Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Message authentication and group key negotiation method based on vehicle-mounted short distance communication network

A technology of group key negotiation and message authentication, applied in user identity/authority verification, electrical components, transmission systems, etc. Security, the effect of realizing confidential communication

Active Publication Date: 2016-07-27
DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The application of message authentication technology in the V2X network can realize secure communication between vehicle nodes. Before message authentication, the keys must be distributed to each vehicle node. leaking the key
[0005] The problem of key distribution can be solved by using the group key agreement method. However, due to the characteristics of the V2X network, such as the vehicle is in a constantly changing state, the relative position of the vehicle nodes is unstable, and the time to pass the roadside nodes is very short. , implementing message authentication and group key agreement in V2X networks is still facing great challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message authentication and group key negotiation method based on vehicle-mounted short distance communication network
  • Message authentication and group key negotiation method based on vehicle-mounted short distance communication network
  • Message authentication and group key negotiation method based on vehicle-mounted short distance communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0039]In the V2X network, the vehicle node regularly broadcasts heartbeat information including its own unique identification, geographical location information, driving direction and other information. At the same time, the vehicle node receives the heartbeat information of surrounding nodes, and can communicate with the vehicle nodes within its communication range. On urban roads, roadside nodes are installed at intersections and other places with heavy traffic flow, and have the characteristics of high installation location, large coverage area, high bandwidth and reliable connection.

[0040] figure 1 It is a schematic flow chart of the method of the present invention. As shown in the figure, the message authentication and group key negotiation method based on the vehicle-mounted short-distance communication network of the present inventi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a message authentication and group key negotiation method based on a vehicle-mounted short distance communication network, comprising steps of utilizing a road side node arranged at a crossroad to detect the state of a signal lamp, constituting vehicles having same geographic position information and same driving directions into a cluster during the red light, performing verification on the vehicle-mounted node in the cluster through a certificate authorization center, and distributing a secret key to the vehicle-mounted node passing through the verification, wherein the vehicle-mounted node in the cluster utilizes the distributed secret key to generate a group code through a cluster code negotiation process and thus utilizes the group code to realize the confidential communication between the vehicle-mounted nodes. The message authentication and group key negotiation method utilizes the V2X network characteristics, like the characteristics of the road side node, that the vehicle-mounted node is in the halted state when the red light is on and the status of all vehicle-mounted nodes are equal, realizes the information verification of the vehicle-mounted nodes and the cluster secret key negotiation process in the V2X network, and improves the safety of the V2X network.

Description

technical field [0001] The invention relates to a method for message authentication and group key negotiation based on a vehicle-mounted short-distance communication network, and belongs to the technical field of vehicle-mounted communication networks. Background technique [0002] The vehicle short-distance communication (VehicletoX: V2X) network is realized by short-distance communication technologies such as wireless communication, GPS / GIS, and sensors. 2-Vehicle), outside the vehicle (vehicle-2-Infrastructure), and between vehicles (Vehicle-2-Person). [0003] As a wireless mobile network with constantly moving vehicles as the core node, V2X has the characteristics of rapid change in topology structure, especially the opening of its communication medium leads to poor channel security, and is more vulnerable to attacks than traditional networks. At the same time, since V2X is the core of the future intelligent transportation system (ITS), it involves high-security applic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/08
Inventor 王成金陈山枝
Owner DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products