Security Authentication Method for Vehicular Ad Hoc Network Based on Cuckoo Filter

A vehicle self-organization and network security technology, which is applied in the field of vehicle self-organization network security certification based on Cuckoo filter, can solve the problems of no group communication verification and no increase in verification overhead.

Active Publication Date: 2019-03-29
ANHUI UNIVERSITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the b-SPECS+ scheme not only does not propose verification for group communication (vehicle-to-vehicle communication), but also does not have any improvement in verification overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Authentication Method for Vehicular Ad Hoc Network Based on Cuckoo Filter
  • Security Authentication Method for Vehicular Ad Hoc Network Based on Cuckoo Filter
  • Security Authentication Method for Vehicular Ad Hoc Network Based on Cuckoo Filter

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The technical solutions of the present invention will be described in detail below, but the protection scope of the present invention is not limited to the embodiments.

[0074] Such as figure 1 As shown, a kind of vehicle-mounted ad hoc network security authentication method based on Cuckoo filter of the present invention is divided into 2 layers: the top layer is the national credible institution TA, which is connected with RSU through a safe channel; the bottom layer has RSU and vehicle (or OBU) Composition, the communication between them is based on the dedicated short-range communication (DSRC) protocol; TA is always online, credible, and never compromised, TA can uniquely confirm the true identity of the vehicle; RSU is credible, compared to OBU, With higher computing power.

[0075] Such as figure 2 As shown, a kind of vehicle-mounted ad hoc network security authentication method based on Cuckoo filter of the present invention has two steps, are respectively: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vehicle-mounted self-organizing network security authentication method based on a Cuckoo filter, which includes two steps in sequence: (1) identity authentication between the vehicle and the infrastructure (V2I), specifically including system initialization, initial handshake, and message signature (2) vehicle-to-vehicle (V2V) identity authentication, specifically including three processes of group key generation, group message signature and group message authentication. The present invention is based on software implementation and does not depend on any special hardware equipment; in the authentication stage, the method of non-bilinear pairing is used, and this non-bilinear pairing verification method is not only applicable to V2I, but also applicable to V2V verification, with efficient calculation Capability and low overhead cost, the technique of inserting Cuckoo filter and binary search in the batch authentication stage can retrieve whether the signature is valid, which greatly improves the efficiency of the verification stage.

Description

technical field [0001] The invention relates to the field of vehicle network communication security, in particular to a Cuckoo filter-based vehicle ad hoc network security authentication method. Background technique [0002] VANETs is a self-organizing network consisting of interrelated vehicles, the main purpose of which is to ensure the safety and convenience of drivers and passengers. The function of each car is equivalent to a router, which can transmit information to the outside world through wireless communication equipment. A typical VANETs has two node types, one is the mobile communication node pre-installed on the vehicle, On-Board Unit (OBU), and the other is the infrastructure deployed on both sides of the road on a large scale, Road Side Unit (RSU). [0003] Communication in VANETs is divided into two types, vehicle-to-vehicle communication (V2V) and vehicle-to-infrastructure communication (V2I), and these two types of communication are controlled by a short-ra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0825H04L9/0869H04L9/0877H04L9/3073
Inventor 崔杰张静仲红许艳温靖宇
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products