Method for designing vehicle network group negotiation communication protocol

A communication protocol and design method technology, applied in secure communication devices and key distribution, can solve problems such as inefficiency and insecurity, and achieve the effects of reducing workload, reducing the number of authentication times, and eliminating single-point failure problems.

Inactive Publication Date: 2016-10-12
JIANGSU UNIV
View PDF3 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most solutions do not include this or use pairin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for designing vehicle network group negotiation communication protocol
  • Method for designing vehicle network group negotiation communication protocol
  • Method for designing vehicle network group negotiation communication protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Method of the present invention mainly comprises following four parts:

[0042] 1. System initialization

[0043]The trusted authentication center TA selects parameters and generates its own public and private keys with random numbers, defines a hash function and a secure symmetric cryptographic algorithm, and then announces the system parameters and downloads the system parameters to the roadside unit RSU and the on-board unit OBU.

[0044] 2. Both vehicle and RSU certification

[0045] On the road, groups are formed according to geographic regions centered on RSUs with a wide range of communication and strong computing capabilities. In order to communicate with nearby vehicles and RSUs, vehicle users need to perform identity authentication and key negotiation to join the group after entering the communication range of the roadside unit. In this protocol, vehicles and RSUs self-authenticate each other without the participation of a third-party TA. At the same time, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for designing a vehicle network group negotiation communication protocol, which includes the following steps: (1) first establish a system model; (2) system initialization; (3) both vehicle and roadside unit RSU authentication; ( 4) Negotiation and update of the group key; (5) Communication within the group mainly includes broadcast communication, communication between vehicles and RSUs, and one-to-one communication between vehicles. The present invention adopts a public key system without a certificate, and the communication process does not require the participation of a third-party TA, avoiding the time delay problem when the TA authenticates the certificate when the public key encryption system is used, and accelerates the authentication speed. Through the way of group key transmission, the number of authentications of legal vehicles is reduced. Using key agreement to generate keys instead of group leaders to distribute keys reduces the workload of group leaders and eliminates the possible single point of failure.

Description

technical field [0001] The invention relates to the fields of Internet of Vehicles, communication protocol design, safety certification and the like, and in particular to the field of efficient group negotiation communication protocols for vehicle-mounted networks without an authentication center. Background technique [0002] With the rapid development of mobile ad hoc networks, as a network that supports vehicles on the road to communicate to ensure safe driving—vehicle ad hoc network, aims to provide people with a safer and more comfortable driving environment. In daily life, the security of the vehicle network is closely related to traffic accidents and the safety of the owner's life and property. Therefore, we need a security mechanism that can verify messages, authenticate legal vehicles, and track illegal vehicles to ensure the security of the vehicle network. [0003] Most existing solutions, using public key infrastructure mechanisms, do not have efficient vehicle a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/08
CPCH04L9/0833H04L9/0838H04L9/3247H04L67/12
Inventor 韩牟华蕾马世典江浩斌刘文山梁军陈龙
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products