Vehicle-mounted ad hoc network security authentication method based on Cuckoo filter

A vehicle self-organization and network security technology, which is applied in the field of vehicle self-organization network security authentication based on Cuckoo filter, can solve the problems of no group communication verification and no increase in verification overhead.

Active Publication Date: 2016-09-21
ANHUI UNIVERSITY
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the b-SPECS+ scheme not only does not propose verification for group communication (vehic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle-mounted ad hoc network security authentication method based on Cuckoo filter
  • Vehicle-mounted ad hoc network security authentication method based on Cuckoo filter
  • Vehicle-mounted ad hoc network security authentication method based on Cuckoo filter

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The technical solutions of the present invention will be described in detail below, but the protection scope of the present invention is not limited to the embodiments.

[0074] like figure 1 As shown, a kind of vehicle-mounted ad hoc network security authentication method based on Cuckoo filter of the present invention is divided into 2 layers: the top layer is the national credible organization TA, connects with RSU through safe channel; The bottom layer has RSU and vehicle (or OBU) Composition, the communication between them is based on the dedicated short-range communication (DSRC) protocol; TA is always online, credible, and never compromised, TA can uniquely confirm the true identity of the vehicle; RSU is credible, compared to OBU, have higher computing power.

[0075] like figure 2 As shown, a kind of vehicle-mounted ad hoc network safety authentication method based on Cuckoo filter of the present invention has two steps altogether, is respectively: (1) ident...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vehicle-mounted ad hoc network security authentication method based on a Cuckoo filter. The method comprises the following two steps: 1) identity authentication between a vehicle and an infrastructure (V2I), wherein the step comprises the following four specific processes: system initialization, initial handshake, message signature and massage authentication; and 2) identity authentication between vehicles (V2V), wherein the step comprises three specific processes: group key generation, group message signature and group massage authentication. The method is realized based on software without depending on any other specific hardware equipment; an unparalleled linear pairing method is adopted in the authentication phase, and the unparalleled linear pairing authentication method is suitable for both V2I and V2V authentication, so that the method has efficient computing power and lower cost; and in the batch certification phase, the Cuckoo filter and the binary search technique are adopted to detect whether signature is effective, so that efficiency of the authentication phase is improved to a great extent.

Description

technical field [0001] The invention relates to the field of vehicle network communication security, in particular to a Cuckoo filter-based vehicle ad hoc network security authentication method. Background technique [0002] VANETs is a self-organizing network consisting of interrelated vehicles, the main purpose of which is to ensure the safety and convenience of drivers and passengers. The function of each car is equivalent to a router, which can transmit information to the outside world through wireless communication equipment. A typical VANETs has two node types, one is the mobile communication node pre-installed on the vehicle, On-Board Unit (OBU), and the other is the infrastructure deployed on both sides of the road on a large scale, Road Side Unit (RSU). [0003] Communication in VANETs is divided into two types, vehicle-to-vehicle communication (V2V) and vehicle-to-infrastructure communication (V2I), and these two types of communication are controlled by a short-ra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0825H04L9/0869H04L9/0877H04L9/3073
Inventor 崔杰张静仲红许艳温靖宇
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products