the cryptographic algorithm can be a lightweight cryptographic algorithm, such as SPECK, SIMON algorithm, etc. All possible cryptographic algorithms are not exhaustive here. In the case where the third key and the fourth key of the first device and the second device are the same and the cryptographic algorithms used are the same, the fourth scrambling code and the third scrambling code should be the same.
- the second device descrambles the received second uplink service data based on the fourth scrambling code to obtain the fourth uplink service data.
- the fourth uplink service command should be the same as the original first uplink service command on the first device side.
- S601 The reader/writer sends authentication request signaling to the tag.
- the authentication request signaling is used to power the tag and enable the tag to start the authentication process.
- S602 The tag sends the first pilot to the reader.
- the reader/writer processes the first key and the second downlink service command based on the preset algorithm to obtain the second sequence; performs channel estimation on the received first pilot based on the second sequence to obtain Channel estimation value: generating first information based on the second sequence and the channel estimation value.
- the descriptions about the first key and the second key are the same as those in the previous embodiments and will not be repeated; the generation methods of the channel estimation value, the second sequence and the first information are the same as those in the previous embodiments. No further details will be given.
- the reader/writer generates a first scrambling code based on the first key, scrambles the second downlink service command based on the first scrambling code, and obtains the first downlink service command.
- S603 and S604 may be executed in no particular order, and S603 and S604 may be executed at the same time, or S603 may be executed first and then S604, or S604 may be executed first and then S603.
- the reader/writer sends a downlink signal; the downlink signal carries first information, and the first information is generated by the second device based on the first key; the downlink signal also carries a first downlink service command.
- the tag receives the downlink signal, and descrambles the first downlink service command carried in the received downlink signal based on the second scrambling code to obtain the third downlink service command; wherein the second scrambling code is based on the second encryption code. key generated.
- S607 The tag processes the second key and the third downlink service command based on the preset algorithm to obtain the first sequence.
- S608 The tag authenticates the first information carried in the received downlink signal based on the first sequence, and obtains the authentication result; if the authentication result is authentication passed, perform S609; if the authentication result is authentication In case of failure, processing ends.
- the authentication processing method is the same as the previous embodiment and will not be described again.
- the third downlink service command is the same as the original second downlink service command on the reader/writer side.
- S610 The tag scrambles the first uplink service data based on the third scrambling code to obtain the second uplink service data, and sends the uplink signal carrying the second uplink service data; wherein the third scrambling code is based on the third encryption code. key generated.
- the reader/writer receives the uplink signal carrying the second uplink service data and generates a fourth scrambling code based on the fourth key; descrambles the received second uplink service data based on the fourth scrambling code to obtain the fourth Upstream business data.
- the fourth uplink service data obtained by the reader/writer is the same as the original first uplink service data on the tag side.
- the downlink signal in addition to carrying the first information, also carries a first downlink service command.
- the first downlink service command is obtained by the second device scrambling the second downlink service command and a first random number based on the first scrambling code; the first scrambling code is The second device is generated based on the first key.
- the second downlink service command is the original downlink service command of the second device, and its specific content is not limited in this embodiment; the aforementioned first downlink service command is a combination of the second downlink service command and the first random Obtained after scrambling the numbers.
- the second device receives the first pilot; after receiving the first pilot, the second device performs the aforementioned S310.
- the specific description of the first pilot received by the second device is the same as that in the previous embodiment, and will not be repeated.
- the second sequence is generated by the second device based on the first key and the second downlink service command. Specifically, the second device processes the first key based on the preset algorithm to obtain the second sequence, including: the second device processes the first key and the second key based on the preset algorithm.
- the downlink service command is processed to obtain the second sequence.
- the second device processes the first key and the second downlink service command based on the preset algorithm to obtain the specific processing of the second sequence, which is the same as the previous embodiment, and therefore does not Make repeated instructions.
- the second device performs channel estimation on the received first pilot based on the second sequence to obtain a channel estimate value.
- the second device may combine the received first pilot with the aforementioned second sequence. Divide to obtain the channel estimate.
- this embodiment is compared with the aforementioned processing method of generating the second sequence based only on the first key. Since the second sequence is generated in a different manner, the channel estimation value obtained by the second device is different from the aforementioned embodiment.
- the specific processing method for the second device to obtain the channel estimate value is the same as the previous embodiment, so the specific processing method will not be repeated.
- the second device generates the first information based on the second sequence and the channel estimate value, which may be: the second device performs a function on the second sequence and the channel estimate value based on a first preset function. Calculate and generate the first information.
- this embodiment has a different generation method of the second sequence, so the first information obtained by the second device is different from the aforementioned embodiment.
- the specific processing method by which the second device obtains the first information and the first preset function are the same as those in the previous embodiment, and therefore will not be repeatedly described.
- the method further includes: the second device generates a first scrambling code based on the first key; and the second device generates a second downlink signal based on the first scrambling code.
- the service command is scrambled to obtain the first downlink service command.
- the process of generating the first scrambling code by the second device based on the first key is the same as the previous embodiment and will not be described again.
- the second device scrambles the second downlink service command based on the first scrambling code to obtain the first downlink service command, including: the second device scrambles the second downlink service command based on the first scrambling code.
- the first scrambling code scrambles the second downlink service command and the first random number to obtain the first downlink service command.
- the first random number may be represented as R1
- the first random number may be generated by the second device, and the generation method may adopt a random number algorithm.
- the second device may carry the first information through the first signal part of the downlink signal, carry the first downlink service command through the second signal part of the downlink signal, and send the downlink signal to the first device.
- the specific sending method is the same as the previous embodiment and will not be described again.
- the first sequence is different from the aforementioned third sequence.
- the way in which the first device generates the first sequence may include: the first device processes the second key and the third downlink service command based on a preset algorithm. , obtain the first sequence.
- the specific processing method by which the first device processes the second key and the third downlink service command based on a preset algorithm to obtain the first sequence is the same as the previous embodiment and will not be repeated.
- the first device processes the second key and the third downlink service command based on a preset algorithm. Before obtaining the first sequence, it may include: the first device processes the second key and the third downlink service command based on a second scrambling code.
- the first downlink service command carried in the received downlink signal is descrambled to obtain a third downlink service command; wherein the second scrambling code is generated based on the second key.
- the first device descrambles the first downlink service command carried in the received downlink signal based on the second scrambling code to obtain the third downlink service command, which may include: the first device descrambles the first downlink service command based on the second scrambling code. code to descramble the first downlink service command carried in the received downlink signal to obtain the third downlink service command and the second random number.
- the second scrambling code is generated in the same manner as in the previous embodiment.
- the second random number may be expressed as R2.
- the third downlink service command obtained by descrambling by the first device should be the same as the second downlink service command sent by the second device.
- the second random number R2 should be the same as the aforementioned first random number R1.
- the downlink signal received by the first device is different from the downlink signal sent by the second device. This is because the downlink signal received by the first device is also a downlink signal transmitted through the channel.
- the specific description of the first information obtained by the first device is the same as that in the previous embodiment, and will not be described again.
- the first device authenticates the first information in the received downlink signal based on the first sequence, and the process of obtaining the authentication result is also the same as in the previous embodiment, and will not be described again.
- the aforementioned S310 can be directly performed, that is, the downlink signal is directly sent; accordingly, the first device performs the aforementioned S210.
- the downlink signal carries the first information and the first downlink service command; the first information may only include the aforementioned second sequence.
- the first downlink service command is obtained by the second device scrambling the second downlink service command and a first random number based on the first scrambling code; the first scrambling code is the The second device generates the key based on the first key, and the specific description is the same as the previous embodiment.
- the generation method of the second sequence the second sequence is generated by the second device based on the first key and the second downlink service command.
- the way in which the first device generates the first sequence after receiving the downlink signal, and the process of authenticating the first information carried in the received downlink signal based on the first sequence, is consistent with the previous embodiment. are all the same, except that in this embodiment, the aforementioned first information
- the first value When the first value is calculated based on the first information, the first value may be different from the foregoing value, and the preset threshold range adopted may be different, and is not specifically limited.
- the processing by the first device may further include: when the authentication result is authentication passed, the first device executes the third downlink service command. It should be understood that if the aforementioned second key and first key are the same, and the first scrambling code and the second scrambling code are the same, then the third downlink service command should be the same as the original command issued by the second device, that is, the second downlink service command. The commands are the same, so the first device executes the third downlink service command, that is, the first device executes the second downlink service command.
- the first device may also include: when the authentication result is authentication failure, the first device may end the processing and wait for the next reception of the authentication request signaling to perform the next processing. In addition, if the first device passes the authentication, it can also send uplink service data to the second device. Specifically, the first device can include the following two methods:
- Method 3 When the authentication result is authentication passed, the first device sends an uplink signal carrying uplink service data. Specifically, when the authentication result is authentication passed, the first device executes the first downlink service command, and the first device determines whether there is uplink service data to be transmitted, and if so, sends The uplink signal carrying the uplink service data.
- the processing by the second device may further include: the second device receiving an uplink signal carrying the uplink service data sent by the first device. The specific description is the same as the previous embodiment and will not be repeated.
- the processing of the first device may further include: when the authentication result is authentication passed, the first device adds the first uplink service data and the second random number based on a third scrambling code. scrambling to obtain the third uplink service data; wherein the third scrambling code is generated based on a third key; the second random number is used by the second device to authenticate the first device; the The first device sends an uplink signal carrying the third uplink service data.
- the processing by the second device may further include: the second device receiving the uplink signal carrying the third uplink service data sent by the first device; the second device generating a fourth scrambling code based on the fourth key; The second device descrambles the received third uplink service data based on the fourth scrambling code to obtain fifth uplink service data and a second random number; the second device descrambles the received third uplink service data based on the second random number and the second random number.
- a random number is used to authenticate the first device to obtain an authentication result for the first device; when the authentication result for the first device is authentication passed, the second device saves the fifth Upstream business data.
- the second device authenticates the first device based on the second random number and the first random number, and obtains the authentication result of the first device.
- the processing may include: the third When the second random number is consistent with the first random number, the second device determines that the authentication result for the first device is that the authentication is passed. That is to say, the second device authenticates the first device, that is, by determining whether the second random number is consistent with the first random number to determine the authentication result for the first device; if the second random number is consistent with the first random number, If the second random number is inconsistent with the first random number, it is determined that the authentication result of the first device is authentication failure. At this time, the fifth uplink service data is refused to be received. Although the second random number and the fifth uplink service data will be parsed when the third uplink service data is received, if the authentication result of the first device is authentication failure, it can be discarded. The fifth upstream business data.
- the third key and the fourth key need to be the same.
- the third key and the aforementioned second key may be the same or different; the fourth key and the aforementioned first key may be the same or different.
- the third key is the same as the second key
- the fourth key The same as the aforementioned first key
- the third key is the same as the fourth key.
- the third key is different from the second key
- the fourth key is different from the aforementioned first key
- the third key is the same as the fourth key
- the second key is the same as the first key.
- the first device and the second device use a new password for each interaction. It can be that the first device and the second device use the same password for each interaction, but after completing this interaction, they are updated to obtain new passwords.
- this processing method requires the first device and the second device to use a key stream; here, the key stream may specifically include different keys generated by the key stream generator at different times.
- the method of generating the third scrambling code and the method of generating the fourth scrambling code are the same as in the previous embodiment, and will not be described again.
- the second device descrambles the received third uplink service data based on the fourth scrambling code to obtain fifth uplink service data and a second random number, only the second random number is the same as the aforementioned first random number. , the fifth upstream service command will be received and saved.
- the fourth scrambling code and the third scrambling code are the same, the fifth uplink service command should be the same as the original first uplink service command on the first device side.
- S701 The reader/writer sends authentication request signaling to the tag.
- the authentication request signaling is used to power the tag and enable the tag to start the authentication process.
- S702 The tag sends the first pilot to the reader.
- the reader/writer processes the first key and the second downlink service command based on the preset algorithm to obtain the second sequence; performs channel estimation on the received first pilot based on the second sequence to obtain Channel estimation value: generating first information based on the second sequence and the channel estimation value.
- the descriptions about the first key and the second key are the same as those in the previous embodiments and will not be repeated; the generation methods of the channel estimation value, the second sequence and the first information are the same as those in the previous embodiments. No further details will be given.
- the reader/writer generates a first scrambling code based on the first key, scrambles the second downlink service command and the first random number based on the first scrambling code, and obtains the first downlink service command.
- S703 and S704 may be executed in no particular order, and S703 and S704 may be executed at the same time, or S703 may be executed first and then S704, or S704 may be executed first and then S703.
- the reader/writer sends a downlink signal; the downlink signal carries first information, and the first information is generated by the second device based on the first key; the downlink signal also carries a first downlink service command.
- the tag receives the downlink signal, descrambles the first downlink service command carried in the received downlink signal based on the second scrambling code, and obtains the third downlink service command and the second random number; wherein, the second The scrambling code is generated based on the second key.
- S707 The tag processes the second key and the third downlink service command based on a preset algorithm to obtain the first sequence.
- S708 The tag authenticates the first information carried in the received downlink signal based on the first sequence, and obtains an authentication result; if the authentication result is authentication passed, perform S709; if the authentication result is authentication In case of failure, processing ends.
- the authentication processing method is the same as the previous embodiment and will not be described again.
- the third downlink service command is the same as the original second downlink service command on the reader/writer side.
- S710 The tag scrambles the first uplink service data and the second random number based on the third scrambling code to obtain the third uplink service data, and sends an uplink signal carrying the third uplink service data; wherein the third scrambling code The code is generated based on the third key.
- the reader/writer receives the uplink signal carrying the third uplink service data, generates the fourth scrambling code based on the fourth key, and descrambles the received third uplink service data based on the fourth scrambling code to obtain the fifth uplink service. data and a second random number.
- the reader determines whether the second random number is consistent with the first random number. If they are consistent, it determines that the authentication result for the first device is passed, and saves the fifth uplink service data; if they are inconsistent, it determines that the authentication result is passed.
- the authentication result of the first device is authentication failure, and the first device refuses to receive the fifth uplink service data.
- the reader needs to authenticate the tag, that is, the reader determines the authentication result of the tag by judging whether the second random number is consistent with the first random number; if the second random number is consistent with the first random number , then it is determined that the authentication result for the tag is authentication passed, and the fifth uplink service data can be saved; if the second random number is inconsistent with the first random number, it is determined that the authentication result for the tag is authentication failure, and this Refuse to receive the fifth upstream data.
- the fifth uplink service data obtained by the reader/writer is the same as the original first uplink service data on the tag side.
- the two most critical signals transmitted in the air interface in the previous embodiment are the first pilot and the downlink signal.
- the attacker intercepts the downlink signal Since the attacker cannot estimate the channel G between the reader and the attacker, nor does he know the legitimate channel estimate and the first sequence s R generated by the reader side based on the second key, so the first information in the downlink signal cannot be deciphered, and the authentication result that passes the authentication cannot be obtained. It can be seen that by adopting the solution provided by this embodiment, the security of air interface signals can be ensured.
- the attacker forges downlink signals When an attacker forges downlink signals, the attacker first needs to forge downstream business commands, such as forging write commands, in an attempt to write wrong data in the tag. Assume that the attacker's forged downstream service command is Command'. Since the attacker cannot obtain the second key of the aforementioned first device and the first key of the aforementioned second device, at this time, the attacker's forged second sequence It can be expressed as:
- the attack pilot s E generated on the local side can only be spliced together with the downlink forged service command as the first information and sent to the tag, that is, s E
- the noise on the tag side is NT .
- the attacker tampering with the downlink signal means that the attacker does not change the first information , and forward it to the label. Assuming that the tag decodes the downlink service command Command' tampered by the attacker without error, and calculates the local first sequence s' T , then the first value calculated by the tag is expressed as:
- the attacker replays the downlink signal:
- the attacker receives the downlink signal sent by the reader after it has been masked by channel G. If the received signal is directly forwarded, the downlink signal will experience channel V distortion again, and the error will becomes very large and is not authentically offensive to tags.
- FIG. 9 shows that the number of antennas of the base station (i.e., the second device) is equipped with 1 antenna respectively. , 16, 32, and 64 antennas, when the attacker forges downlink signals, the system’s missed alarm probability changes with the attacker’s power.
- the abscissa in Figure 9 is the ratio of the power of the illegal signal to the legitimate signal. It can be seen from Figure 9 that as the attacker's power increases, the variance of the test statistic of the forged signal will also increase, causing the system's probability of missing an alarm to also increase.
- Base station configurations with different antenna numbers have achieved lower alarm miss probabilities. More intuitively, when the legitimate base station and attacker antenna have one antenna, the system miss alarm probability can be lower than 6%, which shows that this solution can Effectively identify downlink signals forged by attackers. In addition, as the number of legitimate base stations and attacker antennas increases, the probability of missing an alarm becomes lower and lower. This is because the increase in the number of antennas reduces the variance of the test statistics on the tag side, and the test statistics are more concentrated near the 0 mean. Thus the test results will be more accurate.
- the impact of the attacker's replaying of the downlink signal on the probability of missing an alarm when the number of antennas of the base station (i.e. the second device) is 1, 16, 32, and 64 antennas, the system's leakage probability will increase when the attacker replays the downlink signal.
- the variance of the test statistic of the replayed downlink signal will also increase, resulting in an increase in the system's missed alarm probability.
- Base station configurations with different antenna numbers achieve lower alarm probability, and the channels between legitimate base stations and attackers, and attackers and tags can mask the authentication identification. More intuitively, when the legitimate base station and the attacker's antenna have one antenna, the system's probability of missing an alarm is as low as 0.15%, which shows that this solution can effectively identify the downlink signal replayed by the attacker.
- Figure 10 shows the false alarm probability of this solution when the number of base station antennas is equipped with 1, 16, 32, and 64 antennas respectively.
- the greater the legitimate signal power the more accurate the channel value estimated by the reader side, so the lower the false alarm probability of the system. Therefore, this scheme has good performance in the false alarm probability performance index, indicating that this scheme is practical in typical environments.
- the probability of false alarms becomes lower and lower. In summary, whether it is false alarm probability or missed alarm probability, the base station using multi-antenna technology has more obvious advantages.
- the solution provided in this embodiment uses the private first pilot generated by the tag side and the received downlink signal to perform hypothesis testing, and its security comes from the confidentiality of the pilot.
- the downlink signal sent from the legitimate base station can also be received, this is masked by the channel between the base station and the attacker. Since the third sequence in the first pilot is generated using the second key, It is private, so the attacker cannot estimate the channel estimate with the legitimate base station.
- the channel is random, even if the attacker infinitely improves the computing power, he cannot decipher the first information carried in the downlink signal received from the base station. . Therefore, this scheme can avoid computational attacks.
- the first pilot can be regarded as a special use of the inherent pilot symbols (preamble/frame synchronization sequence) in the zero-power system and does not occupy additional communication resources.
- this solution integrates identity authentication and integrity protection, making communication more efficient.
- the solution provided by this embodiment puts highly complex operations such as channel estimation and pilot processing on the base station side, and tags with limited resources only need to perform additional simple operations such as bit operations and threshold judgment.
- the third sequence carried by the first pilot, the pseudo-random number generator and the cyclic redundancy check used are all generated by the built-in module of RFID and do not need to be added additionally. And the use of private pilots prevents attackers from detecting the channel and provides better security strength.
- the first device authenticates the downlink signal carrying the first information based on the first sequence, and obtains the authentication result; wherein the first information is generated by the second device based on the first key, and the first information is generated by the second device based on the first key.
- a sequence is generated based on the second key.
- Figure 11 is a schematic structural diagram of a first device according to an embodiment of the present application, including:
- the first communication unit 1101 is used to receive downlink signals; the downlink signals carry first information, and the first information is generated by the second device based on the first key;
- the first processing unit 1102 is configured to authenticate the first information carried in the received downlink signal based on a first sequence and obtain an authentication result; the first sequence is generated based on the second key.
- the first processing unit is configured to determine the authentication result when the similarity between the first sequence and the first information carried in the received downlink signal satisfies a preset condition. For certification;
- the first processing unit is configured to perform calculations based on the first sequence and the first information carried in the received downlink signal to obtain a first value; when the first value is within a preset threshold range In the case of , the similarity between the first sequence and the first information in the received downlink signal is determined to satisfy a preset condition.
- the first information is generated by the second device based on a second sequence, and the second sequence is generated based on the first key.
- the first processing unit is used to process the second key based on a preset algorithm to obtain a third sequence
- the first communication unit is configured to send the first pilot carrying the third sequence.
- the first information is generated by the second device based on the channel estimate value and the second sequence
- the channel estimation value is obtained by the second device performing channel estimation on the received first pilot based on the second sequence.
- the first sequence is the same as the third sequence.
- the downlink signal also carries a first downlink service command.
- the second sequence is generated by the second device based on the first key and the first downlink service command.
- the first processing unit is configured to process the second key and the first downlink service command based on a preset algorithm to obtain the first sequence.
- the first processing unit is configured to execute the first downlink service command when the authentication result is authentication passed.
- the first downlink service command is obtained by scrambling the second downlink service command based on the first scrambling code by the second device; the first scrambling code is generated by the second device based on the first key. of.
- the second sequence is generated by the second device based on the first key and the second downlink service command.
- the first processing unit is configured to descramble the first downlink service command carried by the received downlink signal based on the second scrambling code to obtain a third downlink service command; wherein the second scrambling code is generated based on the second key.
- the first processing unit is configured to process the second key and the third downlink service command based on a preset algorithm to obtain the first sequence.
- the first processing unit is configured to execute the third downlink service command when the authentication result is authentication passed.
- the first downlink service command is obtained by the second device scrambling the second downlink service command and a first random number based on the first scrambling code.
- the first processing unit is configured to descramble the first downlink service command carried in the received downlink signal based on the second scrambling code to obtain the third downlink service command and the second random number.
- the first communication unit is configured to send an uplink signal carrying first uplink service data when the authentication result is authentication passed.
- the first processing unit is configured to scramble the first uplink service data based on a third scrambling code to obtain the second uplink service data when the authentication result is authentication passed; wherein the third scrambling code Generated based on the third key;
- the first communication unit is configured to send an uplink signal carrying the second uplink service data.
- the first processing unit is configured to scramble the first uplink service data and the second random number based on a third scrambling code to obtain the third uplink service data when the authentication result is authentication passed; Wherein, the third scrambling code is generated based on a third key; the second random number is used by the second device to authenticate the first device; the first communication unit is used to send and carry The uplink signal of the third uplink service data.
- the preset algorithm is one of the following: random number algorithm, cryptographic algorithm.
- the first device in the embodiment of the present application can implement the corresponding functions of the first device in the aforementioned authentication method embodiment.
- each module (sub-module, unit or component, etc.) in the first device please refer to the corresponding description in the above method embodiment, and will not be described again here.
- the functions described for each module (sub-module, unit or component, etc.) in the second device of the application embodiment can be implemented by different modules (sub-module, unit or component, etc.), or can be implemented by the same Module (submodule, unit or component, etc.) implementation.
- Figure 12 is a schematic structural diagram of a second device according to an embodiment of the present application, including:
- the second communication unit 1201 is used to send downlink signals; the downlink signals carry first information, and the first information is generated by the second device based on the first key; the first information is used for authentication by the first device , get the certification result.
- the second device also includes:
- the second processing unit 1202 is configured to process the first key based on a preset algorithm to obtain a second sequence; and generate first information based on the second sequence;
- the second communication unit 1201 is configured to send the downlink signal carrying the first information.
- the second communication unit is used to receive the first pilot sent by the first device; the first pilot is used to carry a third sequence; the third sequence is generated by the first device based on a preset algorithm Obtained by processing the second key.
- the dimension of the channel estimate value is related to the number of antennas of the second device.
- the downlink signal also carries a first downlink service command.
- the second processing unit is configured to process the first key and the first downlink service command based on the preset algorithm to obtain the second sequence.
- the second processing unit is configured to generate a first scrambling code based on the first key; scramble the second downlink service command based on the first scrambling code to obtain the first downlink service command.
- the second processing unit is configured to scramble the second downlink service command and the first random number based on the first scrambling code to obtain the first downlink service command.
- the second processing unit is configured to process the first key and the second downlink service command based on the preset algorithm to obtain the second sequence.
- the second communication unit is configured to receive an uplink signal carrying first uplink service data sent by the first device.
- the second processing unit is configured to generate a fourth scrambling code based on the fourth key; descramble the received second uplink service data based on the fourth scrambling code to obtain fourth uplink service data; the second communication A unit configured to receive an uplink signal carrying second uplink service data sent by the first device.
- the second communication unit is configured to receive an uplink signal carrying third uplink service data sent by the first device;
- the second processing unit is configured to generate a fourth scrambling code based on the fourth key; descramble the received third uplink service data based on the fourth scrambling code to obtain the fifth uplink service data and the second random number; authenticate the first device based on the second random number and the first random number, and obtain an authentication result for the first device; in the case where the authentication result for the first device is authentication passed , save the fifth uplink service data.
- the second processing unit is configured to determine that the authentication result of the first device is that the authentication is passed when the second random number is consistent with the first random number.
- the preset algorithm is one of the following: random number algorithm, cryptographic algorithm.
- the second device in the embodiment of the present application can implement the corresponding functions of the second device in the aforementioned authentication method embodiment.
- each module (sub-module, unit or component, etc.) in the second device please refer to the corresponding description in the above method embodiment, and will not be described again here.
- the functions described for each module (sub-module, unit or component, etc.) in the second device of the application embodiment can be implemented by different modules (sub-module, unit or component, etc.), or can be implemented by the same Module (submodule, unit or component, etc.) implementation.
- the second device may be a reader, which may specifically be a user equipment (UE, User Equipment) or a network device.
- the first device may be a zero-power terminal, a zero-power device, or a zero-power Internet of Things terminal.
- the first device (zero-power terminal, or zero-power device, or zero-power Internet of Things terminal) may specifically be an electronic tag (or tag), and may integrate memory for data access, and/or integrate Sensors are used for sensing information collection. Since it is generally a large-scale application (for example, each asset or device will be labeled with a tag), its cost and power consumption need to be considered.
- the above-mentioned first device and second device may form a zero-power communication system.
- the outstanding technical advantage of zero-power communication is battery-free communication. Due to the use of key technologies such as radio frequency energy harvesting, backscattering and low-power computing, the terminal can be battery-free and support extremely low hardware complexity. Therefore, zero-power communication can meet the requirements of ultra-low power consumption, extremely small size and extremely low cost. cost requirements. It is foreseeable that zero-power technology will have significant application advantages in a wide range of application fields. For example, industrial sensor networks, smart transportation, smart logistics, smart warehousing, smart agriculture, smart cities, energy fields and other applications for vertical industries, as well as smart wear, smart home, medical care and other scenarios for individual consumers. In this section, we will select some typical scenarios to illustrate the application potential of zero-power communication in these fields.
- the requirements for the first device and the second device may also be different.
- the requirements for the first device and the second device may include:
- the second device i.e. reader
- its requirements are as follows: based on cellular network infrastructure and flexible deployment: for example, it can be deployed in outdoor pole stations and the same as DIS (Digital Indoor System) indoors. Digital system) station spacing deployment to provide basic coverage; for another example, blind filling or extended coverage can be deployed on demand; coverage requirements: the coverage distance requirement of a single station is greater than 30m indoors and greater than 100m outdoors; network security: authorization-based tags Read, protect privacy and data security; connection requirements: support sufficient system capacity and support data reading from a large number of terminals.
- DIS Digital Indoor System
- connection requirements support sufficient system capacity and support data reading from a large number of terminals.
- the characteristics of the first device include but are not limited to the following: power consumption: can be less than 1mw, passive, battery-free and maintenance-free; Working environment: needs to be able to match special environments, such as being able to work normally in special environments such as high temperature, high pressure, extreme cold, radiation, etc.; Volume: very small, easy for large-scale application; Communication distance: can reach tens to hundreds of meters Scope; Material type: There can be paper labels and anti-metal labels.
- the typical requirements of the first device and the second device are only described in the application scenario of the industrial sensor network.
- the application scenario of the industrial sensor network may also include other requirements, but an exhaustive list will not be made here.
- the requirements of the first device and the second device will be different from the requirements of the aforementioned industrial sensor network.
- connection requirements may also be increased ( Due to the large quantity of goods, a large number of tags need to be detected at the same time, so it may be necessary to achieve thousands of connections per second); for another example, in smart home application scenarios, the need for communication delay may increase (smart home appliance adjustment: ten milliseconds to Hundreds of milliseconds level; home positioning: hundreds of milliseconds to seconds level), and the need for excitation signals (using indoor smart devices such as smartphones, CPE (Customer Premise Equipment), and WIFI signals as passive terminals Energy excitation signals, no need for additional excitation signals, simplified network layout), etc., are not exhaustive here.
- the aforementioned first device and second device may form a zero-power communication system based on backscattering.
- the first device, the zero-power device backscatters the transmitter to modulate and reflect the received RF (Radio Frequency, radio frequency) signal to transmit data, instead of generating RF itself. Signal.
- This technology has been widely used in practical production, such as RFID (Radio Frequency Identification, radio frequency identification technology), tracking equipment, remote switches, medical telemetry and low-cost sensor networks, etc.
- the aforementioned first device and second device can form a zero-power communication system based on backscattering. See Figure 14.
- the network device is the second device (such as a reader), and the zero-power terminal is the first device.
- the zero-power consumption terminal i.e., the first device
- the zero-power consumption terminal may include functions such as energy collection, backscatter communication, and low-power computing; wherein the energy collection and backscatter communication may be provided by the aforementioned third device.
- the low power consumption calculation may be implemented by the first processing unit of the first device.
- radio frequency energy harvesting is radio frequency energy harvesting. Its basic principle is to collect space electromagnetic wave energy through electromagnetic induction. The essence of radio frequency energy harvesting is to convert radio frequency energy into direct current voltage (RF-DC). When used in zero-power communications, the core requirement for RF energy harvesting is to effectively use the collected energy to drive load circuits (low-power computing, sensors, etc.) and use RF energy to achieve battery-free communication.
- RF-DC direct current voltage
- AmBC Ambient Backscatter Communication
- Environmental backscatter communication systems generally include three parts: ambient radio-frequency (RF) source, backscatter device (BD), and reader.
- the zero-power device i.e., the first device, such as a backscatter tag
- receives the carrier signal sent by the reader i.e., the second device
- collects energy through the RF energy collection module energy collection, that is, radio frequency energy collection
- power processing modules i.e., low-power computing.
- the backscatter communication drives the corresponding circuit to modulate the incoming wave signal and perform backscattering.
- the main feature of zero-power communication technology is to achieve backscatter communication by modulating incoming wave signals. At the same time, it can also obtain energy through energy harvesting to drive digital logic circuits or chips (such as MCU (Microcontroller Unit) or sensor chips). ) to implement functions such as signal encoding, encryption or simple calculation.
- the conversion efficiency of radio frequency energy is often less than 10%, which determines that the power consumption requirements for driving digital logic circuits or chips for calculation cannot be too high. For example, 1 microjoule of energy can support the number of calculations. Although this has improved as processes have improved and designs have been optimized, the number of times energy per microjoule can be used for calculations.
- Low-power receivers and zero-power devices can be divided into two categories in terms of functional requirements.
- One category's main function is beacon-like broadcast transmission. In order to reduce structural complexity and power consumption, the receiver function does not need to be implemented; the other category It is to consider designing a simple and low-power receiver.
- Backscatter often uses ASK and FSK methods, which can be realized by simple circuit design.
- ASK and FSK methods which can be realized by simple circuit design.
- reverse non-return to zero and Manchester coding are the two most commonly used coding methods in backscatter systems.
- DBP differential biphase
- Miller coding Miller coding
- FM0 coding FM0 coding
- other simple and easy-to-implement coding methods that are also suitable for backscatter communication.
- simple coding and modulation the computing power consumption of zero-power communication can also be
- the smart terminal sends air interface data to the base station.
- Case 3 zero-power communication with auxiliary power supply by smart terminals: Smart terminals in the network provide auxiliary power for zero-power terminals, and the base station sends trigger information to the zero-power terminals and receives backscattered signals from the zero-power terminals. .
- the intelligent terminal's auxiliary power supply process for zero-power terminals can be controlled by the base station through air interface signaling.
- Case 4 network-controlled zero-power Sidelink communication: the smart terminal receives air interface signaling and data from the network. The smart terminal supplies energy and triggers the zero-power terminal, and receives the backscattered signal from the zero-power terminal to complete Sidelink communication.
- Figure 16 is a schematic structural diagram of a communication device 1600 according to an embodiment of the present application.
- the communication device 1600 includes a processor 1610, and the processor 1610 can call and run a computer program from the memory, so that the communication device 1600 implements the method in the embodiment of the present application.
- the communication device 1600 may also include a memory 1620.
- the processor 1610 can call and run the computer program from the memory 1620, so that the communication device 1600 implements the method in the embodiment of the present application.
- the memory 1620 may be a separate device independent of the processor 1610, or may be integrated into the processor 1610.
- the communication device 1600 may also include a transceiver 1630, and the processor 1610 may control the transceiver 1630 to communicate with other devices.
- the communication device 1600 may send information or data to, or receive data from, other devices.
- the transceiver 1630 may include a transmitter and a receiver.
- the transceiver 1630 may further include an antenna, and the number of antennas may be one or more.
- the communication device 1600 may be the first device in the embodiment of the present application, and the communication device 1600 may implement the corresponding processes implemented by the first device in the various methods of the embodiment of the present application. For the sake of simplicity , which will not be described in detail here.
- the communication device 1600 can be the second device in the embodiment of the present application, and the communication device 1600 can implement the corresponding processes implemented by the second device in the various methods of the embodiment of the present application. For the sake of simplicity , which will not be described in detail here.
- Figure 17 is a schematic structural diagram of a chip 1700 according to an embodiment of the present application.
- the chip 1700 includes a processor 1710, and the processor 1710 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
- the chip 1700 may also include a memory 1720.
- the processor 1710 can call and run the computer program from the memory 1720 to implement the method executed by the second device or the first device in the embodiment of the present application.
- the memory 1720 may be a separate device independent of the processor 1710 , or may be integrated into the processor 1710 .
- the chip 1700 may also include an input interface 1730.
- the processor 1710 can control the input interface 1730 to communicate with other devices or chips. Specifically, it can obtain information or data sent by other devices or chips.
- the chip 1700 may also include an output interface 1740.
- the processor 1710 can control the output interface 1740 to communicate with other devices or chips. Specifically, it can output information or data to other devices or chips.
- the chip can be applied to the first device in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the first device in the various methods of the embodiment of the present application. For simplicity, in This will not be described again.
- the chip can be applied to the second device in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the second device in the various methods of the embodiment of the present application. For simplicity, in This will not be described again.
- the chips applied to the first device and the second device may be the same chip or different chips.
- chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
- the processor mentioned above can be a general-purpose processor, a digital signal processor (DSP), an off-the-shelf programmable gate array (FPGA), an application specific integrated circuit (ASIC), or Other programmable logic devices, transistor logic devices, discrete hardware components, etc.
- DSP digital signal processor
- FPGA off-the-shelf programmable gate array
- ASIC application specific integrated circuit
- the above-mentioned general processor may be a microprocessor or any conventional processor.
- non-volatile memory may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
- non-volatile memory can be read-only memory (ROM), programmable ROM (PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically removable memory. Erase electrically programmable read-only memory (EPROM, EEPROM) or flash memory.
- Volatile memory can be random access memory (RAM).
- the memory in the embodiment of the present application can also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is, memories in embodiments of the present application are intended to include, but are not limited to, these and any other suitable types of memories.
- FIG. 18 is a schematic block diagram of a communication system 1800 according to an embodiment of the present application.
- the communication system 1800 includes a second device 1810 and a first device 1820.
- the second device 1810 can be used to implement the corresponding functions implemented by the second device in the above method
- the first device 1820 can be used to implement the corresponding functions implemented by the first device in the above method.
- no further details will be given here.
- the computer program product includes one or more computer instructions.
- the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
- the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted over a wired connection from a website, computer, server, or data center (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) means to transmit to another website, computer, server or data center.
- the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
- the available media may be magnetic media (eg, floppy disk, hard disk, tape), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), etc.
- the size of the sequence numbers of the above-mentioned processes does not mean the order of execution.
- the execution order of each process should be determined by its functions and internal logic, and should not be used in the embodiments of the present application.
- the implementation process constitutes any limitation.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请涉及一种认证方法和设备。其中方法包括:第一设备接收下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;所述第一设备基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果;所述第一序列为基于第二密钥生成的。
Description
本申请涉及通信领域,更具体地,涉及一种认证方法和设备。
在通信场景下,通常两个设备之间交互需要在安全环境中进行,这就需要对设备进行认证。在相关技术针对无线射频识别系统的认证研究中,提出基于上层密钥学的相关认证方案,然而,在认证处理中如何保证安全性,就成为需要解决的问题。
发明内容
本申请实施例提供一种认证方法、设备、计算机可读存储介质、计算机程序产品以及计算机程序。
本申请实施例提供一种认证方法,包括:
第一设备接收下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;
所述第一设备基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果;所述第一序列为基于第二密钥生成的。
本申请实施例提供一种认证方法,包括:
第二设备发送下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;所述第一信息用于第一设备进行认证,得到认证结果。
本申请实施例提供一种第一设备,包括:
第一通信单元,用于接收下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;
第一处理单元,用于基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果;所述第一序列为基于第二密钥生成的。
本申请实施例提供一种第二设备,包括:
第二通信单元,用于发送下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;所述第一信息用于第一设备进行认证,得到认证结果。
本申请实施例提供一种第一设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,以使该第一设备执行上述方法。
本申请实施例提供一种第二设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,以使该第二设备执行上述方法。
本申请实施例提供一种芯片,用于实现上述方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的方法。
本申请实施例提供一种计算机可读存储介质,用于存储计算机程序,当该计算机程序被设备运行时使得该设备执行上述方法。
本申请实施例提供一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述方法。
本申请实施例提供一种计算机程序,当其在计算机上运行时,使得计算机执行上述方法。
本申请实施例,通过采用本实施例提供的方案,第一设备基于第一序列对携带第一信息的下行信号进行认证,得到认证结果;其中第一信息为第二设备基于第一密钥生成的,第一序列是基于第二密钥生成的。如此,由于采用密钥进行认证处理,因此可以避免计算攻击,保证了认证处理的安全性。
图1是根据本申请实施例的应用场景的示意图。
图2是根据本申请实施例的一种认证方法流程示意图一。
图3是根据本申请实施例的一种认证方法流程示意图二。
图4是根据本申请实施例的一种认证方法流程示意图三。
图5是根据本申请实施例的一种认证方法流程示意图四。
图6是根据本申请实施例的一种认证方法流程示意图五。
图7是根据本申请实施例的一种认证方法流程示意图六。
图8是根据本申请实施例的攻击场景示意图。
图9是根据本申请的多种天线数量的情况下漏警概率曲线对比示意图。
图10是根据本申请的多种天线数量的情况下合法信号功率与漏警概率曲线示意图。
图11是根据本申请的一实施例的第一设备的示意性框图。
图12是根据本申请的一实施例的第二设备的示意性框图。
图13是根据本申请的另一实施例的第二设备的示意性框图。
图14是根据本申请一实施例的基于反向散射的零功耗通信系统示意图。
图15是根据本申请一实施例的基于蜂窝和/或侧行通信的混合零功耗通信系统的场景示意图。
图16是根据本申请实施例的通信设备示意性框图。
图17是根据本申请实施例的芯片的示意性框图。
图18是根据本申请实施例的通信系统的示意性框图。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新无线(New Radio,NR)系统、NR系统的演进系统、非授权频谱上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、非授权频谱上的NR(NR-based access to unlicensed spectrum,NR-U)系统、非地面通信网络(Non-Terrestrial Networks,NTN)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、第五代通信(5th-Generation,5G)系统或其他通信系统等。
通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(Device to Device,D2D)通信,机器到机器(Machine to Machine,M2M)通信,机器类型通信(Machine Type Communication,MTC),车辆间(Vehicle to Vehicle,V2V)通信,或车联网(Vehicle to everything,V2X)通信等,本申请实施例也可以应用于这些通信系统。
在一种可能的实现方式中,本申请实施例中的通信系统可以应用于载波聚合(Carrier Aggregation,CA)场景,也可以应用于双连接(Dual Connectivity,DC)场景,还可以应用于独立(Standalone,SA)布网场景。在一种可能的实现方式中,本申请实施例中的通信系统可以应用于非授权频谱,其中,非授权频谱也可以认为是共享频谱;或者,本申请实施例中的通信系统也可以应用于授权频谱,其中,授权频谱也可以认为是非共享频谱。
本申请实施例结合网络设备和终端设备描述了各个实施例,其中,终端设备也可以称为用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。
终端设备可以是WLAN中的站点(STAION,ST),可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)设备、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、下一代通信系统例如NR网络中的终端设备,或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)网络中的终端设备等。在本申请实施例中,终端设备可以部署在陆地上,包括室内或室外、手持、穿戴或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。在本申请实施例中,终端设备可以是手机(Mobile Phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(Virtual Reality,VR)终端设备、增强现实(Augmented Reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self driving)中的无线终端设备、远程医疗(remote medical)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备或智慧家庭(smart home)中的无线终端设备等。作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括 功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。
在本申请实施例中,网络设备可以是用于与移动设备通信的设备,网络设备可以是WLAN中的接入点(Access Point,AP),GSM或CDMA中的基站(Base Transceiver Station,BTS),也可以是WCDMA中的基站(NodeB,NB),还可以是LTE中的演进型基站(Evolutional Node B,eNB或eNodeB),或者中继站或接入点,或者车载设备、可穿戴设备以及NR网络中的网络设备(gNB)或者未来演进的PLMN网络中的网络设备或者NTN网络中的网络设备等。作为示例而非限定,在本申请实施例中,网络设备可以具有移动特性,例如网络设备可以为移动的设备。可选地,网络设备可以为卫星、气球站。例如,卫星可以为低地球轨道(low earth orbit,LEO)卫星、中地球轨道(medium earth orbit,MEO)卫星、地球同步轨道(geostationary earth orbit,GEO)卫星、高椭圆轨道(High Elliptical Orbit,HEO)卫星等。可选地,网络设备还可以为设置在陆地、水域等位置的基站。在本申请实施例中,网络设备可以为小区提供服务,终端设备通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与网络设备进行通信,该小区可以是网络设备(例如基站)对应的小区,小区可以属于宏基站,也可以属于小小区(Small cell)对应的基站,这里的小小区可以包括:城市小区(Metro cell)、微小区(Micro cell)、微微小区(Pico cell)、毫微微小区(Femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。
图1示例性地示出了一种通信系统100。该通信系统包括一个网络设备110和两个终端设备120。在一种可能的实现方式中,该通信系统100可以包括多个网络设备110,并且每个网络设备110的覆盖范围内可以包括其它数量的终端设备120,本申请实施例对此不做限定。在一种可能的实现方式中,该通信系统100还可以包括移动性管理实体(Mobility Management Entity,MME)、接入与移动性管理功能(Access and Mobility Management Function,AMF)等其他网络实体,本申请实施例对此不作限定。其中,网络设备又可以包括接入网设备和核心网设备。即无线通信系统还包括用于与接入网设备进行通信的多个核心网。接入网设备可以是长期演进(long-term evolution,LTE)系统、下一代(移动通信系统)(next radio,NR)系统或者授权辅助接入长期演进(authorized auxiliary access long-term evolution,LAA-LTE)系统中的演进型基站(evolutional node B,简称可以为eNB或e-NodeB)宏基站、微基站(也称为“小基站”)、微微基站、接入站点(access point,AP)、传输站点(transmission point,TP)或新一代基站(new generation Node B,gNodeB)等。
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统为例,通信设备可包括具有通信功能的网络设备和终端设备,网络设备和终端设备可以为本申请实施例中的具体设备,此处不再赘述;通信设备还可包括通信系统中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
应理解,在本申请的实施例中提到的“指示”可以是直接指示,也可以是间接指示,还可以是表示具有关联关系。举例说明,A指示B,可以表示A直接指示B,例如B可以通过A获取;也可以表示A间接指示B,例如A指示C,B可以通过C获取;还可以表示A和B之间具有关联关系。
为便于理解本申请实施例的技术方案,以下对本申请实施例的相关技术进行说明,以下相关技术作为可选方案与本申请实施例的技术方案可以进行任意结合,其均属于本申请实施例的保护范围。
针对无线射频识别系统身份认证的研究主要分为两个大方向,分别是基于上层密钥学的认证方案和底层物理层的认证方案。其中,基于上层密钥学的认证方案中,根据计算开销和标签支持的操作,将上层密码学手段的射频识别(RFID,Radio Frequency Identification)认证协议大致分为五类:第一类为高复杂度的协议,需要支持传统的加密函数;第二类是一般复杂度的协议,这一类认证协议标签需要支持随机数生成器和单向哈希函数;第三类是轻量级协议,这一类认证协议中标签需要支持美国国家标准与技术研究院(National Institute of Standards and Technology,NIST)轻量级加密算法;第四类是为轻量级协议,是指认证协议中仅需要随机数生成器和简单的函数,例如循环冗余校验(Cyclic Redundancy Check,CRC)校验和,但不支持哈希函数;第五类为超轻量级协议,是指认证协议中标签只涉及简单的位操作,如异或、旋转等。
然而,上述基于上层密钥学的认证方案,可能存在无法抵御计算攻击、占用额外通信开销和降低数据吞吐量等问题。具体的,基于上层密钥学的认证方案本质上是通过验证参数是否满足预设匹配条件来判断是否存在攻击,其安全性来源于数学问题的求解难度;攻击者可以获得利用密钥加密后的验证材料, 假如攻击者提高计算能力,存在被破解的可能性,因此,上述上层密钥学的认证方案可能会存在无法抵御计算攻击的问题。另外,基于上层密钥学的认证方案需要在合法通信双方之间,额外交换一些携带身份验证信息的消息比特,在以小数据包为主的零功耗系统中,部署基于上层密钥学的认证方案会占用很多额外的通信开销,降低数据的吞吐量。
在本申请实施例的描述中,术语“对应”可表示两者之间具有直接对应或间接对应的关系,也可以表示两者之间具有关联关系,也可以是指示与被指示、配置与被配置等关系。
为便于理解本申请实施例的技术方案,以下对本申请实施例的相关技术进行说明,以下相关技术作为可选方案与本申请实施例的技术方案可以进行任意结合,其均属于本申请实施例的保护范围。
图2是根据本申请一实施例的认证方法的示意性流程图。该方法可选地可以应用于图1所示的系统,但并不仅限于此。该方法包括以下内容的至少部分内容。
S210、第一设备接收下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;
S220、所述第一设备基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果;所述第一序列为基于第二密钥生成的。
图3是根据本申请另一实施例的认证方法的示意性流程图。该方法可选地可以应用于图1所示的系统,但并不仅限于此。该方法包括以下内容的至少部分内容。
S310、第二设备发送下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;所述第一信息用于第一设备进行认证,得到认证结果。
本申请各个实施例中,所述第一设备和所述第二设备可以随着场景不同而不同。比如,该第一设备具体可以为零功耗设备,如Tag(标签),该第二设备可以为Reader(标签阅读器)。示例性的,所述第二设备(即reader)可以为网络设备、用户设备(UE,User Equipment)、用户端设备(CPE,Customer Premise Equipment)等等任意一种;相应的,所述第一设备即零功耗设备可以为物联网(Internet of Things,IoT)设备、无源物联网(Passive Internet of Things,Passive IoT)设备等等任意一种。应理解,以上仅为示例性说明,实际处理中第一设备与第二设备还可以分别为其他类型的设备,只是这里不做穷举。
在一种优选的示例中,前述第二设备可以为网络设备,该网络设备具体可以为接入网设备(比如基站、eNB、gNB等等)。进一步地,该第二设备具体可以为具备多个天线的网络设备,具体的,该第二设备具体可以为具备多个天线的接入网设备。
在第一设备执行前述S210之前,以及在第二设备执行前述S310之前,第二设备的处理,还可以包括:该第二设备向第一设备发送认证请求信令;该认证请求信令可以用于为第一设备供电并且用于第一设备确定启动进入认证处理过程。相应的,第一设备的处理,还可以包括:所述第一设备接收所述第二设备发送的认证请求信令,启动进入认证处理过程。这是由于该第一设备为零功耗设备,因此该第二设备需要通过向第一设备发送该认证请求信令,来为第一设备供电并使得第一设备启动进入认证处理过程。这里,所述认证处理过程可以包括第一设备执行前述S210~S220的处理,相应的,第二设备执行前述S310的处理。
可选地,在所述第二设备向第一设备发送认证请求信令之后,可以直接执行前述S310,即直接发送所述下行信号;相应的,第一设备执行前述S210。
可选地,在所述第一设备接收到前述认证请求信令之后,执行前述S210之前,还可以包括:所述第一设备基于预设算法对第二密钥进行处理得到第三序列;所述第一设备发送携带所述第三序列的所述第一导频。相应的,第二设备接收到第一导频。
该第三序列具体可以表示为:s=diag(s
t1,…,s
tL);其中,s表示第三序列,L为第三序列的长度,s
tn表示该第三序列中第n位的值,n为大于等于1且小于等于L的整数,也就是说“s
t1,…,s
tL”表示该第三序列中每一位的值。应理解,前述第三序列的长度L可以为大于或等于1的正整数,可以为根据实际情况预先设置的。
其中,所述第二密钥可以为预先配置在所述第一设备的。一种示例中,该第二密钥可以为不变的;又一种示例中,该第二密钥可以是基于密钥流生成器得到的密钥。
其中,所述预设算法可以为根据实际情况设置的,所述预设算法可以为以下之一:随机数算法、密码算法。所述随机数算法,可以为:产品电子代码(EPCTM)协议中规定的算法,具体可以通过该协议中规定的伪随机数生成器实现,这里不对其进行限定。所述密码算法,可以为:轻量级密码算法;示例性的,该轻量级密码算法可以包括以下任意之一:SPECK算法,SIMON(西蒙)算法;应理解,这里仅为对密码算法的示例性说明,实际处理中可以采用其他任意类型的密码算法,均在本实施例的保护范围内,只是不做穷举。
示例性的,假设预设算法为随机数算法,具体为基于伪随机数生成器实现的,则所述第一设备基于预设算法对第二密钥进行处理得到第三序列,具体可以采用以下公式实现:s=PRNG(K
2);其中,K
2表示第二密钥;PRNG(·)表示伪随机数生成器使用的随机数算法;s表示第三序列。示例性的,假设预设算法为轻量级密码算法,则所述第一设备基于预设算法对第二密钥进行处理得到第三序列,具体可以采用以下公式实现:s=MAC(K
2);其中,K
2表示第二密钥;MAC(·)表示轻量级密码算法;s表示第三序列。
需要指出的是,本申请实施例中,无论采用上述哪种预设算法,都需要第一设备和第二设备在处理过程中采用相同的预设算法,比如,第一设备和第二设备均采用SIMON(西蒙)算法,又比如,第一设备和第二设备均采用随机数算法,只要第一设备和第二设备使用相同的预设算法即在本申请实施例保护范围内,这里不对全部可能的情况进行穷举。
所述第一设备发送携带所述第三序列的所述第一导频,可以指的是:该第一设备基于该第三序列进行信号调制生成并发送该第一导频。比如,可以是将第三序列调制到载波上得到该第一导频,关于其具体的调制方式,本实施例不进行限定。
第二设备发送的下行信号可以随着场景不同携带不同的内容,第一设备也会基于携带不同内容的下行信号进行不同的处理,下面结合不同的场景进行多种实施方式的说明:
在一种可能的实施方式中,所述下行信号仅携带第一信息。
具体的,所述第一信息为第二设备基于第二序列生成的,所述第二序列为基于所述第一密钥生成的。
可选地,第二设备接收到第一导频;第二设备在接收到该第一导频后,再执行前述S310。
所述第一信息为所述第二设备基于信道估计值和第二序列生成的;所述信道估计值为所述第二设备基于所述第二序列对接收到的第一导频进行信道估计得到的。具体的,在前述S320中,所述第二设备发送下行信号,可以包括:所述第二设备基于预设算法对第一密钥处理,得到第二序列;所述第二设备基于所述第二序列,生成第一信息;所述第二设备发送携带所述第一信息的所述下行信号。其中,所述第二设备基于所述第二序列,生成第一信息,包括:所述第二设备基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值;所述第二设备基于所述第二序列以及所述信道估计值,生成第一信息。
其中,所述信道估计值的维度,与所述第二设备的天线数量相关。
所述第二设备接收到的第一导频为经过信道传输后的包含第二设备侧的高斯噪声的信号,具体的,该第二设备接收到的第一导频可以表示为:
Y
R=[y
1,…,y
L]
r×L=H
TRs+N
R
其中,Y
R为第二设备接收到的第一导频,H
TR可以为第一设备至第二设备之间的信道估计矩阵,
r为第二设备的天线个数,r为大于等于1的正整数;N
R为第二设备侧的高斯噪声,且
为噪声功率;s为第一导频携带的第三序列。
其中,所述预设算法与前述第一设备使用的预设算法相同,具体在前述实施例已经说明,这里不做赘述。
所述第一密钥为所述第二设备侧预设的密钥,优选地,该第一密钥与前述第二密钥相同。示例性的,该第一密钥可以为不变的。示例性的,该第一密钥可以是基于密钥流生成器得到的密钥;需要理解的是,若第二密钥为基于密钥流生成器得到的密钥,则第一密钥也为密钥流生成器得到的密钥,也就是说,第一设备和第二设备分别生成密钥,这种情况下,需要保证两者在一次交互中生成的密钥相同,比如,在第一设备基于密钥流生成器第一次生成第二密钥,基于该第二密钥生成并发送第一导频;相应的,第二设备接收到该第一导频时,基于密钥流生成器第一次生成第一密钥,由于在这一次交互中,第一设备和第二设备均为第一次生成密钥,因此第二密钥和第一密钥理论上应为相同的。
所述第二设备基于预设算法对第一密钥处理,得到第二序列,具体为:所述第二设备基于预设算法直接对第一密钥进行计算,得到第二序列。前述第二序列具体可以表示为:
其中,s
R表示第二序列,L为第二序列的长度,该第二序列的长度与前述第三序列的长度相同;
表示 该第二序列中第n位的值,n为大于等于1且小于等于L的整数,也就是说
则表示该第二序列中每一位的值;若第二密钥与第一密钥相同,且采用相同的预设算法,则前述第二序列中第n位的值
应与第三序列中第n位的值s
tn相同。
假设预设算法为随机数算法,具体为基于伪随机数生成器实现的,则所述第二设备基于预设算法对第一密钥处理,得到第二序列,具体可以采用以下公式实现:s
R=PRNG(K
1);其中,K
1表示第一密钥;PRNG(·)表示伪随机数生成器使用的随机数算法;s
R表示第二序列。假设预设算法为轻量级密码算法,则所述第二设备基于预设算法对第一密钥处理,得到第二序列,具体可以采用以下公式实现:s
R=MAC(K
1);其中,K
1表示第一密钥;MAC(·)表示轻量级密码算法;s
R表示第二序列。应理解,这里仅为示例性说明,不对全部可能的预设算法进行穷举。
所述第二设备基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值,具体可以为:所述第二设备将接收到的第一导频与前述第二序列相除,得到信道估计值。这里将第二设备得到的该信道估计值表示为
若第二设备生成的第二序列,与第一导频中的第三序列相同,则得到的信道估计值
与前述信道估计矩阵H
TR应为近似的。
前述实施例已经说明,该第二设备可以为网络设备,具体可以为接入网设备,比如基站、eNB、gNB中任意之一;该接入网设备通常为多个天线的,因此本实施例中第二设备可以为多个天线的设备。假设该第二设备的天线数量为r,则前述信道估计值
前述信道估计矩阵H的维度均为r(r为大于等于1的正整数)。本实施方式中,将信道估计值表示为:
假设信道估计值中的第i位表示为
该第i位可以表示第i个天线对应的信道估计值,i为大于等于1且小于等于r的整数,该
的长度等于L。
所述第二设备基于所述第二序列以及所述信道估计值,生成第一信息,可以为:所述第二设备基于第一预设函数对所述第二序列以及所述信道估计值进行计算,生成第一信息。
其中,第一预设函数可以表示为χ,相应的第一信息X,可以表示为:
具体的,该第一预设函数的计算可以是,将第二序列分别除以信道估计值中的每一个天线对应的信道估计值,则得到该第一信息X的处理可以采用以下公式表示:
在得到前述第一信息之后,第二设备可以通过下行信号携带该第一信息,并发送至第一设备。这里,所述下行信号可以为射频信号,比如,第二设备可以通过调制将该第一信息携带在下行信号中,具体的调制方式这里不进行限定。
在第一设备接收到该下行信号后,可以执行前述S220,所述第一设备基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果,包括:所述第一设备在所述第一序列以及所述接收到的下行信号中携带的所述第一信息之间的相似度,满足预设条件的情况下,确定所述认证结果为认证通过;和/或,所述第一设备在所述第一序列以及所述接收到的下行信号中携带的所述第一信息之间的相似度,不满足预设条件的情况下,确定所述认证结果为认证失败。
这里,所述第一序列与前述第三序列相同,也就是说,前述第一设备在执行S210时就可以生成第三序列,并保存该第三序列;在第一设备执行S220时,将该第三序列作为第一序列,基于该第一序列对所述接收到的下行信号中的第一信息进行认证,得到认证结果。应理解,本实施方式中,虽然第一序 列与第三序列相同,但是为了理解,将该第一序列表示为s
T。
所述第一设备接收到的下行信号与前述第二设备发出的下行信号存在不同,这是由于第一设备接收到的下行信号也是经过信道传输后的下行信号。
本实施方式中,将该第一设备接收到的下行信号表示为:y
T=[y
1,…,y
L]=H
RTX+N
T;其中,N
T为第一设备侧的高斯噪声,
为噪声功率,其中CN(0,
)表示N
T的分布均值为0,方差为
X为前述第一信息;H
RT为第二设备与第一设备之间的信道估计矩阵。
若第一设备和第二设备之间的信道满足互易性,则H
RT=H
TR,也就是该第一设备侧与第二设备侧的信道估计矩阵为相同的。基于前述实施例的说明,可以看出X是s
R除以信道估计值
得到的,因此,若第二设备侧得到的信道估计值近似与H
TR相同,则最终可以得到y
T=s
R+N
T。
所述第一序列和所述接收到的下行信号中携带的所述第一信息的相似度的计算方式,可以是基于欧几里德距离计算相似度,或者可以是基于余弦相似度计算相似度,或者可以是基于曼哈顿距离计算相似度、或者可以是基于切比雪夫距离计算相似度、或者可以是基于杰卡德距离计算相似度,或者还可以采用其他方式计算相似度,这里不做穷举。相应的,所述预设条件可以是相似度在预设的一定范围内,这里可以根据实际采用的相似度计算方式来设置对应的预设条件,本实施例不做限定。
在一种优选的示例中,所述方法还包括:所述第一设备基于所述第一序列和所述接收到的下行信号中携带的所述第一信息进行计算,得到第一数值;在所述第一数值在预设阈值范围内的情况下,确定所述第一序列以及所述接收到的下行信号中携带的所述第一信息之间的相似度,满足预设条件。另外,还可以包括:在所述第一数值不在预设阈值范围内的情况下,确定所述第一序列以及所述接收到的下行信号中携带的所述第一信息之间的相似度,不满足预设条件。
所述第一设备基于所述第一序列和所述接收到的下行信号中的所述第一信息进行计算,得到第一数值,其中,计算可以采用以下公式:
其中,
表示实部;y
T表示第一信息,其表示方式在前述实施例已经说明,不做赘述;s
T表示第一序列,s
T
T表示对该第一序列的转置;t表示第一数值。进一步地,前述已经说明y
T=s
R+N
T,则将该y
T代入前述公式后,可以得到:
具体来说,在y
T=s
R+N
T中,s
R为实数,则直接使用该s
R和s
T
T相乘为实数;N
T为第一设备侧的高斯噪声,其可能为复数,N
Ts
T
T相乘可能存在虚部,因此采用
表示仅保留相乘计算后的实部。在第一设备侧还需要做如下假设:
下行信号(或下行信号中的第一信息)来源于合法读写器(即合法的第二设备);
下行信号(或下行信号中的第一信息)不是来源于合法读写器(即合法的第二设备);在假设
下,前述第一数值(即t)为一个高斯随机变量,其分布表示为
即t的均值为s
R和s
T
T的乘积结果,方差为
其中,
具体可以为
关于L和
的说明与前述实施例相同,不做赘述。
前述预设阈值范围,可以是基于给定的目标虚警概率得到的,该目标虚警概率可以根据实际情况设置,比如可以为小于0.05,或者可以小于0.01,或者更大或更小,这里不对其进行限定。
也就是在第一设备侧判断由接收到的下行信号和第一设备本地产生的第一序列计算得到的第一数值t,是否在预设阈值范围内;若在预设阈值范围内,则判为真,确定所述第一序列以及所述接收到的下行信号中的所述第一信息之间的相似度,满足预设条件,进而确定所述认证结果为认证通过。另外,若不在预设阈值范围内,则确定所述第一序列以及所述接收到的下行信号中的所述第一信息之间的相似度,不满足预设条件,进而确定所述认证结果为认证失败。再进一步地,前述预设阈值范围可以为小于或等于一个预设值Γ;相应的,若第一设备确定前述第一数值t小于Γ,则确定该第一数值t在预设阈值范围内。
可选地,在所述第二设备向第一设备发送认证请求信令之后,可以直接执行前述S310,即直接发 送所述下行信号;相应的,第一设备执行前述S210。这里,该第一信息可以仅包含前述第二序列。所述第二设备发送下行信号,包括:所述第二设备基于预设算法对第一密钥处理,得到第二序列;所述第二设备基于所述第二序列,生成第一信息;所述第二设备发送携带所述第一信息的所述下行信号。关于该第二序列的生成方式与前述实施例相同,这里不做赘述。这种情况下,第一设备接收到该下行信号后生成第一序列的方式,基于第一序列对所述接收到的下行信号中携带的所述第一信息进行认证的处理,与前述实施例均为相同的,只是在本实施方式中,前述第一信息X不使用信道估计值进行计算,相应的在第一设备侧基于所述第一序列和所述接收到的下行信号中携带的所述第一信息进行计算,得到第一数值时,该第一数值与前述取值可能不同,进而采用的预设阈值范围可能存在不同,具体不做限定。
在本实施方式中,第一设备的处理还可以包括:在所述认证结果为认证通过的情况下,所述第一设备发送携带第一上行业务数据的上行信号。相应的,第二设备的处理还可以包括:所述第二设备接收所述第一设备发送的携带第一上行业务数据的上行信号。
其中,所述在所述认证结果为认证通过的情况下,所述第一设备发送携带第一上行业务数据的上行信号,具体可以包括:在所述认证结果为认证通过的情况下,所述第一设备判断是否存在待传输的上行业务数据,若存在,则将该待传输的上行业务数据作为第一上行业务数据,发送携带该第一上行业务数据的上行信号。
也就是说,若第一设备基于前述下行信号进行认证,得到认证结果为认证通过,则可以确认第二设备为合法设备,因此可以在存在待传输的上行业务数据的情况下,将该第一上行业务数据携带在上行信号中发送给第二设备;相应的,该第二设备接收到该携带第一上行业务数据的上行信号后,可以对该上行信号进行解析并得到本次传输的第一上行业务数据,进行后续处理,这里不对其可能执行的处理进行赘述。
另外,还可以包括:在认证结果为认证失败的情况下,第一设备可以结束处理,等待下一次接收到认证请求信令进行下一次处理。
结合图4,以第一设备为标签,第二设备为读写器为例,对本实施方式提供的方案进行示例性说明:
S401:读写器向标签发送认证请求信令。
该认证请求信令用于为标签供电,并使得标签启动认证处理过程。
S402:标签向读写器发送第一导频。
这里,所述第一导频携带第三序列s=diag(s
t1,…,s
tL);所述第三序列为标签基于预设算法对第二密钥处理得到的,关于生成该第三序列、发送第一导频的具体说明与前述实施例相同,不做重复说明。
S403:读写器基于预设算法对第一密钥处理,得到第二序列,基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值,基于所述第二序列以及所述信道估计值,生成第一信息。
读写器接收到的第一导频可以表示为Y
R=[y
1,…,y
L]
r×L=H
TRs+N
R,关于Y
R的具体说明与前述实施例相同,也不做赘述。
其中,关于第一密钥、第二密钥的说明,与前述实施例相同,不做重复说明;关于信道估计值、第二序列、第一信息的生成方式与前述实施例均为相同的,不做赘述。
S404:读写器发送下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的。
所述第一信息为第二设备基于第二序列生成的,所述第二序列为基于所述第一密钥生成的。具体的,所述第一信息为所述第二设备基于信道估计值和第二序列生成的;所述信道估计值为所述第二设备基于所述第二序列对接收到的第一导频进行信道估计得到的。
S405:标签基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果;所述第一序列与所述第三序列相同。
检验导频序列是否来源于合法阅读器的方法是:判断由接收信号和本地私密导频计算得到的检验统计量t是否在阈值范围内,当t<Γ,则判为真,并执行下行业务命令;否则为假,认证失败。
另外,在完成S405得到认证结果之后,若该认证结果为认证通过,则标签可以确认该读写器为合法读写器,进而发送携带第一上行业务数据的上行信号。相应的,读写器接收所述标签发送的携带第一上行业务数据的上行信号,该读写器可以对该第一上行业务数据进行后续处理,这里不做赘述。
在另一种可能的实施方式中,所述下行信号除了携带第一信息外,该下行信号还携带第一下行业务命令。
本实施方式中,第一下行业务命令为第二设备要发送给第一设备的原始下行业务命令;其具体内容本实施例不做限定。
可选地,第二设备接收到第一导频;第二设备在接收到该第一导频后,再执行前述S310。
所述第一信息为所述第二设备基于信道估计值和第二序列生成的;所述信道估计值为所述第二设备基于所述第二序列对接收到的第一导频进行信道估计得到的。在前述S310中,所述第二设备发送下行信号,可以包括:所述第二设备基于预设算法对第一密钥处理,得到第二序列;所述第二设备基于所述第二序列,生成第一信息;所述第二设备发送携带所述第一信息的所述下行信号。其中,所述第二设备基于所述第二序列,生成第一信息,包括:所述第二设备基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值;所述第二设备基于所述第二序列以及所述信道估计值,生成第一信息。
关于该第二设备接收到的第一导频的具体说明,与前述实施例相同,不做重复说明;应理解的是,在本实施方式中,前述第二设备接收到的第一导频也与前述实施例相同,可以表示为:
关于其中的参数定义也与前述实施例相同,不做赘述。
与前述实施例不同在于,本实施方式中,所述第二序列为所述第二设备基于所述第一密钥以及所述第一下行业务命令生成的。具体的,所述第二设备基于预设算法对第一密钥处理,得到第二序列,包括:所述第二设备基于所述预设算法,对所述第一密钥以及所述第一下行业务命令进行处理,得到所述第二序列。
示例性的,假设预设算法为随机数算法,具体为基于伪随机数生成器实现的;则所述第二设备基于所述预设算法,对所述第一密钥以及所述第一下行业务命令进行处理,得到所述第二序列,可以包括:所述第二设备基于所述第一下行业务命令计算得到第一循环冗余校验码;基于所述随机数算法,对所述第一密钥以及所述第一循环冗余校验码进行计算,得到所述第二序列。这里,关于第二设备基于所述第一下行业务命令计算得到第一循环冗余校验码,可以是采用预设的循环冗余编码器生成的,该预设的循环冗余编码器可以为EPC协议中固有的或规定的循环冗余编码器,关于其具体的处理方式,本实施例不做限定。
本示例中,得到该第二序列的计算方式可以采用以下公式表示:s
R=PRNG(K
1,CRC(Command
1)
1);其中,K
1表示第一密钥;Command
1表示第一下行业务命令;PRNG(·)表示伪随机数生成器使用的随机数算法,CRC(·)为EPCTM协议中固有的循环冗余编码器,CRC(Command
1)
1即第一循环冗余校验码;s
R表示第二序列。示例性的,假设预设算法为轻量级密码算法;则所述第二设备基于所述预设算法,对所述第一密钥以及所述第一下行业务命令进行处理,得到所述第二序列,可以包括:所述第二设备基于所述轻量级密码算法,对所述第一密钥以及所述第一下行业务命令进行计算,得到所述第二序列。本示例中,得到该第二序列的计算方式可以采用以下公式表示:s
R=MAC(K
1,Command
1);其中,K
1表示第一密钥;Command
1表示第一下行业务命令;MAC(·)表示轻量级密码算法;s
R表示第二序列。应理解,这里仅为示例性说明,不对全部可能的预设算法的处理进行穷举。
所述第二设备基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值,具体可以为:所述第二设备将接收到的第一导频与前述第二序列相除,得到信道估计值。这里将第二设备得到的该信道估计值表示为
若第二设备生成的第二序列,与第一导频中的第三序列相同,则得到的信道估计值
与前述信道估计矩阵H
TR应为近似的。
需要说明,本实施方式与前述仅根据第一密钥生成第二序列的处理方式相比,由于第二序列的生成方式不同,因此第二设备得到的信道估计值与前述实施例不同,但是关于第二设备得到该信道估计值的具体处理方式与前述实施例是相同的,因此不对其具体处理方式进行重复说明。
所述第二设备基于所述第二序列以及所述信道估计值,生成第一信息,可以为:所述第二设备基于第一预设函数对所述第二序列以及所述信道估计值进行计算,生成第一信息。其中,第一预设函数可以表示为χ,相应的第一信息X,可以表示为:
关于其具体说明与前述实施例相同,不再重复。
需要说明,本实施方式与前述仅根据第一密钥生成第二序列的处理方式相比,由于第二序列的生成方式不同,因此第二设备得到的第一信息的具体内容与前述实施例不同,但是关于第二设备得到该第一信息的具体处理方式、以及第一预设函数与前述实施例是相同的,因此不进行重复说明。
第二设备可以通过下行信号的第一信号部分携带该第一信息,通过下行信号的第二信号部分携带第一下行业务命令,并发送该下行信号至第一设备。这里,所述下行信号可以为射频信号,第二设备可以通过调制将该第一信息以及第一下行业务命令携带在下行信号中,并且该下行信号可以是在时域上对第一信号部分和第二信号部分进行划分,比如可以是先传输第一信号部分后传输第二信号部分,或者反之,均在本实施例保护范围内,关于第二设备使用的具体的调制方式这里不进行限定。在第一设备接收到该下行信号后,可以执行前述S220,所述第一设备基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果。
这里,所述第一序列与前述第三序列不同,该第一设备生成第一序列的方式,可以包括:所述第一设备基于预设算法对第二密钥以及所述第一下行业务命令进行处理,得到所述第一序列。
所述第一设备基于预设算法对第二密钥以及所述第一下行业务命令进行处理,得到所述第一序列之前,可以包括:所述第一设备从接收到的下行信号中获取第一下行业务命令。
该第一设备与第二设备采用的预设算法为相同的。假设第一设备和第二设备采用的预设算法为随机数算法,具体为基于伪随机数生成器实现的;则所述第一设备基于预设算法对第二密钥以及所述第一下行业务命令进行处理,得到所述第一序列,可以包括:所述第一设备基于所述第一下行业务命令计算得到第二循环冗余校验码;基于所述随机数算法,对所述第二密钥以及所述第二循环冗余校验码进行计算,得到所述第一序列。这里,关于第一设备基于所述第一下行业务命令计算得到第二循环冗余校验码,可以是采用预设的循环冗余编码器生成的,该预设的循环冗余编码器可以为EPC协议中固有的或规定的循环冗余编码器,关于其具体的处理方式,本实施例不做限定。其中,得到该第一序列的计算方式可以采用以下公式表示:s
T=PRNG(K
2,CRC(Command
1)
2);其中,K
2表示第二密钥;Command
1表示第一下行业务命令;PRNG(·)表示伪随机数生成器使用的随机数算法,CRC(·)为EPCTM协议中固有的循环冗余编码器;s
T表示第一序列。这里,若第一设备解析得到的第一下行业务命令,与第二设备传输的第一下行业务命令相同,则第二循环冗余校验码CRC(Command
1)
2应与前述第一循环冗余校验码CRC(Command
1)
1相同的。
假设第一设备和第二设备采用的预设算法为轻量级密码算法;则所述第一设备基于预设算法对第二密钥以及所述第一下行业务命令进行处理,得到所述第一序列,可以包括:所述第一设备基于所述轻量级密码算法,对所述第二密钥以及所述第一下行业务命令进行计算,得到所述第一序列。本示例中,得到该第一序列的计算方式可以采用以下公式表示:s
T=MAC(K
2,Command
1);其中,K
2表示第二密钥;Command
1表示第一下行业务命令。
应理解,这里仅为示例性说明,不对全部可能的预设算法的处理进行穷举。
所述第一设备接收到的下行信号与前述第二设备发出的下行信号存在不同,这是由于第一设备接收到的下行信号也是经过信道传输后的下行信号。本实施方式中,假设第一设备可以无差错的解码得到第一下行业务命令,则将该第一设备接收到的下行信号中携带的所述第一信息表示为:y
T=[y
1,…,y
L]=H
RTX+N
T;其中,各个参数的具体说明与前述实施例相同。若第一设备和第二设备之间的信道满足互易性,则H
RT=H
TR,也就是该第一设备侧与第二设备侧的信道估计矩阵为相同的。基于前述实施例的说明,可以看出X是s
R除以信道估计值
得到的,因此,若第二设备侧得到的信道估计值近似与H
TR相同,则最终可以得到y
T=s
R+N
T。
所述第一设备基于所述第一序列,对所述接收到的下行信号中的第一信息进行认证,得到认证结果的处理与前述实施例也是相同的,不做赘述。
可选地,在所述第二设备向第一设备发送认证请求信令之后,可以直接执行前述S310,即直接发送所述下行信号;相应的,第一设备执行前述S210。这里,下行信号携带第一信息以及第一下行业务命令;该第一信息可以仅包含前述第二序列。关于该第二序列的生成方式为所述第二设备基于所述第一密钥以及所述第一下行业务命令生成的,具体说明与前述实施例相同,这里不做赘述。这种情况下,第一设备接收到该下行信号后生成第一序列的方式,基于第一序列对所述接收到的下行信号中携带的所述第一信息进行认证的处理,与前述实施例相同,只是在本实施方式中,前述第一信息X不使用信道估计值进行计算,相应的在第一设备侧基于所述第一序列和所述接收到的下行信号中携带的所述第一信息进行计算,得到第一数值时,该第一数值与前述取值可能不同,进而采用的预设阈值范围可能存在不同, 具体不做限定。
在本实施方式中,第一设备的处理还可以包括:在所述认证结果为认证通过的情况下,所述第一设备执行所述第一下行业务命令。另外,还可以包括:在认证结果为认证失败的情况下,第一设备可以结束处理,等待下一次接收到认证请求信令进行下一次处理。
进一步地,还可以包括:在所述认证结果为认证通过的情况下,所述第一设备发送携带第一上行业务数据的上行信号。相应的,第二设备的处理还可以包括:所述第二设备接收所述第一设备发送的携带第一上行业务数据的上行信号。具体的说明与前述实施例相同,不做重复说明。
结合图5,以第一设备为标签,第二设备为读写器为例,对本实施方式提供的方案进行示例性说明:
S501:读写器向标签发送认证请求信令。
该认证请求信令用于为标签供电,并使得标签启动认证处理过程。
S502:标签向读写器发送第一导频。
这里,所述第一导频的说明与前述实施例相同,不做赘述。
S503:读写器基于所述预设算法,对第一密钥以及第一下行业务命令进行处理,得到第二序列;基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值;基于所述第二序列以及所述信道估计值,生成第一信息。
读写器接收到的第一导频具体说明与前述实施例相同,也不做赘述。其中,关于第一密钥、第二密钥的说明,与前述实施例相同,不做重复说明;关于信道估计值、第二序列、第一信息的生成方式与前述实施例均为相同的,不做赘述。
S504:读写器发送下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;所述下行信号,还携带第一下行业务命令。
所述信道估计值为所述读写器基于所述第二序列对接收到的第一导频进行信道估计得到的;所述第二序列为所述读写器基于第一密钥生成的。读写器生成第二序列的处理,可以包括:读写器基于所述预设算法,对所述第一密钥以及所述第一下行业务命令进行处理,得到所述第二序列。具体的处理方式在前述实施例已经说明,这里不做重复说明。
S505:标签接收下行信号,基于预设算法对第二密钥以及第一下行业务命令进行处理,得到所述第一序列。
关于标签生成第一序列的方式在前述实施例已经详细说明,不做赘述。
S506:标签基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果;在所述认证结果为认证通过的情况下,执行S507;在所述认证结果为认证失败的情况下,结束处理。
关于认证的处理方式与前述实施例相同,不做赘述。
S507:标签执行所述第一下行业务命令。
在又一种可能的实施方式中,所述下行信号除了携带第一信息外,该下行信号还携带第一下行业务命令。其中,所述第一下行业务命令,为所述第二设备基于第一扰码对第二下行业务命令加扰后得到的;所述第一扰码为所述第二设备基于第一密钥生成的。
可选地,第二设备接收到第一导频;第二设备在接收到该第一导频后,再执行前述S310。
在前述S310中,所述第二设备发送下行信号,可以包括:所述第二设备基于预设算法对第一密钥处理,得到第二序列;所述第二设备基于所述第二序列,生成第一信息;所述第二设备发送携带所述第一信息的所述下行信号。其中,所述第二设备基于所述第二序列,生成第一信息,包括:所述第二设备基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值;所述第二设备基于所述第二序列以及所述信道估计值,生成第一信息。
关于该第二设备接收到的第一导频的具体说明,与前述实施例相同,不做重复说明。
与前述实施例不同在于,本实施方式中,所述第二序列为所述第二设备基于所述第一密钥以及所述第二下行业务命令生成的。具体的,所述第二设备基于预设算法对第一密钥处理,得到第二序列,包括:所述第二设备基于所述预设算法,对所述第一密钥以及所述第二下行业务命令进行处理,得到所述第二序列。
假设预设算法为随机数算法,具体为基于伪随机数生成器实现的;则所述第二设备基于所述预设算法,对所述第一密钥以及所述第二下行业务命令进行处理,得到所述第二序列,可以包括:所述第二设备基于所述第二下行业务命令计算得到第三循环冗余校验码;基于所述随机数算法,对所述第一密钥以及所述第三循环冗余校验码进行计算,得到所述第二序列。这里,关于第二设备基于所述第二下行业务命令计算得到第三循环冗余校验码,可以是采用预设的循环冗余编码器生成的,该预设的循环冗余编码器可以为EPC协议中固有的或规定的循环冗余编码器,关于其具体的处理方式,本实施例不做限定。 得到该第二序列的计算方式可以采用以下公式表示:s
R=PRNG(K
1,CRC(Command
2)
3);其中,K
1表示第一密钥;Command
2表示第二下行业务命令;PRNG(·)表示伪随机数生成器使用的随机数算法,CRC(·)为EPCTM协议中固有的循环冗余编码器,CRC(Command
2)
3即第三循环冗余校验码;s
R表示第二序列。
假设预设算法为轻量级密码算法;则所述第二设备基于所述预设算法,对所述第一密钥以及所述第二下行业务命令进行处理,得到所述第二序列,可以包括:所述第二设备基于所述轻量级密码算法,对所述第一密钥以及所述第二下行业务命令进行计算,得到所述第二序列。本示例中,得到该第二序列的计算方式可以采用以下公式表示:s
R=MAC(K
1,Command
2);其中,K
1表示第一密钥;Command
2表示第二下行业务命令;MAC(·)表示轻量级密码算法;s
R表示第二序列。
应理解,这里仅为示例性说明,不对全部可能的预设算法的处理进行穷举。
所述第二设备基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值,具体可以为:所述第二设备将接收到的第一导频与前述第二序列相除,得到信道估计值。需要说明,本实施方式与前述仅根据第一密钥生成第二序列的处理方式相比,由于第二序列的生成方式不同,因此第二设备得到的信道估计值与前述实施例不同,但是关于第二设备得到该信道估计值的具体处理方式与前述实施例是相同的,因此不对其具体处理方式进行重复说明。
所述第二设备基于所述第二序列以及所述信道估计值,生成第一信息,可以为:所述第二设备基于第一预设函数对所述第二序列以及所述信道估计值进行计算,生成第一信息。需要说明,本实施方式与前述仅根据第一密钥生成第二序列的处理方式相比,由于第二序列的生成方式不同,因此第二设备得到的第一信息与前述实施例不同,但是关于第二设备得到该第一信息的具体处理方式、以及第一预设函数与前述实施例是相同的,因此不进行重复说明。
在所述第二设备发送前述下行信号之前,还会对所述第二下行业务命令进行加扰,具体的所述方法还包括:所述第二设备基于所述第一密钥生成第一扰码;所述第二设备基于第一扰码对第二下行业务命令进行加扰,得到所述第一下行业务命令。
其中,所述第二设备基于所述第一密钥生成第一扰码的处理,可以为基于密码算法实现。该密码算法具体可以为轻量级密码算法,比如SPECK,SIMON算法等等任意之一,这里不对全部可能的密码算法进行穷举。该第二设备基于所述第一密钥生成第一扰码的处理,可以采用以下公式表示:Scrambling
RT-1=MAC(K
1),其中MAC(·)为轻量级密码算法,K
1表示第一密钥,Scrambling
RT-1表示第一扰码。
前述加扰方式可以为相乘的方式,比如,所述第二设备基于第一扰码对第二下行业务命令进行加扰,得到所述第一下行业务命令,可以是基于第一扰码与第二下行业务命令相乘,得到所述第一下行业务命令。应理解,这里仅为示例性说明,实际处理中还可以采用其他加扰方式,本实施例不做穷举。
还需要说明的是,前述实施例中,在第一设备和第二设备侧生成第一序列、第三序列、第二序列时会采用相同的预设算法,该预设算法也可能为轻量级密码算法;关于生成第一扰码所使用的轻量级密码算法,和生成第一序列、第三序列、第二序列所使用的轻量级密码算法,可以相同也可以不同,可以根据实际情况进行设置,本实施例不对其进行限定。
第二设备可以通过下行信号的第一信号部分携带该第一信息,通过下行信号的第二信号部分携带第一下行业务命令,并发送该下行信号至第一设备。这里,关于具体的发送方式与前述实施例相同,不做赘述。在第一设备接收到该下行信号后,可以执行前述S220,所述第一设备基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果。
在本实施方式中,所述第一序列与前述第三序列不同,该第一设备生成第一序列的方式,可以包括:所述第一设备基于预设算法对所述第二密钥以及第三下行业务命令进行处理,得到所述第一序列。
所述第一设备基于预设算法对所述第二密钥以及第三下行业务命令进行处理,得到所述第一序列之前,可以包括:所述第一设备基于第二扰码,对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到第三下行业务命令;其中,所述第二扰码为基于所述第二密钥生成的。
其中,所述第二扰码的生成方式,可以包括:所述第一设备基于所述第二密钥生成第二扰码。第一设备可以基于密码算法实现前述生成第二扰码的处理。第一设备使用的密码算法与前述第二设备相同, 该密码算法具体可以为轻量级密码算法,比如SPECK,SIMON算法等等任意之一,这里不对全部可能的密码算法进行穷举。在第一设备与第二设备的第二密钥和第一密钥相同,且采用的密码算法相同的情况下,该第二扰码和第一扰码应该为相同的。该第一设备基于所述第二密钥生成第二扰码的处理,可以采用以下公式表示:Scrambling
RT-2=MAC(K
2),其中MAC(·)为轻量级密码算法,K
2表示第二密钥,Scrambling
RT-2表示第二扰码。
在前述第二扰码与第一扰码相同的情况下,第一设备解扰得到的前述第三下行业务命令,应该与前述第二设备发出的第二下行业务命令相同。
假设第一设备和第二设备采用的预设算法为随机数算法,具体为基于伪随机数生成器实现的;则所述第一设备基于预设算法对所述第二密钥以及第三下行业务命令进行处理,得到所述第一序列,可以包括:所述第一设备基于所述第三下行业务命令计算得到第四循环冗余校验码;基于所述随机数算法,对所述第二密钥以及所述第四循环冗余校验码进行计算,得到所述第一序列。这里,关于第一设备基于所述第三下行业务命令计算得到第四循环冗余校验码,可以是采用预设的循环冗余编码器生成的,该预设的循环冗余编码器可以为EPC协议中固有的或规定的循环冗余编码器,关于其具体的处理方式,本实施例不做限定。
本示例中,得到该第一序列的计算方式可以采用以下公式表示:s
T=PRNG(K
2,CRC(Command
3)
4);其中,K
2表示第二密钥;Command
3表示第三下行业务命令;PRNG(·)表示伪随机数生成器使用的随机数算法,CRC(·)为EPCTM协议中固有的循环冗余编码器;s
T表示第一序列。这里,若第一设备解析得到的第三下行业务命令,与第二设备的第二下行业务命令相同,则第四循环冗余校验码CRC(Command
3)
4,与前述第三循环冗余校验码CRC(Command
2)
3应为相同的。
示例性的,假设第一设备和第二设备采用的预设算法为轻量级密码算法;则所述第一设备基于预设算法对所述第二密钥以及第三下行业务命令进行处理,得到所述第一序列,可以包括:所述第一设备基于所述轻量级密码算法,对所述第二密钥以及所述第三下行业务命令进行计算,得到所述第一序列。本示例中,得到该第一序列的计算方式可以采用以下公式表示:s
T=MAC(K
2,Command
3);其中,K
2表示第二密钥;Command
3表示第三下行业务命令。
应理解,这里仅为示例性说明,不对全部可能的预设算法的处理进行穷举。
所述第一设备接收到的下行信号与前述第二设备发出的下行信号存在不同,这是由于第一设备接收到的下行信号也是经过信道传输后的下行信号。本实施方式中,假设第一设备可以无差错的解码得到第三下行业务命令,则将该第一设备接收到的下行信号的第一信息表示为:y
T=[y
1,…,y
L]=H
RTX+N
T;其中,各个参数的具体说明与前述实施例相同。若第一设备和第二设备之间的信道满足互易性,则H
RT=H
TR,也就是该第一设备侧与第二设备侧的信道估计矩阵为相同的。基于前述实施例的说明,可以看出X是s
R除以信道估计值
得到的,因此,若第二设备侧得到的信道估计值近似与H
TR相同,则最终可以得到y
T=s
R+N
T。
所述第一设备基于所述第一序列,对所述接收到的下行信号中的第一信息进行认证,得到认证结果的处理与前述实施例也是相同的,不做赘述。
可选地,在所述第二设备向第一设备发送认证请求信令之后,可以直接执行前述S310,即直接发送所述下行信号;相应的,第一设备执行前述S210。这里,下行信号携带第一信息以及第一下行业务命令;该第一信息可以仅包含前述第二序列。所述第一下行业务命令,为所述第二设备基于第一扰码对第二下行业务命令加扰后得到的;所述第一扰码为所述第二设备基于第一密钥生成的,具体说明与前述实施例相同。关于该第二序列的生成方式为所述第二序列为所述第二设备基于所述第一密钥以及所述第二下行业务命令生成的,具体说明与前述实施例相同,这里不做赘述。这种情况下,第一设备接收到该下行信号后生成第一序列的方式,基于第一序列对所述接收到的下行信号中携带的所述第一信息进行认证的处理,与前述实施例均为相同的,只是在本实施方式中,前述第一信息X不使用信道估计值进行计算,相应的在第一设备侧基于所述第一序列和所述接收到的下行信号中携带的所述第一信息进行计算,得到第一数值时,该第一数值与前述取值可能不同,进而采用的预设阈值范围可能存在不同,具体不做限定。
在本实施方式中,第一设备的处理还可以包括:在所述认证结果为认证通过的情况下,所述第一设备执行所述第三下行业务命令。应理解的是,这里若前述第二密钥、第一密钥相同,第一扰码、第二扰码相同,则第三下行业务命令应该与第二设备发出的原始命令即第二下行业务命令是相同的。
进一步地,还可以包括:在认证结果为认证失败的情况下,第一设备可以结束处理,等待下一次接收到认证请求信令进行下一次处理。另外,第一设备在认证通过的情况下,还可以向第二设备发送上行业务数据,具体可以包括以下两种方式:
方式1、在所述认证结果为认证通过的情况下,所述第一设备发送携带上行业务数据的上行信号。具体的,可以是在认证结果为认证通过的情况下,所述第一设备执行所述第一下行业务命令,所述第一设备判断是否存在待传输的上行业务数据,若存在,则发送携带该上行业务数据的上行信号。相应的,第二设备的处理还可以包括:所述第二设备接收所述第一设备发送的携带上行业务数据的上行信号。
具体的说明与前述实施例相同,不做赘述。
方式2、第一设备的处理,还可以包括:在所述认证结果为认证通过的情况下,所述第一设备基于第三扰码对第一上行业务数据加扰,得到第二上行业务数据;其中,所述第三扰码为基于第三密钥生成的;所述第一设备发送携带所述第二上行业务数据的上行信号。第二设备的处理,还可以包括:所述第二设备接收所述第一设备发送的携带第二上行业务数据的上行信号;所述第二设备基于第四密钥生成第四扰码;所述第二设备基于所述第四扰码对接收到的第二上行业务数据进行解扰,得到第四上行业务数据。
其中,所述第三密钥与所述第四密钥需要为相同的。但是,所述第三密钥与前述第二密钥,可以相同也可以不同;第四密钥与前述第一密钥,可以相同也可以不同。
在第一设备与第二设备预先配置的密码相关策略中,若预先配置为第一设备和第二设备密码不变的情况下,该第三密钥与第二密钥相同,第四密钥与前述第一密钥相同,并且第三密钥与第四密钥相同。
在第一设备与第二设备预先配置的密码相关策略中,若预先配置为第一设备和第二设备每次交互均使用新密码的情况下,该第三密钥与第二密钥不同,第四密钥与前述第一密钥不同,并且第三密钥与第四密钥相同、第二密钥与第一密钥相同。其中,第一设备和第二设备每次交互均使用新密码,则可以是每次交互时,第一设备和第二设备使用的密码相同,但是完成本次交互,均分别更新得到新的密码,这种处理方式,需要第一设备和第二设备采用密钥流;这里,所述密钥流具体可以包括密钥流生成器在不同时刻生成的不同的密钥。
其中,所述第三扰码的生成方式,可以包括:所述第一设备基于所述第三密钥生成第三扰码。第一设备可以基于密码算法实现前述生成第三扰码的处理。该密码算法具体可以为轻量级密码算法,比如SPECK,SIMON算法等等任意之一,这里不对全部可能的密码算法进行穷举。该第一设备基于所述第三密钥生成第三扰码的处理,可以采用以下公式表示:Scrambling
TR-3=MAC(K
3),其中MAC(·)为轻量级密码算法,K
3表示第三密钥,Scrambling
TR-3表示第三扰码。
所述第二设备基于第四密钥生成第四扰码,可以是基于密码算法对第四密钥进行处理得到第四扰码。其中,第二设备使用的密码算法与前述第一设备相同,该密码算法具体可以为轻量级密码算法,比如SPECK,SIMON算法等等任意之一,这里不对全部可能的密码算法进行穷举。在第一设备与第二设备的第三密钥和第四密钥相同,且采用的密码算法相同的情况下,该第四扰码和第三扰码应该为相同的。该第二设备基于所述第四密钥生成第四扰码的处理,可以采用以下公式表示:Scrambling
TR-4=MAC(K
4),其中MAC(·)为轻量级密码算法,K
4表示第四密钥,Scrambling
TR-4表示第四扰码。
在前述第四扰码与第三扰码相同的情况下,所述第二设备基于所述第四扰码对接收到的第二上行业务数据进行解扰,得到第四上行业务数据时,该第四上行业务命令,应该与前述第一设备侧原始的第一上行业务命令相同。
结合图6,以第一设备为标签,第二设备为读写器为例,对本实施方式提供的方案进行示例性说明:
S601:读写器向标签发送认证请求信令。
该认证请求信令用于为标签供电,并使得标签启动认证处理过程。
S602:标签向读写器发送第一导频。
这里,所述第一导频的说明与前述实施例相同,不做赘述。
S603:读写器基于预设算法,对第一密钥以及第二下行业务命令进行处理,得到所述第二序列;基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值;基于所述第二序列以及所述信道估计值,生成第一信息。
其中,关于第一密钥、第二密钥的说明,与前述实施例相同,不做重复说明;关于信道估计值、第二序列、第一信息的生成方式与前述实施例均为相同的,不做赘述。
S604:读写器基于第一密钥生成第一扰码,基于第一扰码对第二下行业务命令进行加扰,得到第一下行业务命令。
前述S603和S604的执行顺序可以不分先后,可以同时执行S603以及S604,或者,可以先执行S603再执行S604,或者,可以先执行S604再执行S603。
S605:读写器发送下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;所述下行信号,还携带第一下行业务命令。
S606:标签接收下行信号,基于第二扰码对接收到的下行信号携带的第一下行业务命令进行解扰,得到第三下行业务命令;其中,所述第二扰码为基于第二密钥生成的。
S607:标签基于预设算法对第二密钥以及第三下行业务命令进行处理,得到所述第一序列。
S608:标签基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果;在所述认证结果为认证通过的情况下,执行S609;在所述认证结果为认证失败的情况下,结束处理。
关于认证的处理方式与前述实施例相同,不做赘述。
S609:标签执行第三下行业务命令。
本步骤中,该第三下行业务命令、与前述读写器侧原始的第二下行业务命令相同。
S610:标签基于第三扰码对第一上行业务数据加扰,得到第二上行业务数据,发送携带所述第二上行业务数据的上行信号;其中,所述第三扰码为基于第三密钥生成的。
S611:读写器接收携带第二上行业务数据的上行信号,基于第四密钥生成第四扰码;基于所述第四扰码对接收到的第二上行业务数据进行解扰,得到第四上行业务数据。
本步骤中,读写器得到的第四上行业务数据,与前述标签侧原始的第一上行业务数据相同。
再一种可能的实施方式中,所述下行信号除了携带第一信息外,该下行信号还携带第一下行业务命令。其中,所述第一下行业务命令,为所述第二设备基于所述第一扰码对所述第二下行业务命令以及第一随机数加扰后得到的;所述第一扰码为所述第二设备基于第一密钥生成的。
本处理方式中,所述第二下行业务命令为第二设备的原始下行业务命令,其具体内容本实施例不做限定;前述第一下行业务命令为对第二下行业务命令以及第一随机数加扰后得到的。
可选地,第二设备接收到第一导频;第二设备在接收到该第一导频后,再执行前述S310。
在前述S310中,所述第二设备发送下行信号的处理中,关于该第二设备接收到的第一导频的具体说明,与前述实施例相同,不做重复说明。所述第二序列为所述第二设备基于所述第一密钥以及所述第二下行业务命令生成的。具体的,所述第二设备基于预设算法对第一密钥处理,得到第二序列,包括:所述第二设备基于所述预设算法,对所述第一密钥以及所述第二下行业务命令进行处理,得到所述第二序列。所述第二设备基于所述预设算法,对所述第一密钥以及所述第二下行业务命令进行处理,得到所述第二序列的具体处理,与前述实施例是相同的,因此不做重复说明。所述第二设备基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值,具体可以为:所述第二设备将接收到的第一导频与前述第二序列相除,得到信道估计值。需要说明,本实施方式与前述仅根据第一密钥生成第二序列的处理方式相比,由于第二序列的生成方式不同,因此第二设备得到的信道估计值与前述实施例不同,但是关于第二设备得到该信道估计值的具体处理方式与前述实施例是相同的,因此不对其具体处理方式进行重复说明。
所述第二设备基于所述第二序列以及所述信道估计值,生成第一信息,可以为:所述第二设备基于第一预设函数对所述第二序列以及所述信道估计值进行计算,生成第一信息。需要说明,本实施方式与前述仅根据第一密钥生成第二序列的处理方式相比,由于第二序列的生成方式不同,因此第二设备得到的第一信息与前述实施例不同,但是关于第二设备得到该第一信息的具体处理方式、以及第一预设函数与前述实施例是相同的,因此不进行重复说明。
在所述第二设备发送前述下行信号之前,所述方法还包括:所述第二设备基于所述第一密钥生成第一扰码;所述第二设备基于第一扰码对第二下行业务命令进行加扰,得到所述第一下行业务命令。其中,所述第二设备基于所述第一密钥生成第一扰码的处理,与前述实施例相同,不做赘述。
与前述实施例不同在于,本实施方式中,所述第二设备基于第一扰码对第二下行业务命令进行加扰,得到所述第一下行业务命令,包括:所述第二设备基于所述第一扰码对所述第二下行业务命令以及第一随机数加扰,得到所述第一下行业务命令。这里,所述第一随机数可以表示为R1,该第一随机数可以为第二设备生成的,生成方式可以采用随机数算法,关于其具体计算方式,本实施例不做限定。第二设备可以通过下行信号的第一信号部分携带该第一信息,通过下行信号的第二信号部分携带第一下行业务命令,并发送该下行信号至第一设备。这里,关于具体的发送方式与前述实施例相同,不做赘述。在第 一设备接收到该下行信号后,可以执行前述S220。
所述第一序列与前述第三序列不同,该第一设备生成第一序列的方式,可以包括:所述第一设备基于预设算法对所述第二密钥以及第三下行业务命令进行处理,得到所述第一序列。关于所述第一设备基于预设算法对所述第二密钥以及第三下行业务命令进行处理,得到所述第一序列的具体处理方式,与前述实施例相同,不做重复说明。
所述第一设备基于预设算法对所述第二密钥以及第三下行业务命令进行处理,得到所述第一序列之前,可以包括:所述第一设备基于第二扰码,对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到第三下行业务命令;其中,所述第二扰码为基于所述第二密钥生成的。所述第一设备基于第二扰码,对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到第三下行业务命令,可以包括:所述第一设备基于第二扰码,对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到所述第三下行业务命令和第二随机数。
其中,所述第二扰码的生成方式与前述实施例相同。这里,所述第二随机数可以表示为R2。在前述第二扰码与第一扰码相同的情况下,第一设备解扰得到的前述第三下行业务命令,应该与前述第二设备发出的第二下行业务命令相同。同样的,第二随机数R2应与前述第一随机数R1相同。
所述第一设备接收到的下行信号与前述第二设备发出的下行信号存在不同,这是由于第一设备接收到的下行信号也是经过信道传输后的下行信号。本实施方式中,假设第一设备可以无差错的解码得到第三下行业务命令和第二随机数,则将该第一设备接收到的下行信号的第一信息表示为:y
T=[y
1,…,y
L]=H
RTX+N
T;其中,各个参数的具体说明与前述实施例相同,最终第一设备得到的该第一信息表示为y
T=s
R+N
T。关于第一设备具体得到第一信息的说明与前述实施例为相同的,不做赘述。
所述第一设备基于所述第一序列,对所述接收到的下行信号中的第一信息进行认证,得到认证结果的处理与前述实施例也是相同的,不做赘述。
可选地,在所述第二设备向第一设备发送认证请求信令之后,可以直接执行前述S310,即直接发送所述下行信号;相应的,第一设备执行前述S210。这里,下行信号携带第一信息以及第一下行业务命令;该第一信息可以仅包含前述第二序列。所述第一下行业务命令,为所述第二设备基于所述第一扰码对所述第二下行业务命令以及第一随机数加扰后得到的;所述第一扰码为所述第二设备基于第一密钥生成的,具体说明与前述实施例相同。关于该第二序列的生成方式为所述第二序列为所述第二设备基于所述第一密钥以及所述第二下行业务命令生成的,具体说明与前述实施例相同,这里不做赘述。这种情况下,第一设备接收到该下行信号后生成第一序列的方式,基于第一序列对所述接收到的下行信号中携带的所述第一信息进行认证的处理,与前述实施例均为相同的,只是在本实施方式中,前述第一信息X不使用信道估计值进行计算,相应的在第一设备侧基于所述第一序列和所述接收到的下行信号中携带的所述第一信息进行计算,得到第一数值时,该第一数值与前述取值可能不同,进而采用的预设阈值范围可能存在不同,具体不做限定。
在本实施方式中,第一设备的处理还可以包括:在所述认证结果为认证通过的情况下,所述第一设备执行所述第三下行业务命令。应理解的是,这里若前述第二密钥、第一密钥相同,第一扰码、第二扰码相同,则第三下行业务命令应该与第二设备发出的原始命令即第二下行业务命令是相同的,因此该第一设备执行所述第三下行业务命令,即第一设备执行所述第二下行业务命令。
进一步地,还可以包括:在认证结果为认证失败的情况下,第一设备可以结束处理,等待下一次接收到认证请求信令进行下一次处理。另外,第一设备在认证通过的情况下,还可以向第二设备发送上行业务数据,具体可以包括以下两种方式:
方式3、在所述认证结果为认证通过的情况下,所述第一设备发送携带上行业务数据的上行信号。具体的,可以是在认证结果为认证通过的情况下,所述第一设备执行所述第一下行业务命令,所述第一设备判断是否存在待传输的上行业务数据,若存在,则发送携带该上行业务数据的上行信号。相应的,第二设备的处理还可以包括:所述第二设备接收所述第一设备发送的携带上行业务数据的上行信号。具体的说明与前述实施例相同,不做赘述。
方式4、第一设备的处理,还可以包括:在所述认证结果为认证通过的情况下,所述第一设备基于第三扰码对第一上行业务数据以及所述第二随机数进行加扰,得到第三上行业务数据;其中,所述第三扰码为基于第三密钥生成的;所述第二随机数用于所述第二设备对所述第一设备进行认证;所述第一设备发送携带所述第三上行业务数据的上行信号。
第二设备的处理,还可以包括:所述第二设备接收所述第一设备发送的携带第三上行业务数据的上行信号;所述第二设备基于第四密钥生成第四扰码;所述第二设备基于所述第四扰码对接收到的第三上 行业务数据进行解扰,得到第五上行业务数据和第二随机数;所述第二设备基于所述第二随机数和第一随机数对所述第一设备进行认证,得到对所述第一设备的认证结果;所述第二设备在对所述第一设备的认证结果为认证通过的情况下,保存所述第五上行业务数据。
其中,所述第二设备基于所述第二随机数和第一随机数对所述第一设备进行认证,得到对所述第一设备的认证结果的处理,具体来说可以包括:所述第二设备在所述第二随机数与所述第一随机数一致的情况下,确定对所述第一设备的认证结果为认证通过。也就是说,第二设备对第一设备进行认证,即通过判断第二随机数与第一随机数是否一致,来确定对第一设备的认证结果;若第二随机数与第一随机数一致,则确定对第一设备的认证结果为认证通过,进一步可以保存该第五上行业务数据;若第二随机数与第一随机数不一致,则确定对第一设备的认证结果为认证失败,此时拒绝接收该第五上行业务数据,这里虽然接收第三上行业务数据时会解析出来第二随机数和第五上行业务数据,但是若对第一设备的认证结果为认证失败,则可以丢弃该第五上行业务数据。
其中,所述第三密钥与所述第四密钥需要为相同的。但是,所述第三密钥与前述第二密钥,可以相同也可以不同;第四密钥与前述第一密钥,可以相同也可以不同。
在第一设备与第二设备预先配置的密码相关策略中,若预先配置为第一设备和第二设备密码不变的情况下,该第三密钥与第二密钥相同,第四密钥与前述第一密钥相同,并且第三密钥与第四密钥相同。
在第一设备与第二设备预先配置的密码相关策略中,若预先配置为第一设备和第二设备每次交互均使用新密码的情况下,该第三密钥与第二密钥不同,第四密钥与前述第一密钥不同,并且第三密钥与第四密钥相同、第二密钥与第一密钥相同。其中,第一设备和第二设备每次交互均使用新密码,则可以是每次交互时,第一设备和第二设备使用的密码相同,但是完成本次交互,均分别更新得到新的密码,这种处理方式,需要第一设备和第二设备采用密钥流;这里,所述密钥流具体可以包括密钥流生成器在不同时刻生成的不同的密钥。
其中,所述第三扰码的生成方式、第四扰码的生成方式与前述实施例相同,不再重复说明。所述第二设备基于所述第四扰码对接收到的第三上行业务数据进行解扰,得到第五上行业务数据以及第二随机数,只有该第二随机数与前述第一随机数相同的时候,才会接收并保存该第五上行业务命令。在前述第四扰码与第三扰码相同的情况下,该第五上行业务命令,应该与前述第一设备侧原始的第一上行业务命令相同。
结合图7,以第一设备为标签,第二设备为读写器为例,对本实施方式提供的方案进行示例性说明:
S701:读写器向标签发送认证请求信令。
该认证请求信令用于为标签供电,并使得标签启动认证处理过程。
S702:标签向读写器发送第一导频。
这里,所述第一导频的说明与前述实施例相同,不做赘述。
S703:读写器基于预设算法,对第一密钥以及第二下行业务命令进行处理,得到所述第二序列;基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值;基于所述第二序列以及所述信道估计值,生成第一信息。
其中,关于第一密钥、第二密钥的说明,与前述实施例相同,不做重复说明;关于信道估计值、第二序列、第一信息的生成方式与前述实施例均为相同的,不做赘述。
S704:读写器基于第一密钥生成第一扰码,基于所述第一扰码对所述第二下行业务命令以及第一随机数加扰,得到第一下行业务命令。
前述S703和S704的执行顺序可以不分先后,可以同时执行S703以及S704,或者,可以先执行S703再执行S704,或者,可以先执行S704再执行S703。
S705:读写器发送下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;所述下行信号,还携带第一下行业务命令。
S706:标签接收下行信号,基于第二扰码对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到第三下行业务命令和第二随机数;其中,所述第二扰码为基于第二密钥生成的。
S707:标签基于预设算法对第二密钥以及第三下行业务命令进行处理,得到所述第一序列。
S708:标签基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果;在所述认证结果为认证通过的情况下,执行S709;在所述认证结果为认证失败的情况下,结束处理。
关于认证的处理方式与前述实施例相同,不做赘述。
S709:标签执行第三下行业务命令。
本步骤中,该第三下行业务命令、与前述读写器侧原始的第二下行业务命令相同。
S710:标签基于第三扰码对第一上行业务数据以及第二随机数进行加扰,得到第三上行业务数据,发送携带所述第三上行业务数据的上行信号;其中,所述第三扰码为基于第三密钥生成的。
S711:读写器接收携带第三上行业务数据的上行信号,基于第四密钥生成第四扰码;基于第四扰码对接收到的第三上行业务数据进行解扰,得到第五上行业务数据和第二随机数。
S712:读写器判断第二随机数与第一随机数是否一致,若一致,则确定对所述第一设备的认证结果为认证通过,保存该第五上行业务数据;若不一致,则确定对所述第一设备的认证结果为认证失败,拒绝接收该第五上行业务数据。
在S712中读写器需要对标签进行认证,即读写器通过判断第二随机数与第一随机数是否一致,来确定对标签的认证结果;若第二随机数与第一随机数一致,则确定对所述标签的认证结果为认证通过,进一步可以保存该第五上行业务数据;若第二随机数与第一随机数不一致,则确定对所述标签的认证结果为认证失败,此时拒绝接收该第五上行数据。本步骤中,读写器得到的第五上行业务数据,与前述标签侧原始的第一上行业务数据相同。
接下来针对前述实施例提供的方案进行有效效果的分析:
前述实施例在空口中传输的两个最关键的信号是第一导频和下行信号,以第一设备为读写器、第二设备为标签为例,参见图8:由于无线空口的开放性,攻击者也可以接收到标签发送经过信道V的第一导频和读写器发送经过信道G的下行信号;假设攻击者端的噪声为N
E,则攻击者接收到标签发送的第一导频可以表示为:y
E=Vs+N
E;由上式可知,攻击者可以接收到经过标签和攻击者间信道V掩盖的第一导频,但由于初始时攻击者不知道生成该第一导频所使用的第二密钥,因此该攻击者也就无法估计出标签和攻击者之间的信道V,更没法获取到第一导频携带的第三序列s。攻击者截取到读写器发送的下行信号X可以表示为:y
E=GX+N
E;由上式可知,攻击者可以接收到经过读写器和攻击者间信道G掩盖的下行信号,但由于攻击者既无法估计读写器与攻击者间的信道G,也不知道合法信道估计值
和读写器侧基于第二密钥生成的第一序列s
R,所以无法破解出下行信号中的第一信息,进而无法得到认证通过的认证结果。可见,采用本实施例提供的方案,可以保证空口信号的安全性。
根据下行非法信号的来源分为三种攻击,分别是攻击者伪造下行信号、攻击者篡改下行信号、攻击者重放下行信号,针对在这三种攻击下的安全性分析如下:
第一、攻击者伪造下行信号:当存在攻击者伪造下行信号时,攻击者首先需要伪造下行业务命令,例如伪造write命令,企图在标签中写入错误数据。假设攻击者伪造的下行业务命令为Command',由于攻击者无法获取到前述第一设备的第二密钥、也无法获取前述第二设备的第一密钥,此时攻击者的伪造第二序列可以表示为:
s
E=PRNG(K
E,CRC(Command'));
由于攻击者无法估计出标签和攻击者之间的信道V,只能将本地侧生成的攻击导频s
E作为第一信息与下行伪造业务命令拼接在一起发送给标签,即s
E||Command'。假设标签侧的噪声为N
T,此时标签从攻击者处接收到的信号表示为:y
T=Vs
E+N
T;假设标签无差错的解码出攻击者伪造的下行业务命令Comman'd,并计算出本地第一序列s'
T,则该标签计算得到的第一数值表示为:
因为s
E与s'
T无关,所以第一数值t的均值为0。由上式可知,攻击者伪造下行信号,对于标签而言并不具有认证的攻击性。
第二、攻击者篡改下行信号:与攻击者伪造下行信号不同,攻击者篡改下行信号是指攻击者不改变原有消息格式中的第一信息X,仅篡改下行业务命令即X||Command',并将其转发给标签。假设标签无差错的解码出攻击者篡改的下行业务命令Command',并计算出本地第一序列s'
T,则该标签计算得到的第一数值表示为:
因为X与篡改下行业务命令无关,因此该X与s'
T无关,其第一数值的均值为0,由上式可知,攻击者篡改下行信号,对于标签而言并不具有认证的攻击性。
第三、攻击者重放下行信号:攻击者接收到阅读器发送的下行信号是经过信道G掩盖之后的,如果直接将接收到的信号转发出去,则下行信号会再经历信道V畸变,误差会变得非常大,对于标签而 言并不具有认证的攻击性。
接下来对攻击者伪造下行信号对漏警概率的影响进行分析:由于标签硬件条件限制,仿真中标签仅配置一根天线,图9中示意出基站(即第二设备)天线数分别配有1、16、32、64根天线的情况下,攻击者伪造下行信号时系统的漏警概率随攻击者功率变化的曲线,图9中横坐标为非法信号与合法信号功率的比值。从图9中可以看到,随着攻击者功率的增大,伪造信号的检验统计量的方差也会变大,从而导致系统的漏警概率也随之增大。基站配置不同的天线数都获得了较低的漏警概率,更加直观地说,当合法基站和攻击者天线具有1根天线时,系统漏警概率就可以低于6%,这说明本方案可以有效的识别出攻击者伪造的下行信号。此外,随着合法基站和攻击者天线数的增多,漏警概率越来越低,这是由于天线数的增多使得标签侧检验统计量的方差减小,检验统计量更加集中在0均值附近,从而检验结果将更加准确。
其次,攻击者重放下行信号对漏警概率的影响:分别结合基站(即第二设备)天线数有1、16、32、64根天线的情况下,攻击者重放下行信号时系统的漏警概率随攻击者功率变化进行分析,可以看出攻击者功率增大时,重放下行信号的检验统计量的方差也会变大,从而导致系统的漏警概率也随之增大。基站配置不同的天线数都获得了较低的漏警概率,合法基站和攻击者、攻击者和标签之间的信道可以掩盖认证标识。更直观的说,当合法基站和攻击者天线具有1根天线时,系统漏警概率即低至0.15%,这说明本方案可以有效的识别出攻击者重放的下行信号。
图10给出了基站天线数分别配有1、16、32、64根天线的情况下,本方案的虚警概率。从图10中可以看到,合法信号功率越大,读写器侧估计的信道值越准确,所以系统的虚警概率越低。因此本方案在虚警概率性能指标具有良好的性能,说明本方案在典型环境中具有实用性。同时随着合法基站天线数的增多,虚警概率越来越低。综上,无论是虚警概率和漏警概率,基站采用多天线技术都具有更明显的优势。
本实施例提供的方案,利用标签侧生成的私密第一导频和接收到的下行信号进行假设检验,其安全性来源于导频的保密。对于攻击者来说,虽然也能接收到从合法基站发送的下行信号,但这是经过基站与攻击者间信道掩盖的,由于生成第一导频中第三序列采用的是第二密钥,具备私密性,所以攻击者无法估计出与合法基站间的信道估计值,同时由于信道是随机的,即使攻击者无限提高计算能力,也无法破解从基站接收到的下行信号中携带的第一信息。因此本方案可以避免计算攻击。
本实施例提供的方案中,第一导频可以被看作是零功耗系统中固有导频符号(前导码/帧同步序列)的特殊使用,并不占用额外的通信资源。同时,本方案将身份验证和完整性保护融合在一起,通信效率更高。
本实施例提供的方案将信道估计,导频处理等复杂度较高的操作放在基站端,资源受限的标签只用额外执行位运算、阈值判断等简单操作。由第一导频携带的第三序列,使用的伪随机数生成器和循环冗余校验都是RFID中自带的模块生成的,并不需要额外添加。并且采用私密导频,防止了攻击者探测信道,提供了更好的安全强度。
可见,通过采用本实施例提供的方案,第一设备基于第一序列对携带第一信息的下行信号进行认证,得到认证结果;其中第一信息为第二设备基于第一密钥生成的,第一序列是基于第二密钥生成的。如此,由于采用密钥进行认证处理,因此可以避免计算攻击,保证了安全性。并且仅需要结合原通信流程的信息交互就可以完成认证的处理,不需要额外占用通信开销。
图11是根据本申请一实施例的第一设备的组成结构示意图,包括:
第一通信单元1101,用于接收下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;
第一处理单元1102,用于基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果;所述第一序列为基于第二密钥生成的。
所述第一处理单元,用于在所述第一序列以及所述接收到的下行信号中携带的所述第一信息之间的相似度,满足预设条件的情况下,确定所述认证结果为认证通过;
和/或,在所述第一序列以及所述接收到的下行信号中携带的所述第一信息之间的相似度,不满足预设条件的情况下,确定所述认证结果为认证失败。
所述第一处理单元,用于基于所述第一序列和所述接收到的下行信号中携带的所述第一信息进行计算,得到第一数值;在所述第一数值在预设阈值范围内的情况下,确定所述第一序列以及所述接收到的下行信号中的所述第一信息之间的相似度,满足预设条件。
所述第一信息为第二设备基于第二序列生成的,所述第二序列为基于所述第一密钥生成的。
所述第一处理单元,用于基于预设算法对第二密钥进行处理得到第三序列;
所述第一通信单元,用于发送携带所述第三序列的所述第一导频。
所述第一信息为所述第二设备基于信道估计值和第二序列生成的;
所述信道估计值为所述第二设备基于所述第二序列对接收到的第一导频进行信道估计得到的。
所述第一序列与所述第三序列相同。
所述下行信号,还携带第一下行业务命令。
所述第二序列为所述第二设备基于所述第一密钥以及所述第一下行业务命令生成的。
所述第一处理单元,用于基于预设算法对第二密钥以及所述第一下行业务命令进行处理,得到所述第一序列。
所述第一处理单元,用于在所述认证结果为认证通过的情况下,执行所述第一下行业务命令。
所述第一下行业务命令,为所述第二设备基于第一扰码对第二下行业务命令加扰后得到的;所述第一扰码为所述第二设备基于第一密钥生成的。
所述第二序列为所述第二设备基于所述第一密钥以及所述第二下行业务命令生成的。
所述第一处理单元,用于基于第二扰码,对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到第三下行业务命令;其中,所述第二扰码为基于所述第二密钥生成的。
所述第一处理单元,用于基于预设算法对所述第二密钥以及所述第三下行业务命令进行处理,得到所述第一序列。
所述第一处理单元,用于在所述认证结果为认证通过的情况下,执行所述第三下行业务命令。
所述第一下行业务命令,为所述第二设备基于所述第一扰码对所述第二下行业务命令以及第一随机数加扰后得到的。
所述第一处理单元,用于基于第二扰码,对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到所述第三下行业务命令和第二随机数。
所述第一通信单元,用于在所述认证结果为认证通过的情况下,发送携带第一上行业务数据的上行信号。
所述第一处理单元,用于在所述认证结果为认证通过的情况下,基于第三扰码对第一上行业务数据加扰,得到第二上行业务数据;其中,所述第三扰码为基于第三密钥生成的;
所述第一通信单元,用于发送携带所述第二上行业务数据的上行信号。
所述第一处理单元,用于在所述认证结果为认证通过的情况下,基于第三扰码对第一上行业务数据以及所述第二随机数进行加扰,得到第三上行业务数据;其中,所述第三扰码为基于第三密钥生成的;所述第二随机数用于所述第二设备对所述第一设备进行认证;所述第一通信单元,用于发送携带所述第三上行业务数据的上行信号。
所述预设算法为以下之一:随机数算法、密码算法。
本申请实施例的第一设备能够实现前述的认证方法实施例中的第一设备的对应功能。该第一设备中的各个模块(子模块、单元或组件等)对应的流程、功能、实现方式以及有益效果,可参见上述方法实施例中的对应描述,在此不再赘述。需要说明,关于申请实施例的第二设备中的各个模块(子模块、单元或组件等)所描述的功能,可以由不同的模块(子模块、单元或组件等)实现,也可以由同一个模块(子模块、单元或组件等)实现。
图12是根据本申请一实施例的第二设备的组成结构示意图,包括:
第二通信单元1201,用于发送下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;所述第一信息用于第一设备进行认证,得到认证结果。
在图12的基础上,如图13所示,所述第二设备还包括:
第二处理单元1202,用于基于预设算法对第一密钥处理,得到第二序列;基于所述第二序列,生成第一信息;
所述第二通信单元1201,用于发送携带所述第一信息的所述下行信号。
所述第二通信单元,用于接收所述第一设备发送的第一导频;所述第一导频用于携带第三序列;所述第三序列为所述第一设备基于预设算法对第二密钥处理得到的。
所述信道估计值的维度,与所述第二设备的天线数量相关。
所述下行信号,还携带第一下行业务命令。
所述第二处理单元,用于基于所述预设算法,对所述第一密钥以及所述第一下行业务命令进行处理,得到所述第二序列。
所述第二处理单元,用于基于所述第一密钥生成第一扰码;基于第一扰码对第二下行业务命令进行加扰,得到所述第一下行业务命令。
所述第二处理单元,用于基于所述第一扰码对所述第二下行业务命令以及第一随机数加扰,得到所述第一下行业务命令。
所述第二处理单元,用于基于所述预设算法,对所述第一密钥以及所述第二下行业务命令进行处理,得到所述第二序列。
所述第二通信单元,用于接收所述第一设备发送的携带第一上行业务数据的上行信号。
第二处理单元,用于基于第四密钥生成第四扰码;基于所述第四扰码对接收到的第二上行业务数据进行解扰,得到第四上行业务数据;所述第二通信单元,用于接收所述第一设备发送的携带第二上行业务数据的上行信号。
所述第二通信单元,用于接收所述第一设备发送的携带第三上行业务数据的上行信号;
所述第二处理单元,用于基于第四密钥生成第四扰码;基于所述第四扰码对接收到的第三上行业务数据进行解扰,得到第五上行业务数据和第二随机数;基于所述第二随机数和第一随机数对所述第一设备进行认证,得到对所述第一设备的认证结果;在对所述第一设备的认证结果为认证通过的情况下,保存所述第五上行业务数据。
所述第二处理单元,用于在所述第二随机数与所述第一随机数一致的情况下,确定对所述第一设备的认证结果为认证通过。
所述预设算法为以下之一:随机数算法、密码算法。
本申请实施例的第二设备能够实现前述的认证方法实施例中的第二设备的对应功能。该第二设备中的各个模块(子模块、单元或组件等)对应的流程、功能、实现方式以及有益效果,可参见上述方法实施例中的对应描述,在此不再赘述。需要说明,关于申请实施例的第二设备中的各个模块(子模块、单元或组件等)所描述的功能,可以由不同的模块(子模块、单元或组件等)实现,也可以由同一个模块(子模块、单元或组件等)实现。
最后,针对本实施例提供的第一设备、第二设备进行详细说明:
所述第二设备可以为reader,其具体可以为用户设备(UE,User Equipment)或网络设备。所述第一设备可以为零功耗终端、或零功耗设备、或零功耗物联网终端。所述第一设备(零功耗终端、或零功耗设备、或零功耗物联网终端)具体可以为电子标签(或称为tag),可以集成存储器用于数据存取,和/或集成传感器用于传感信息采集。由于一般是大规模应用(比如,每个资产或设备都会贴一个标签),其成本和功耗都需要重点考虑。
上述第一设备和第二设备可以组成零功耗通信系统。零功耗通信的突出技术优势是免电池通信。由于使用射频能量采集、反向散射和低功耗计算等关键技术,终端可以做到免电池,支持极低硬件复杂度,因此零功耗通信能够满足超低功耗、极小尺寸和极低成本的需求。可以预见,零功耗技术在广泛的应用领域将具有显著的应用优势。例如面向垂直行业的工业传感器网络、智能交通、智慧物流、智能仓储、智慧农业、智慧城市、能源领域等应用以及面向个人消费者的智能穿戴、智能家居以及医疗护理等场景的应用。本节我们将选取其中部分典型场景说明零功耗通信在这些领域的应用潜力。
随着应用场景的不同,针对前述第一设备以及第二设备的需求也可能存在不同,举例来说,工业传感器网络的应用场景下,第一设备以及第二设备的需求,可以包括:
在第二设备(即reader)为网络设备的情况下,其需求(或特征)如下:基于蜂窝网基础设置、灵活部署:比如,可以部署在室外杆站,室内同DIS(Digital Indoor System,室内数字系统)站间距部署,提供基础覆盖;又比如,可按需部署补盲或扩展覆盖;覆盖要求:单站的覆盖距离要求为,室内大于30m,室外大于100m;网络安全:基于授权的标签读取,保护隐私和数据安全;连接需求:支持足够的系统容量,支持大量终端的数据读取。
关于所述第一设备(零功耗终端、或零功耗设备、或零功耗物联网终端)的特性,包括但不限于以下:功耗:可以小于1mw,无源免电池且免维护;工作环境:需要能够匹配特殊环境,比如可以在高温、高压、极寒、辐射等特殊环境下正常工作;体积:体积极小,便于大规模应用;通信距离:可以达到数十米到数百米的范围;材料类型:可以有纸质标签以及抗金属标签。
应理解的是,前述仅以工业传感器网络的应用场景对第一设备和第二设备的典型需求进行了说明,而工业传感器网络的应用场景中还可以包含其他需求,只是这里不做穷举。另外,在其他应用场景中,第一设备和第二设备的需求还会存在与前述工业传感器网络的需求的不同之处,比如,智慧物流、智能仓储的应用场景中,还可能增加连接需求(由于货物数量大,需要同时检测大量标签,因此可能需要实现每秒千级别的连接);又比如,在智能家居的应用场景中,可能增加通信延时的需求(智能家用电器调节:十毫秒至百毫秒级别;家居定位:百毫秒至秒级别),以及激励信号的需求(将家庭室内的智能设备例如智能手机、CPE(Customer Premise Equipment,客户前置设备)、WIFI的信号作为无源终端的能量激励信号,无需额外的激励信号,简化网络布局)等等,这里不再穷举。
前述第一设备和第二设备可以组成基于反向散射的零功耗通信系统。在该基于反向散射的零功耗通信系统中,第一设备即零功耗设备反向散射发射机调制和反射接收到的RF(Radio Frequency,射频) 信号以传输数据,而不是自己生成RF信号。该技术已在实践生产中得到了广泛的应用,例如RFID(Radio Frequency Identification,射频识别技术)、跟踪设备、远程开关、医疗遥测和低成本传感器网络等。前述第一设备和第二设备可以组成基于反向散射的零功耗通信系统可以参见图14,图14中网络设备即所述第二设备(比如reader),零功耗终端即第一设备。
如图14所示,所述零功耗终端(即第一设备)可以包括:能量采集、反向散射通信、以及低功耗计算等功能;其中,能量采集以及反向散射通信可以由前述第一设备的第一通信单元实现,所述低功耗计算可以由前述第一设备的第一处理单元实现。针对前述能量采集、反向散射通信、以及低功耗计算,分别进行说明:
第一、能量采集即射频能量采集,其基本原理是通过电磁感应实现对空间电磁波能量的采集。射频能量采集的本质就是将射频能量转化为直流电压(RF-DC)。应用于零功耗通信中,射频采集能量的核心需求是将采集到的能量有效地用于对负载电路的驱动(低功耗运算、传感器等),射频能量以实现免电池的通信。
第二、反向散射(Back Scattering),于1948年由Stockman首次提出[4]。但由于如下一些限制,传统的反向散射通信不能广泛应用于数据密集型无线通信系统:首先,传统的反向散射通信需要将反向散射发射器放置在其射频源附近,从而限制了设备的使用和覆盖区域。其次,在传统的反向散射通信中,反向散射接收器和射频发射发射源位于同一设备中,即阅读器(reader),这会导致接收和发射天线之间的自干扰,从而降低通信性能。此外,传统的反向散射通信系统是被动操作的,即反向散射发射机仅在反向散射接收机询问时才传输数据。
环境反向散射通信(Ambient Backscatter Communication,AmBC)已经成为使能低功耗通信的一项更有前途的技术,它可以有效地解决传统反向散射通信系统中的上述局限性使得AmBC技术在实际应用中得到更广泛采用。
环境反向散射通信系统一般包括三个部分:环境射频源(ambient radio-frequency(RF)source)、反向散射设备(backscatter device(BD))和读写器(reader)。零功耗设备(即第一设备,如反向散射标签)接收读写器(即第二设备)发送的载波信号,通过RF能量采集模块(能量采集即射频能量采集)采集能量,用于低功耗处理模块(即低功耗计算)的供能。获取能量后,反向散射通信驱动相应电路对来波信号进行调制,并进行反向散射。
第三、低功耗计算。零功耗通信技术的主要特点是通过调制来波信号实现反向散射通信,同时它还可以通过能量采集获得能量以驱动数字逻辑电路或芯片(如MCU(Microcontroller Unit,微控制单元)或传感器芯片),实现对信号的编码,加密或简单计算等功能。射频能量的转化效率往往不足10%,决定了驱动数字逻辑电路或芯片用于计算的功耗要求不能太高。如1微焦耳能量可支持计算的次数。虽然随着工艺的改进和设计的优化有所提高,每微焦耳能量可使用于计算的次数。低功耗接收机零功耗设备从功能需求上可以分为两类,一类主要功能是类似beacon的广播发射,为降低结构复杂度和降低功耗,可以不实现接收机功能;另一类是考虑设计简单低功耗的接收机。反向散射常采用的ASK,FSK的方式,可由简单的电路设计即可实现。对于编码技术,反向不归零、曼彻斯特编码是反向散射系统中最常用的两种编码方式。除外,还有单极性归零(Unipolar RZ)编码、差动双相(DBP)编码、米勒(Miller)编码,FM0编码等简单易于实现的编码方式也比较适合于反向散射通信。采用简单的编码和调制,也可在很大程度降低零功耗通信的计算功耗。
下面结合参见图15,对基于蜂窝和/或侧行通信的混合零功耗通信系统的不同情况详细说明:情况1,智能终端辅助供能触发的零功耗通信:零功耗终端由网络中的智能终端供能和触发,零功耗终端的反向散射信号由基站接收。其中,智能终端供能和触发供能和触发操作,可以由基站通过空口信令进行控制。情况2,网络供能/触发的零功耗Sidelink(侧行链路)通信:基站向零功耗终端提供无线供能和发送触发信令,零功耗终端的反向散射信号由智能终端接收,完成Sidelink通信。进一步地,智能终端向基站发送空口数据。情况3,智能终端辅助供能的零功耗通信:网络中的智能终端为零功耗终端提供辅助供能,基站发送触发信息给零功耗终端,并接收零功耗终端的反向散射信号。智能终端为零功耗终端进行辅助供能过程可由基站通过空口信令控制。情况4,网络控制的零功耗Sidelink通信:智能终端接收网络的空口信令和数据。智能终端为零功耗终端供能和触发,并接收零功耗终端的反向散射信号,完成Sidelink通信。
图16是根据本申请实施例的通信设备1600示意性结构图。该通信设备1600包括处理器1610,处理器1610可以从存储器中调用并运行计算机程序,以使通信设备1600实现本申请实施例中的方法。
在一种可能的实现方式中,通信设备1600还可以包括存储器1620。其中,处理器1610可以从存储器1620中调用并运行计算机程序,以使通信设备1600实现本申请实施例中的方法。其中,存储器1620可以是独立于处理器1610的一个单独的器件,也可以集成在处理器1610中。
在一种可能的实现方式中,通信设备1600还可以包括收发器1630,处理器1610可以控制该收发器1630与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。其中,收发器1630可以包括发射机和接收机。收发器1630还可以进一步包括天线,天线的数量可以为一个或多个。
在一种可能的实现方式中,该通信设备1600可为本申请实施例的第一设备,并且该通信设备1600可以实现本申请实施例的各个方法中由第一设备实现的相应流程,为了简洁,在此不再赘述。
在一种可能的实现方式中,该通信设备1600可为本申请实施例的第二设备,并且该通信设备1600可以实现本申请实施例的各个方法中由第二设备实现的相应流程,为了简洁,在此不再赘述。
图17是根据本申请实施例的芯片1700的示意性结构图。该芯片1700包括处理器1710,处理器1710可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
在一种可能的实现方式中,芯片1700还可以包括存储器1720。其中,处理器1710可以从存储器1720中调用并运行计算机程序,以实现本申请实施例中由第二设备或者第一设备执行的方法。其中,存储器1720可以是独立于处理器1710的一个单独的器件,也可以集成在处理器1710中。
在一种可能的实现方式中,该芯片1700还可以包括输入接口1730。其中,处理器1710可以控制该输入接口1730与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
在一种可能的实现方式中,该芯片1700还可以包括输出接口1740。其中,处理器1710可以控制该输出接口1740与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
在一种可能的实现方式中,该芯片可应用于本申请实施例中的第一设备,并且该芯片可以实现本申请实施例的各个方法中由第一设备实现的相应流程,为了简洁,在此不再赘述。
在一种可能的实现方式中,该芯片可应用于本申请实施例中的第二设备,并且该芯片可以实现本申请实施例的各个方法中由第二设备实现的相应流程,为了简洁,在此不再赘述。
应用于第一设备和第二设备的芯片可以是相同的芯片或不同的芯片。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
上述提及的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、现成可编程门阵列(field programmable gate array,FPGA)、专用集成电路(application specific integrated circuit,ASIC)或者其他可编程逻辑器件、晶体管逻辑器件、分立硬件组件等。其中,上述提到的通用处理器可以是微处理器或者也可以是任何常规的处理器等。
上述提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
图18是根据本申请实施例的通信系统1800的示意性框图。该通信系统1800包括第二设备1810和第一设备1820。其中,该第二设备1810可以用于实现上述方法中由第二设备实现的相应的功能,以及该第一设备1820可以用于实现上述方法中由第一设备实现的相应的功能。为了简洁,在此不再赘述。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行该计算机程序指令时,全部或部分地产生按照本申请实施例中的流程或功能。该计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。该计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,该计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(Digital Subscriber Line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。该计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。该可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(Solid State Disk, SSD))等。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
以上所述仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以该权利要求的保护范围为准。
Claims (81)
- 一种认证方法,包括:第一设备接收下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;所述第一设备基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果;所述第一序列为基于第二密钥生成的。
- 根据权利要求1所述的方法,其中,所述第一设备基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果,包括:所述第一设备在所述第一序列以及所述接收到的下行信号中携带的所述第一信息之间的相似度,满足预设条件的情况下,确定所述认证结果为认证通过;和/或,所述第一设备在所述第一序列以及所述接收到的下行信号中携带的所述第一信息之间的相似度,不满足预设条件的情况下,确定所述认证结果为认证失败。
- 根据权利要求2所述的方法,其中,所述方法还包括:所述第一设备基于所述第一序列和所述接收到的下行信号中携带的所述第一信息进行计算,得到第一数值;在所述第一数值在预设阈值范围内的情况下,确定所述第一序列以及所述接收到的下行信号中携带的所述第一信息之间的相似度,满足预设条件。
- 根据权利要求1-3任一项所述的方法,其中,所述第一信息为第二设备基于第二序列生成的,所述第二序列为基于所述第一密钥生成的。
- 根据权利要求4所述的方法,其中,所述第一设备接收下行信号之前,所述方法还包括:所述第一设备基于预设算法对第二密钥进行处理得到第三序列;所述第一设备发送携带所述第三序列的第一导频。
- 根据权利要求5所述的方法,其中,所述第一信息为所述第二设备基于信道估计值和第二序列生成的;所述信道估计值为所述第二设备基于所述第二序列对接收到的第一导频进行信道估计得到的。
- 根据权利要求5或6所述的方法,其中,所述第一序列与所述第三序列相同。
- 根据权利要求4-6任一项所述的方法,其中,所述下行信号,还携带第一下行业务命令。
- 根据权利要求8所述的方法,其中,所述第二序列为所述第二设备基于所述第一密钥以及所述第一下行业务命令生成的。
- 根据权利要求9所述的方法,其中,所述方法还包括:所述第一设备基于预设算法对第二密钥以及所述第一下行业务命令进行处理,得到所述第一序列。
- 根据权利要求8-10任一项所述的方法,其中,所述方法还包括:在所述认证结果为认证通过的情况下,所述第一设备执行所述第一下行业务命令。
- 根据权利要求8所述的方法,其中,所述第一下行业务命令,为所述第二设备基于第一扰码对第二下行业务命令加扰后得到的;所述第一扰码为所述第二设备基于第一密钥生成的。
- 根据权利要求12所述的方法,其中,所述第二序列为所述第二设备基于所述第一密钥以及所述第二下行业务命令生成的。
- 根据权利要求13所述的方法,其中,所述方法还包括:所述第一设备基于第二扰码,对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到第三下行业务命令;其中,所述第二扰码为基于所述第二密钥生成的。
- 根据权利要求14所述的方法,其中,所述方法还包括:所述第一设备基于预设算法对所述第二密钥以及所述第三下行业务命令进行处理,得到所述第一序列。
- 根据权利要求15所述的方法,其中,所述方法还包括:在所述认证结果为认证通过的情况下,所述第一设备执行所述第三下行业务命令。
- 根据权利要求16所述的方法,其中,所述第一下行业务命令,为所述第二设备基于所述第一扰码对所述第二下行业务命令以及第一随机数加扰后得到的。
- 根据权利要求17所述的方法,其中,所述第一设备基于第二扰码,对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到第三下行业务命令,包括:所述第一设备基于第二扰码,对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到所述第三下行业务命令和第二随机数。
- 根据权利要求1-18任一项所述的方法,其中,所述方法还包括:在所述认证结果为认证通过的情况下,所述第一设备发送携带第一上行业务数据的上行信号。
- 根据权利要求1-16任一项所述的方法,其中,所述方法还包括:在所述认证结果为认证通过的情况下,所述第一设备基于第三扰码对第一上行业务数据加扰,得到第二上行业务数据;其中,所述第三扰码为基于第三密钥生成的;所述第一设备发送携带所述第二上行业务数据的上行信号。
- 根据权利要求18所述的方法,其中,所述方法还包括:在所述认证结果为认证通过的情况下,所述第一设备基于第三扰码对第一上行业务数据以及所述第二随机数进行加扰,得到第三上行业务数据;其中,所述第三扰码为基于第三密钥生成的;所述第二随机数用于所述第二设备对所述第一设备进行认证;所述第一设备发送携带所述第三上行业务数据的上行信号。
- 根据权利要求5、10、15任一项所述的方法,其中,所述预设算法为以下之一:随机数算法、密码算法。
- 一种认证方法,包括:第二设备发送下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;所述第一信息用于第一设备进行认证,得到认证结果。
- 根据权利要求23所述的方法,其中,所述第二设备发送下行信号,包括:所述第二设备基于预设算法对第一密钥处理,得到第二序列;所述第二设备基于所述第二序列,生成第一信息;所述第二设备发送携带所述第一信息的所述下行信号。
- 根据权利要求24所述的方法,其中,所述方法还包括:所述第二设备接收所述第一设备发送的第一导频;所述第一导频用于携带第三序列;所述第三序列为所述第一设备基于预设算法对第二密钥处理得到的。
- 根据权利要求25所述的方法,其中,所述第二设备基于所述第二序列,生成第一信息,包括:所述第二设备基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值;所述第二设备基于所述第二序列以及所述信道估计值,生成第一信息。
- 根据权利要求26所述的方法,其中,所述信道估计值的维度,与所述第二设备的天线数量相关。
- 根据权利要求24-27任一项所述的方法,其中,所述下行信号,还携带第一下行业务命令。
- 根据权利要求28所述的方法,其中,所述第二设备基于预设算法对第一密钥处理,得到第二序列,包括:所述第二设备基于所述预设算法,对所述第一密钥以及所述第一下行业务命令进行处理,得到所述第二序列。
- 根据权利要求28所述的方法,其中,所述方法还包括:所述第二设备基于所述第一密钥生成第一扰码;所述第二设备基于第一扰码对第二下行业务命令进行加扰,得到所述第一下行业务命令。
- 根据权利要求30所述的方法,其中,所述第二设备基于第一扰码对第二下行业务命令进行加扰,得到所述第一下行业务命令,包括:所述第二设备基于所述第一扰码对所述第二下行业务命令以及第一随机数加扰,得到所述第一下行业务命令。
- 根据权利要求30或31所述的方法,其中,所述第二设备基于预设算法对第一密钥处理,得到第二序列,包括:所述第二设备基于所述预设算法,对所述第一密钥以及所述第二下行业务命令进行处理,得到所述第二序列。
- 根据权利要求23-32任一项所述的方法,其中,所述方法还包括:所述第二设备接收所述第一设备发送的携带第一上行业务数据的上行信号。
- 根据权利要求23-30任一项所述的方法,其中,所述方法还包括:所述第二设备接收所述第一设备发送的携带第二上行业务数据的上行信号;所述第二设备基于第四密钥生成第四扰码;所述第二设备基于所述第四扰码对接收到的第二上行业务数据进行解扰,得到第四上行业务数据。
- 根据权利要求31所述的方法,其中,所述方法还包括:所述第二设备接收所述第一设备发送的携带第三上行业务数据的上行信号;所述第二设备基于第四密钥生成第四扰码;所述第二设备基于所述第四扰码对接收到的第三上行业务数据进行解扰,得到第五上行业务数据和 第二随机数;所述第二设备基于所述第二随机数和第一随机数对所述第一设备进行认证,得到对所述第一设备的认证结果;所述第二设备在对所述第一设备的认证结果为认证通过的情况下,保存所述第五上行业务数据。
- 根据权利要求35所述的方法,其中,所述第二设备基于所述第二随机数和第一随机数对所述第一设备进行认证,得到对所述第一设备的认证结果,包括:所述第二设备在所述第二随机数与所述第一随机数一致的情况下,确定对所述第一设备的认证结果为认证通过。
- 根据权利要求24、25、29、32任一项所述的方法,其中,所述预设算法为以下之一:随机数算法、密码算法。
- 一种第一设备,包括:第一通信单元,用于接收下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;第一处理单元,用于基于第一序列对接收到的下行信号中携带的所述第一信息进行认证,得到认证结果;所述第一序列为基于第二密钥生成的。
- 根据权利要求38所述的第一设备,其中,所述第一处理单元,用于在所述第一序列以及所述接收到的下行信号中携带的所述第一信息之间的相似度,满足预设条件的情况下,确定所述认证结果为认证通过;和/或,在所述第一序列以及所述接收到的下行信号中携带的所述第一信息之间的相似度,不满足预设条件的情况下,确定所述认证结果为认证失败。
- 根据权利要求39所述的第一设备,其中,所述第一处理单元,用于基于所述第一序列和所述接收到的下行信号中携带的所述第一信息进行计算,得到第一数值;在所述第一数值在预设阈值范围内的情况下,确定所述第一序列以及所述接收到的下行信号中的所述第一信息之间的相似度,满足预设条件。
- 根据权利要求38-40任一项所述的第一设备,其中,所述第一信息为第二设备基于第二序列生成的,所述第二序列为基于所述第一密钥生成的。
- 根据权利要求41所述的第一设备,其中,所述第一处理单元,用于基于预设算法对第二密钥进行处理得到第三序列;所述第一通信单元,用于发送携带所述第三序列的第一导频。
- 根据权利要求42所述的第一设备,其中,所述第一信息为所述第二设备基于信道估计值和第二序列生成的;所述信道估计值为所述第二设备基于所述第二序列对接收到的第一导频进行信道估计得到的。
- 根据权利要求42或43所述的第一设备,其中,所述第一序列与所述第三序列相同。
- 根据权利要求41-43任一项所述的第一设备,其中,所述下行信号,还携带第一下行业务命令。
- 根据权利要求45所述的第一设备,其中,所述第二序列为所述第二设备基于所述第一密钥以及所述第一下行业务命令生成的。
- 根据权利要求46所述的第一设备,其中,所述第一处理单元,用于基于预设算法对第二密钥以及所述第一下行业务命令进行处理,得到所述第一序列。
- 根据权利要求45-47任一项所述的第一设备,其中,所述第一处理单元,用于在所述认证结果为认证通过的情况下,执行所述第一下行业务命令。
- 根据权利要求45所述的第一设备,其中,所述第一下行业务命令,为所述第二设备基于第一扰码对第二下行业务命令加扰后得到的;所述第一扰码为所述第二设备基于第一密钥生成的。
- 根据权利要求49所述的第一设备,其中,所述第二序列为所述第二设备基于所述第一密钥以及所述第二下行业务命令生成的。
- 根据权利要求50所述的第一设备,其中,所述第一处理单元,用于基于第二扰码,对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到第三下行业务命令;其中,所述第二扰码为基于所述第二密钥生成的。
- 根据权利要求51所述的第一设备,其中,所述第一处理单元,用于基于预设算法对所述第二密钥以及所述第三下行业务命令进行处理,得到所述第一序列。
- 根据权利要求52所述的第一设备,其中,所述第一处理单元,用于在所述认证结果为认证通过的情况下,执行所述第三下行业务命令。
- 根据权利要求53所述的第一设备,其中,所述第一下行业务命令,为所述第二设备基于所述第一扰码对所述第二下行业务命令以及第一随机数加扰后得到的。
- 根据权利要求54所述的第一设备,其中,所述第一处理单元,用于基于第二扰码,对所述接收到的下行信号携带的第一下行业务命令进行解扰,得到所述第三下行业务命令和第二随机数。
- 根据权利要求38-55任一项所述的第一设备,其中,所述第一通信单元,用于在所述认证结果为认证通过的情况下,发送携带第一上行业务数据的上行信号。
- 根据权利要求38-53任一项所述的第一设备,其中,所述第一处理单元,用于在所述认证结果为认证通过的情况下,基于第三扰码对第一上行业务数据加扰,得到第二上行业务数据;其中,所述第三扰码为基于第三密钥生成的;所述第一通信单元,用于发送携带所述第二上行业务数据的上行信号。
- 根据权利要求55所述的第一设备,其中,所述第一处理单元,用于在所述认证结果为认证通过的情况下,基于第三扰码对第一上行业务数据以及所述第二随机数进行加扰,得到第三上行业务数据;其中,所述第三扰码为基于第三密钥生成的;所述第二随机数用于所述第二设备对所述第一设备进行认证;所述第一通信单元,用于发送携带所述第三上行业务数据的上行信号。
- 根据权利要求42、47、52任一项所述的第一设备,其中,所述预设算法为以下之一:随机数算法、密码算法。
- 一种第二设备,包括:第二通信单元,用于发送下行信号;所述下行信号携带第一信息,所述第一信息为第二设备基于第一密钥生成的;所述第一信息用于第一设备进行认证,得到认证结果。
- 根据权利要求60所述的第二设备,其中,所述第二设备还包括:第二处理单元,用于基于预设算法对第一密钥处理,得到第二序列;基于所述第二序列,生成第一信息;所述第二通信单元,用于发送携带所述第一信息的所述下行信号。
- 根据权利要求61所述的第二设备,其中,所述第二通信单元,用于接收所述第一设备发送的第一导频;所述第一导频用于携带第三序列;所述第三序列为所述第一设备基于预设算法对第二密钥处理得到的。
- 根据权利要求62所述的第二设备,其中,所述第二设备还包括:第二处理单元,用于基于所述第二序列对接收到的第一导频进行信道估计,得到信道估计值;基于所述第二序列以及所述信道估计值,生成第一信息。
- 根据权利要求63所述的第二设备,其中,所述信道估计值的维度,与所述第二设备的天线数量相关。
- 根据权利要求61-64任一项所述的第二设备,其中,所述下行信号,还携带第一下行业务命令。
- 根据权利要求65所述的第二设备,其中,所述第二处理单元,用于基于所述预设算法,对所述第一密钥以及所述第一下行业务命令进行处理,得到所述第二序列。
- 根据权利要求65所述的第二设备,其中,所述第二处理单元,用于基于所述第一密钥生成第一扰码;基于第一扰码对第二下行业务命令进行加扰,得到所述第一下行业务命令。
- 根据权利要求67所述的第二设备,其中,所述第二处理单元,用于基于所述第一扰码对所述第二下行业务命令以及第一随机数加扰,得到所述第一下行业务命令。
- 根据权利要求67或68所述的第二设备,其中,所述第二处理单元,用于基于所述预设算法,对所述第一密钥以及所述第二下行业务命令进行处理,得到所述第二序列。
- 根据权利要求60-69任一项所述的第二设备,其中,所述第二通信单元,用于接收所述第一设备发送的携带第一上行业务数据的上行信号。
- 根据权利要求60-67任一项所述的第二设备,其中,所述第二设备还包括:第二处理单元,用于基于第四密钥生成第四扰码;基于所述第四扰码对接收到的第二上行业务数据进行解扰,得到第四上行业务数据;所述第二通信单元,用于接收所述第一设备发送的携带第二上行业务数据的上行信号。
- 根据权利要求68所述的第二设备,其中,所述第二通信单元,用于接收所述第一设备发送的携带第三上行业务数据的上行信号;所述第二处理单元,用于基于第四密钥生成第四扰码;基于所述第四扰码对接收到的第三上行业务数据进行解扰,得到第五上行业务数据和第二随机数;基于所述第二随机数和第一随机数对所述第一设备进行认证,得到对所述第一设备的认证结果;在对所述第一设备的认证结果为认证通过的情况下,保存所述第五上行业务数据。
- 根据权利要求72所述的第二设备,其中,所述第二处理单元,用于在所述第二随机数与所述第 一随机数一致的情况下,确定对所述第一设备的认证结果为认证通过。
- 根据权利要求61、62、66、69任一项所述的第二设备,其中,所述预设算法为以下之一:随机数算法、密码算法。
- 一种第一设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,以使所述第一设备执行如权利要求1至22中任一项所述的方法。
- 一种第二设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,以使所述第二设备执行如权利要求23至37中任一项所述的方法。
- 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至22中任一项所述的方法。
- 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求23至37中任一项所述的方法。
- 一种计算机可读存储介质,用于存储计算机程序,当所述计算机程序被设备运行时使得所述设备执行如权利要求1至37中任一项所述的方法。
- 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至37中任一项所述的方法。
- 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至37中任一项所述的方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/109094 WO2024021060A1 (zh) | 2022-07-29 | 2022-07-29 | 认证方法和设备 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/109094 WO2024021060A1 (zh) | 2022-07-29 | 2022-07-29 | 认证方法和设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024021060A1 true WO2024021060A1 (zh) | 2024-02-01 |
Family
ID=89705080
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/109094 WO2024021060A1 (zh) | 2022-07-29 | 2022-07-29 | 认证方法和设备 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2024021060A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100150348A1 (en) * | 2008-01-30 | 2010-06-17 | Neology, Lnc. | Rfid authentication architecture and methods for rfid authentication |
CN108199991A (zh) * | 2017-12-13 | 2018-06-22 | 深圳大学 | 基于置信传递的时变衰落信道的物理层盲认证方法和系统 |
CN109274493A (zh) * | 2018-11-16 | 2019-01-25 | 中国人民解放军战略支援部队信息工程大学 | 基于信道感知的认证方法 |
CN109819444A (zh) * | 2019-01-11 | 2019-05-28 | 杭州电子科技大学 | 一种基于无线信道特征的物理层初始认证方法及系统 |
-
2022
- 2022-07-29 WO PCT/CN2022/109094 patent/WO2024021060A1/zh unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100150348A1 (en) * | 2008-01-30 | 2010-06-17 | Neology, Lnc. | Rfid authentication architecture and methods for rfid authentication |
CN108199991A (zh) * | 2017-12-13 | 2018-06-22 | 深圳大学 | 基于置信传递的时变衰落信道的物理层盲认证方法和系统 |
CN109274493A (zh) * | 2018-11-16 | 2019-01-25 | 中国人民解放军战略支援部队信息工程大学 | 基于信道感知的认证方法 |
CN109819444A (zh) * | 2019-01-11 | 2019-05-28 | 杭州电子科技大学 | 一种基于无线信道特征的物理层初始认证方法及系统 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Physical layer security of cognitive ambient backscatter communications for green Internet-of-Things | |
Huang et al. | Combating the control signal spoofing attack in UAV systems | |
WO2004073226A1 (ja) | 送信装置及び無線通信方法 | |
Chen et al. | An ownership transfer scheme using mobile RFIDs | |
Yadav et al. | A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges | |
Jiang et al. | Wireless access in vehicular environment | |
Jiang et al. | Security‐reliability tradeoff for friendly jammer aided multiuser scheduling in energy harvesting communications | |
Zhang et al. | Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities | |
Ayaz et al. | Physical layer security analysis using radio frequency‐fingerprinting in cellular‐V2X for 6G communication | |
Li et al. | Dynamic spectrum control-assisted secure and efficient transmission scheme in heterogeneous cellular networks | |
WO2024021060A1 (zh) | 认证方法和设备 | |
WO2022253298A1 (zh) | 传输系统消息的方法和装置 | |
US20230318780A1 (en) | Channel scrambling techniques in wireless communications | |
Zhang | Energy Harvesting Technologies in Wireless Sensor Networks | |
US20220303292A1 (en) | Mechanism for identifying collusive attackers | |
Jadoon et al. | HB-protocol based advance security system for PKES using multiple antennas | |
Ma et al. | Power and location optimization of full-duplex relay for proactive eavesdropping networks | |
Thenmozhi et al. | Light weight security framework for IoT | |
Zhong | Wi-fi protected access (WPA) | |
Zhang et al. | Secure Physical Layer Transmission and Authentication Mechanism Based on Compressed Sensing of Multiple Antenna Arrays | |
WO2023155128A1 (zh) | 密钥生成方法、信息校验方法和设备 | |
Desouky et al. | Directional Modulation for Secure RFID in Health Systems | |
US11272358B2 (en) | Near field communication forum data exchange format (NDEF) messages | |
US12095915B2 (en) | Method and apparatus for key management in mission critical data communication | |
US20240334207A1 (en) | Ambient internet of things system architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22952507 Country of ref document: EP Kind code of ref document: A1 |