Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Vehicles distributed authentication method based on controllable privacy

An authentication method, a technology of the Internet of Vehicles, which is applied in the field of vehicle network communication security, and can solve the problems of not achieving non-repudiation.

Inactive Publication Date: 2015-08-19
JIANGSU UNIV
View PDF2 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Priya et al. proposed the GAP scheme, which uses group signatures and batch authentication, but does not achieve non-repudiation in a distributed environment. In this scheme, vehicles can counterclaim RSU for forged signatures.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Vehicles distributed authentication method based on controllable privacy
  • Internet of Vehicles distributed authentication method based on controllable privacy
  • Internet of Vehicles distributed authentication method based on controllable privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Such as figure 1 Shown, the present invention has 5 steps altogether, is respectively:

[0049] (1) System initialization: the authority selects public parameters and registers RSU and vehicles;

[0050] (2) Pseudonym and partial signature private key update: the authority authenticates the identity of the vehicle, issues a signature private key request certificate for the vehicle, and the vehicle obtains a batch of corresponding signature private keys from the RSU according to the signature private key request certificate;

[0051] (3) Message signature: the vehicle uses the secret value issued by the authority and the signature private key obtained from the RSU to sign the message;

[0052] (4) Signed message authentication: The vehicle authenticates the signed message according to the received signed message sent by other vehicles;

[0053] (5) Tracking and revocation of the real identity: when the signed message is disputed, the authority will track the real ident...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Vehicles distributed authentication method based on controllable privacy, relates to the field of vehicle network communication safety, and specifically relates to an Internet of Vehicles distributed authentication method based on controllable privacy. The method specifically includes five following steps: system initialization; private key update of fake names and a part of signatures; message signature; message authentication of signatures; and real identity tracking and revocation. According to the method, the double hash chain is employed to establish the fake names, the communication cost for invalidating a vehicle identity is irrelevant to the numbers of the fake names and a part of the signature private keys of the vehicle, a vehicle user can update multiple parts of signature private keys by the adoption of one authorization, and the burden of trusted authority (TA) and road-side units (RSU) is reduced; when a message with a controversial signature occurs, the TA can distinguish whether the signature is forged by the RSU according to re-signature of the message uploaded by the vehicle, and the problem of non-repudiation in the distributed environment is solved. According to the method, the security is high, the cost is low, and the method is applicable to node high-speed movement, topology structure volatility, and large-scale VANET network.

Description

technical field [0001] The invention relates to the field of vehicle network communication security, in particular to a controllable privacy-based distributed authentication method for vehicle networking. Background technique [0002] Vehicle ad hoc network is the specific application of mobile ad hoc network and sensor technology in the field of transportation. It can greatly reduce the occurrence of road traffic safety accidents, improve road traffic efficiency and provide information services. The vehicle ad hoc network adopts dedicated short-range communication, supports two communication modes of vehicle-to-vehicle communication V2V and vehicle-to-roadside unit communication V2I, to build a self-organizing, distributed, easy-to-deploy, and open-structure vehicle intercommunication network. [0003] The deployment and implementation of vehicular network has huge social and economic benefits. In recent years, it has attracted great attention from industry and academia, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/069H04W12/106
CPCH04W12/06
Inventor 陆杰徐宗保周从华王良民刘志锋施化吉申屠浩
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products