Internet of vehicles group key management method oriented to multiple services and privacy protection

A technology of privacy protection and management method, applied in the field of wireless communication, to achieve the effect of protecting identity privacy and realizing forward security

Active Publication Date: 2016-05-04
ANHUI UNIVERSITY
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] Purpose of the invention: The purpose of the present invention is to solve the defects existing in the prior art, and to provide a multi-service and privacy protection-oriented car networking group key management method. The key update problem when joining, leaving, and handing over the RSU area, so that the vehicle can safely maintain the required services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of vehicles group key management method oriented to multiple services and privacy protection
  • Internet of vehicles group key management method oriented to multiple services and privacy protection
  • Internet of vehicles group key management method oriented to multiple services and privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] Embodiment 1, set forth the present invention in detail below by present embodiment, concrete process is:

[0072] like figure 1 As shown, when the vehicle V i Leaving area A and entering area B, in order to maintain the subscribed service, update the handover key to ensure forward and backward security. The handover key update process is as follows:

[0073] (1)RSU A Signal processing process:

[0074] (11)V i RSU detected A signal P A Weak and RSU B signal P B Very strong (P A B ), V i Generate a random number N 2 , and use RSU A public key PKR A Encrypted N 2 , EncPKR A (N 2 ). Then put your current pseudonym information PID i , public key PK i , ordered service set SG i , the current timestamp T i and EncPKR A (N 2 ) as message M, and with N 2 As a key to generate a message authentication code HMAC(N 2 ,M), and finally send Message5.

[0075] Message5: (M=PID i ||PK i ||SG i ||EncPKR A (N 2 )||T i , HMAC(N 2 ,M))

[0076] (12)RSU ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of vehicles group key management method oriented to multiple services and privacy protection. The method sequentially comprises the following steps: (1) establishing a two-layer network model of Internet of vehicles (colons are deleted); (2) describing a scene in which multiple groups subscribe multiple services in the Internet of vehicles based on the network model in the step (1); (3) protecting identity privacy of vehicles through a pseudonym mechanism, wherein TA can reveal real identities of the vehicles when service disputes occur; (4) using key update slot KUS by a TEK update strategy; and (5) after turnover of the vehicles, performing TEK update in a target region to ensure backward security, and performing TEK update in an original region to ensure forward security. Through adoption of the method, the identity privacy of the vehicles, non-repudiation of vehicle subscription services and service continuity during inter-regional turnover of the vehicles can be ensured.

Description

technical field [0001] The present invention relates to wireless communication technology, in particular to a multi-service and privacy protection-oriented car networking group key management method. Background technique [0002] In recent years, research on VANETs (vehicle ad hoc network) and service applications based on VANETs has been on the rise. Service providers can simultaneously provide diverse services for multiple vehicle groups, such as in-vehicle music, in-vehicle video, and in-vehicle interaction. games, mobile TV services, etc. These services are all applications for group communication of VANETs. The service provider uses the traffic encryption key (TEK, TrafficEncryptionKey) to provide services to the vehicle group that purchases the service, and the roadside unit RSU broadcasts these encrypted services. Due to the mobility of the vehicle, the vehicle often leaves the RSU area where it is located, joins a new RSU area, or is handed over from one RSU area t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0421H04L63/068H04L67/12
Inventor 王良民吴海云殷赵霞仲红冯霞肖云汤进
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products