Identity based efficient anonymous batch authentication method in IOV (Internet of Vehicles) environment

An authentication method, a technology of the Internet of Vehicles, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve the problems of low efficiency of the authentication process, high computational overhead, and no improvement in efficiency.

Active Publication Date: 2016-08-10
南京秉蔚信息科技有限公司
View PDF3 Cites 76 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Third, we cannot ensure that all users will not use their anonymous identities to publish false news, thereby escaping their own legal responsibilities
Fourth, in the process of solving security and privacy protection problems, computational overheads such as signature and verification are introduced, which increases the burden on the network
[0004] In order to solve the above series of problems, Chim et al. proposed the SPECS scheme, which proposes a solution based on software implementation without relying on tamper-resistant devices, but the SPECS scheme allows any vehicle and group members to authenticate and communicate with each other. There are some problems in communication: malicious vehicles in the Internet of Vehicles can pretend to be other vehicles to send false messages, or pretend to be other members in the group to safely send group messages, and can escape the traceability of the trusted center
Assuming that it follows the implementation method in the SPECS scheme, there is still a difference in the generation of signature keys in the message signature phase and the group message signature phase, and because of the one-time pad, each time a vehicle sends an intra-group message and a non-group message, it must Conduct a judgment process, which will introduce additional costs and reduce communication efficiency
[0007] 2. In this scheme, compared with the SPECS scheme, the efficiency of batch authentication and individual authentication has not been improved. Instead, a point product operation on the elliptic curve is introduced in the vehicle signature generation stage, which increases the computational overhead of the vehicle. At the same time, the efficiency of signature generation is reduced
[0008] 3. In this scheme, the batch authentication process uses two pairs of operations, the calculation overhead is too large, and the authentication process is inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity based efficient anonymous batch authentication method in IOV (Internet of Vehicles) environment
  • Identity based efficient anonymous batch authentication method in IOV (Internet of Vehicles) environment
  • Identity based efficient anonymous batch authentication method in IOV (Internet of Vehicles) environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solutions of the present invention will be described in detail below, but the protection scope of the present invention is not limited to the embodiments.

[0054] The present invention is carried out under certain system hypothesis, and concrete system model and hypothesis are described as follows:

[0055] Introduce several important components in the Internet of Vehicles model. Trusted Hub (TA), Roadside Infrastructure (RSUs), On-board Communications Unit (OBU). RSUs are trusted and usually have strong computing power and high storage capacity.

[0056]1. Assume that TA is always online, trustworthy, and never compromises. Such an assumption is usually taken when defining it in the Internet of Vehicles. The communication between TA and RSUs is through a secure channel, usually through a secure wired connection. There are redundant TAs to avoid single point of failure and functional bottlenecks. TA is the issuing organization of the certificate, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity based efficient anonymous batch authentication method in an IOV (Internet of Vehicles) environment. The identity based efficient anonymous batch authentication method in the IOV environment comprises an initial handshake module, a message signature module, a batch authentication module, an identity tracing module, a group key generation module and a group message signature and authentication module. According to the identity based efficient anonymous batch authentication method in the IOV environment, authentication between vehicles and infrastructures and authentication between vehicles can be realized, no tamper-proofing device is depended, privacy protection is realized by utilizing a pseudonymous name, conditional privacy protection is realized as a TA (Trusted Authority) can trace the real identity of each vehicle if necessary, the efficiency is improved as batch authentication is adopted, and the authentication process is simple and efficient. The message signature process and the group message signature process are same, the operating cost is low, and a replay attack can be borne as a time stamp is added.

Description

technical field [0001] The invention relates to the Internet of Vehicles technology, in particular to an identity-based efficient anonymous batch authentication method under the Internet of Vehicles environment. Background technique [0002] With the continuous development of mobile Internet communication technology and intelligent computing, mobile ad hoc networks have gradually penetrated into all walks of life. The Internet of Vehicles is a typical example. As the basis of intelligent transportation, it has become a research hotspot in academia and industry. Vehicle-to-vehicle communication (V2V) and vehicle-to-infrastructure communication (V2I) are realized by adopting the advanced 802.11p standard communication protocol, installing wireless communication equipment (OBU) on vehicles and deploying roadside communication infrastructure on a large scale. Thereby greatly improving the driving experience and enhancing driving safety. The vehicular network is required to pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3066H04L9/3236H04L9/3252H04L63/0421H04L63/062H04L63/0823H04L63/0876H04L63/0884H04L63/1466
Inventor 崔杰张磊仲红许艳
Owner 南京秉蔚信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products