Large-scale IoV security data acquisition method

A data collection and big data technology, applied in the field of Internet of Things, can solve problems such as vulnerability to man-in-the-middle attacks, inability to directly apply the big data collection process, and masquerading attacks

Active Publication Date: 2016-09-28
SHANGHAI JIAO TONG UNIV +2
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Subsequently, Liu et al. proposed a key exchange scheme for securely scheduling big data applications, but it is somewhat deficient in privacy protection
Due to the heterogeneity, complexity and dynamic topology of IoV, the above existing protocols in related fields cannot be directly applied to the large-scale IoV big data collection process
Since the data collected by large-scale IoV comes from different regions and have their own attributes, these big data are heterogeneous in size, capacity and dimension, so many different methods are required to collect data between vehicles and application platforms. Communication technology, which will inevitably lead to the leakage of vehicle address information or operating parameter privacy, which has great security risks; at the same time, the process of information transmission is also vulnerable to attacks such as man-in-the-middle attacks, replay attacks, masquerading attacks, and information tampering
However, the existing security protocols in the IoT cannot be directly applied to the large-scale data collection of the IoV. With the complexity of the dynamic network structure and the increase in the number of vehicle nodes, an appropriate security mechanism is urgently needed to provide security support

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Large-scale IoV security data acquisition method
  • Large-scale IoV security data acquisition method
  • Large-scale IoV security data acquisition method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0077] The safe data acquisition method under the large-scale Internet of Vehicles provided by the present invention comprises the following steps:

[0078] Initialization step: each vehicle node obtains a legal certificate from the e-commerce certification authority, and all vehicle nodes are registered in the big data center and generate corresponding public-private key pairs with the big data center, and the vehicle node and big data are forwarded through the intersection node Information exchange be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a large-scale IoV security data acquisition method. The method includes an initial step that each vehicle node acquires the legal certificate of an electronic commerce certification and authentication mechanism, all of the vehicle nodes are registered in a big data center, the information exchange between the vehicle nodes and the big data center can be completed by the forwarding of the intersection nodes and the registration of the intersection nodes in the big data center is completed during the forwarding; a primary single sign-on step that the vehicle nodes and the intersection nodes are connected to the big data center according to different protocols; a secondary sign-on step that when the vehicle nodes are far away from the intersection nodes connected in the primary sign-on step, the vehicle nodes establish connection with nearby new intersection nodes; and a safe data acquisition step that the vehicle nodes and the big data center realize the acquisition and the transmission of business data and secret data via the intersection nodes. The safe method adopted in each step is an independent system; and meanwhile, the continuity of the steps is guaranteed, and the security of data acquisition is guaranteed as a whole.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a safe data collection method under a large-scale Internet of Vehicles. Background technique [0002] With the rapid development of communication and computing technology, more and more vehicles are connected to the Internet of Things (IoT Internet of Things). As a huge interactive network, the Internet of Vehicles (IoV Internet of Vehicles) has become a research hotspot in the mobile Internet. Information such as the vehicle's position, speed and driving route is collected into the central processing system through specific sensors and devices. Computing and analyzing these vehicle information has great research value and commercial interest. In IoV, the trajectory of a vehicle is constrained by roads distributed over a wide physical area. A large amount of traffic information is shared through IoV, which is conducive to intelligent management and road optimiza...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/045H04L63/0815H04L63/0823H04L63/0876H04L63/0892H04L63/123H04L65/1073H04L67/12
Inventor 李强刘雨辰郭龙华伍军李建华叶天鹏李京伟李高磊陈璐艺郭小贤
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products