Privacy protection batch authentication method without pairing operation in vehicular ad hoc network

An in-vehicle self-organization and privacy protection technology, which is applied to user identity/authority verification and key distribution, can solve the problems of large amount of calculation, reduced calculation efficiency, and reduced scheme calculation efficiency, so as to reduce overhead, improve actual operation efficiency and save money. The effect of signing and verification time

Inactive Publication Date: 2016-06-08
SHANGHAI SECOND POLYTECHNIC UNIVERSITY
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the technical scheme proposed by Tzeng and other scholars uses the two most time-consuming pairing operations in the actual operation process. From their experimental results, it can be seen that the pairing operation is one of the most complicated operations, and the amount of calculation is far less than that of There are many dot multiplication operations, which greatly reduces the computational efficiency of this technical solution
In addition, the hiding of the real identity information in this scheme uses a dot product operation, which further reduces the computational efficiency of the scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection batch authentication method without pairing operation in vehicular ad hoc network
  • Privacy protection batch authentication method without pairing operation in vehicular ad hoc network
  • Privacy protection batch authentication method without pairing operation in vehicular ad hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following combination figure 1 with figure 2 , a preferred embodiment of the present invention is described in detail.

[0032] Such as figure 1 with figure 2 As shown, the privacy protection batch authentication method without pairing operation in the vehicle-mounted ad hoc network provided by the present invention includes:

[0033] S1. System establishment phase: The trusted organization TA in the vehicle ad hoc network establishes system parameters, generates a system master key, and broadcasts it to the roadside unit RSU and all vehicles; and the trusted organization TA generates a key for each vehicle A real identity and corresponding password, which is pre-stored in each vehicle together with the system master key;

[0034] S2. Virtual identity generation stage: verify the real identity and password of the vehicle to broadcast messages in the vehicle ad hoc network, and establish a corresponding virtual identity after passing;

[0035] S3. Message signin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy protection batch authentication method without a pairing operation in a vehicular ad hoc network. The privacy protection batch authentication method comprises the following steps: S1, establishing a system parameter by a credible mechanism in the vehicular ad hoc network, generating a system master key, and broadcasting the system master key to a roadside unit and all vehicles, and generating a real identity and a corresponding password for each vehicle by the credible mechanism, and storing the real identity and the corresponding password in each vehicle together with the system parameter; S2, verifying the real identity and the password of the vehicle which is about to broadcast a message, and establishing a corresponding virtual identity after passing the verification; S3, signing the message to be broadcasted by the vehicle through the established virtual identity, and broadcasting the signed message to the roadside unit and other vehicles; and S4, verifying the broadcasted message in one or more modes by the roadside unit and other vehicles, and accepting the broadcasted message after the verification is passed. According to the privacy protection batch authentication method provided by the invention, no pairing operation is needed in the message signature or verification, and the three problems of security, privacy protection and authentication efficiency in the vehicular ad hoc network can be solved at the same time.

Description

technical field [0001] The invention relates to a privacy protection batch authentication method in a vehicular ad hoc network, specifically a privacy protection batch authentication method in a vehicular ad hoc network that does not require pairing operations, and belongs to the field of vehicular network communication security. Background technique [0002] The vehicle ad hoc network is a wireless ad hoc network applied to vehicle communication. Vehicles can obtain real-time traffic information from the vehicle ad hoc network; such as: the current traffic flow, traffic accidents, and the speed, location, and Orientation, etc., and select the best route accordingly to effectively alleviate road traffic congestion and minimize or avoid traffic accidents, thereby improving road traffic efficiency. Therefore, vehicular ad hoc network is one of the most promising applications in the field of transportation. [0003] However, due to the openness of the wireless network itself, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0863H04L9/0869H04L9/3236H04L9/3247
Inventor 胡小明
Owner SHANGHAI SECOND POLYTECHNIC UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products