Method for resisting Sybil attack with multiple fake identity sources in car networking

A vehicle networking and identity technology, applied in the vehicle network field, can solve the problems of relying on the loyalty of neighbor vehicles and not meeting the needs of practical applications, and achieve the effect of eliminating Sybil attacks and preventing repudiation

Active Publication Date: 2015-06-17
JIANGSU UNIV
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method does not require the help of RSU, the authenticity of neighbor information exchanged between vehicles depends on the loyalty of neighbor vehicles. The premise of the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for resisting Sybil attack with multiple fake identity sources in car networking
  • Method for resisting Sybil attack with multiple fake identity sources in car networking
  • Method for resisting Sybil attack with multiple fake identity sources in car networking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] Such as Figures 1 to 3 As shown, the collision event E1 occurs in the traffic scene of this embodiment, assuming that the event E 1 The reputation value threshold is 8, and the credibility value threshold is 2. The nearby vehicle (assumed to be vehicle A) immediately sends an alarm message to other vehicles, and the vehicle behind the event (assumed to be vehicle B 1 , B 2 ,...,B n ) received an alert message.

[0043] (1) Vehicle A generates a local certificate to prepare for subsequent communication. The specific implementation steps are as follows:

[0044] 1) Vehicle A PK according to the ECC algorithm A =sk A · P mod n and PID A =Hash(PK A ||s) respectively calculate their own public key PK A and the pseudonym PID A , sending them to the local RSU r.

[0045] 2) After receiving the message sent by A, the local RSU r sends a message to TA to verify the public key and pseudonym of vehicle A. If it fails the TA verification, it means that vehicle A tries ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for resisting Sybil attack with multiple fake identity sources in car networking. The method comprises the following steps that an RSU establishes a local certificate for a registered vehicle in the car networking so as to resist the Sybil attack with the fake identity; the RSU resists the Sybil attack with the steal identity by verifying the local certificate of the vehicle in the vehicle-vehicle communication process; the vehicle establishes the real-time and dynamic reputation value and the credible value for each alarming event, and performs after-treatment. The method is used for resisting the Sybil attack with multiple fake identity sources, such as fake, steal and conspiring, and meanwhile protecting the privacy of the vehicle as well as resisting attack.

Description

technical field [0001] The invention relates to vehicle network technology, in particular to a method for resisting Sybil attacks from multiple sources of false identities in the vehicle network. Background technique [0002] In recent years, as an important part of the intelligent transportation system, the vehicle ad hoc network has developed rapidly. It mainly transmits traffic information quickly through communication between vehicles and between vehicles and infrastructure, promotes traffic management, enhances road safety, and improves people's travel quality. However, the characteristics of VINET's wireless multi-hop communication mode and dynamic topological structure make the security problem of VANET increasingly prominent, which has become a focus of current research. [0003] Many applications related to VINET (such as hazard warning, brake warning, etc.) require mutual cooperation between vehicles, and it is believed that participating vehicles have unique lega...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0823H04L63/1466H04L67/12
Inventor 石亚丽李春彦王良民陈龙陈向益王文骏刘怡良
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products