Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Secure communication method based on intelligent vehicle

A technology for secure communication and smart cars, applied in the field of secure communication of smart cars, can solve problems such as hidden safety hazards, inability to verify the integrity of messages, and theft of smart cars, to prevent camouflage, prevent tampering with communication content, and ensure identity Effect

Active Publication Date: 2015-11-11
ZHEJIANG UNIV
View PDF10 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The server does not refuse any request to establish a connection, so there is a situation where someone pretends to be a smart car and sends false smart car information to the server, while the real smart car is at risk of being stolen
It is also possible that someone pretends to be the server and sends false control commands to the smart car, which poses a great security risk
Since the integrity of the message cannot be verified during the communication between the smart car and the server in the form of plain text, that is, whether it has been tampered with, there may be a security risk that the message is modified by a hacker in the middle

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method based on intelligent vehicle
  • Secure communication method based on intelligent vehicle
  • Secure communication method based on intelligent vehicle

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the technical solution of the present invention clearer, the following in conjunction with the attached Figures 1 to 3 , the present invention will be described in detail. It should be understood that the specific implementations described in this specification are only for explaining the present invention, and are not intended to limit the protection scope of the present invention.

[0031] Each smart car will be assigned a globally unique smart car number when it leaves the factory, and there is also a MASK value corresponding to the number one by one, which is equivalent to the password of the smart car. The server is assigned a pair of public key and private key, and the public key of the server is built in when the smart car leaves the factory. The safe communication method of smart car of the present invention is realized through the following steps:

[0032] Step 1: The smart car client randomly generates a number, which is used as the key of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure communication method based on an intelligent vehicle. The secure communication method comprises the steps: an intelligent vehicle client randomly generates a number which is used as the secret key for a communication symmetric encryption algorithm and verifies a server, and generates a symmetric secret key by using an asymmetric encryption algorithm and sends the symmetric secret key to the server; the server uses a private key to decrypt messages, and uses the symmetric encryption algorithm to encrypt a handshake text 'hello, zjuroboy !' and replies the encrypted handshake text 'hello, zjuroboy !' to the client; the client uses the symmetric encryption algorithm to decrypt the handshake text; the client uses the symmetric encryption algorithm to encrypt an intelligent vehicle serial number and MASK if verification is successfully; the server decrypts the verification information to obtain the serial number and the MASK so as to verify the identity of the intelligent vehicle; and based on the established connection, the intelligent vehicle and the server use the symmetric encryption algorithm to perform bidirectional communication. The secure communication method based on an intelligent vehicle can remove three hidden dangers that the communication content is eavesdropped; the communication identity is camouflaged; and the communication content is tampered during the communication process between the intelligent vehicle and the server.

Description

technical field [0001] The invention relates to a safe communication method for an intelligent vehicle. Background technique [0002] Communication between the smart car and the server in the form of plain text has great security risks. Specifically, there are three security risks as follows: the communication content is eavesdropped, the communication identity is disguised, and the communication content is tampered with. [0003] Since the above information is transmitted in the Internet, and the so-called Internet is composed of networks that can connect to the whole world, no matter where the server and client are in communication, the routers and switches on the entire communication line Network equipment such as bridges and bridges cannot all be the private property of a certain person, so there is no guarantee that these links will not be eavesdropped, and the identity will be disguised and tampered with. Once a message transmitted in plaintext is stolen, the stealin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/04H04W12/06H04W12/03H04W12/041H04W12/126
CPCH04L63/062H04L63/08H04W12/04H04W12/06
Inventor 李红陈小双杨国青李坤吴朝晖
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products