Location privacy based ring signature method in Internet of vehicles

A technology of ring signature and Internet of Vehicles, which is applied in the field of vehicle identity authentication in the Internet of Vehicles, can solve the problems of inability to achieve independent vehicle authentication, low feasibility, waste of computing and communication resources, etc., and achieve the effect of protecting the privacy of vehicle location.

Active Publication Date: 2014-12-03
JIANGSU UNIV
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In an urban environment, this RSU arrangement is expensive and not feasible
Moreover, this method cannot realize the independent authentication of the vehicle, so that the RSU and the local server waste a lot of computing and communication resources on the vehicle identity authentication
[0005] In the method of using the authentication in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Location privacy based ring signature method in Internet of vehicles
  • Location privacy based ring signature method in Internet of vehicles
  • Location privacy based ring signature method in Internet of vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below in conjunction with the accompanying drawings and implementation examples.

[0034] figure 1 It is a flow chart of the ring signature method based on location privacy in the Internet of Vehicles of the present invention, including the following steps:

[0035] (1) Arrange roadside infrastructure RSU at intersections using greedy algorithm.

[0036] Choose whether to arrange RSU (roadside infrastructure) according to the traffic flow at the intersection. RSU is only arranged at the intersection, and the intersection where RSU is arranged needs to meet the following two conditions: 1) Within the communication range of the RSU that is twice the distance from the intersection 2) In the intersections without RSUs, the product K=F*B of the traffic volume F of the intersection and the distance R of the nearest RSU to the intersection is the largest.

[0037] (2) Initialize the authentication center TA, the initialization ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a location privacy based ring signature method in the Internet of vehicles, belongs to the field of vehicle identity authentication in the Internet of vehicles, and aims at solving the problem in detecting collusive Sybil attacks. Path information of a vehicle is used as identity information of the vehicle, the path information contains location privacy information of the vehicle, and location privacy information is protected in the ring signature method. Compared with a present Sybil attack detection method, the vehicle identity authentication method provided by the invention can make vehicles independent from each other, protect the location privacy of the vehicles, and detect the novel collusive Sybil attack existing in the Internet of vehicles in real time.

Description

technical field [0001] The invention belongs to the field of vehicle identity authentication in the Internet of Vehicles, relates to the privacy protection and identity authentication technology of the Internet of Vehicles, and specifically relates to a ring signature method based on location privacy in the Internet of Vehicles. Background technique [0002] Vehicle identity authentication technology is the basis of all Internet of Vehicles services. Without identity authentication technology, vehicles cannot judge the authenticity and validity of received messages. At the same time, there are false messages reported by malicious vehicles, which leads to extreme insecurity and even paralysis of the network. Vehicle identity authentication technology needs to realize the anonymous authentication of the vehicle and protect the privacy of the vehicle from being leaked, especially the location privacy protection of the vehicle. Most of the anonymous authentication of vehicles us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 王文骏王良民熊书明陈龙陈向益殷康红刘怡良
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products