Certificate-based vehicle identification method for use in internet of vehicles

A vehicle identity and authentication method technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of increasing authentication overhead and increasing vehicle storage overhead, and achieve the effect of preventing further attacks

Active Publication Date: 2014-12-17
JIANGSU UNIV
View PDF3 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the number of identities in the vehicle identity revocation list will increase over time, which not only increases the storage overhead of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate-based vehicle identification method for use in internet of vehicles
  • Certificate-based vehicle identification method for use in internet of vehicles
  • Certificate-based vehicle identification method for use in internet of vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with the accompanying drawings and specific examples of implementation.

[0025] figure 1 It is a flow chart of the method of the present invention, comprising the following steps:

[0026] (1) Vehicle identity authentication system entity initialization

[0027] (1.1) Authentication Authority (TA) initialization

[0028] TA configures the parameters required for the signature in the vehicle identity authentication system, and the system parameters are (q, U, U’, G, G’, G T ,e,p,p',Enc(),event,h); where TA randomly selects is the private key, and calculate U=up∈G and U′=up′∈G′; G and G′ are two additive cyclic groups, G T is a multiplicative cyclic group; p and p' are the generators of G and G' respectively, and ψ(p')=p, that is, G and G' are isomorphic; e is an effective bilinear pairing mapping: e:G ×G′→G T ;Enc() is a secure symmetric encryption algorithm; event is a system event; h is a hash...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a certificate-based vehicle identification method for use in an internet of vehicles. The method is characterized in that a vehicle is independently identified with a time-limited certificate which is issued by a region server and replacing the true identity of the vehicle; the vehicle detects a malicious vehicle identity and transmits it to the region server; after receiving the malicious vehicle identity and its signature, the region server traces region registration information of the true identity and transmits the region registration information to a certification center; the certification center confirms the true identity of the vehicle and revokes the identity. The method has the advantages that the problem that the failure of the vehicle to independently finish the identification process by the existing Sybil attack detection method causes attack detection delay is solved; extra space and computation overhead caused by revoking of the vehicle identity are avoided; independent vehicle identification and privacy protection are achieved; the true identity of each malicious vehicle can be traced so that re-attacks of the malicious vehicles are prevented.

Description

technical field [0001] The invention belongs to the field of vehicle identity authentication in the Internet of Vehicles, and in particular relates to a certificate-based vehicle identity authentication method. Background technique [0002] Vehicle identity authentication technology is the basis of Internet of Vehicles services. Without identity authentication technology, vehicles cannot judge the authenticity and validity of received messages, and under the influence of Sybil attacks launched by malicious vehicles, vehicles will make wrong judgments and cause serious damage. traffic accident. [0003] At present, in the existing Sybil attack detection technology, the vehicle needs the help of the roadside infrastructure (RSU) to complete the vehicle identity authentication. These technologies are used in an Internet of Vehicles environment where RSUs are sparsely arranged. Malicious vehicles launch Sybil attacks in an environment where there are no RSUs nearby. The attacke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L9/32H04L29/06
Inventor 王文骏王良民熊书明陈龙陈向益殷康红刘怡良
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products