Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certificate-based vehicle identity authentication method in Internet of Vehicles

A vehicle identity and authentication method technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of increasing authentication overhead and increasing vehicle storage overhead, and achieve the effect of preventing further attacks

Active Publication Date: 2018-02-16
JIANGSU UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the number of identities in the vehicle identity revocation list will increase over time, which not only increases the storage overhead of the vehicle, but also increases the authentication overhead in some methods, and these overheads are not helpful to the Internet of Vehicles service.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate-based vehicle identity authentication method in Internet of Vehicles
  • Certificate-based vehicle identity authentication method in Internet of Vehicles
  • Certificate-based vehicle identity authentication method in Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings and specific examples of implementation.

[0026] figure 1 It is a flow chart of the method of the present invention, comprising the following steps:

[0027] (1) Vehicle identity authentication system entity initialization

[0028] (1.1) Authentication Authority (TA) initialization

[0029] TA configures the parameters required for the signature in the vehicle identity authentication system, and the system parameters are (q, U, U’, G, G’, G T ,e,p,p',Enc(),event,h); where TA randomly selects is the private key, and calculate U=up∈G and U′=up′∈G′; G and G′ are two additive cyclic groups, G T is a multiplicative cyclic group; p and p' are the generators of G and G' respectively, and ψ(p')=p, that is, G and G' are isomorphic; e is an effective bilinear pairing mapping: e:G ×G′→G T ;Enc() is a secure symmetric encryption algorithm; event is a system event; h is a hash...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a certificate-based vehicle identity authentication method in the Internet of Vehicles. Vehicles use time-sensitive certificates issued by regional servers instead of their real identities to achieve independent authentication of vehicle identities. The vehicle sends the detected identity information of the malicious vehicle to the regional server. After receiving the identity of the malicious vehicle and its signature, the regional server traces the regional registration information of the real identity of the vehicle and sends the information to the authentication center, which confirms the identity of the malicious vehicle. The true identity of the vehicle and revoke its identity. The identity authentication method proposed by the present invention solves the attack detection delay caused by the inability of the vehicle to independently complete the identity authentication process in the existing Sybil attack detection method, as well as the extra space and calculation overhead caused by the revocation of the vehicle identity, and realizes the independence of the vehicle identity Authentication and privacy protection, and the ability to trace the true identity of malicious vehicles to prevent malicious vehicles from launching attacks again.

Description

technical field [0001] The invention belongs to the field of vehicle identity authentication in the Internet of Vehicles, and in particular relates to a certificate-based vehicle identity authentication method. Background technique [0002] Vehicle identity authentication technology is the basis of Internet of Vehicles services. Without identity authentication technology, vehicles cannot judge the authenticity and validity of received messages, and under the influence of Sybil attacks launched by malicious vehicles, vehicles will make wrong judgments and cause serious damage. traffic accident. [0003] At present, in the existing Sybil attack detection technology, the vehicle needs the help of the roadside infrastructure (RSU) to complete the vehicle identity authentication. These technologies are used in an Internet of Vehicles environment where RSUs are sparsely arranged. Malicious vehicles launch Sybil attacks in an environment where there are no RSUs nearby. The attacke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L9/32H04L29/06
Inventor 王文骏王良民熊书明陈龙陈向益殷康红刘怡良
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products