Efficient condition privacy protection and security authentication method in internet of vehicles

A technology for privacy protection and security authentication, applied in the field of Internet of Vehicles and wireless communication, can solve problems such as excessive computing overhead, security loopholes, unsatisfactory, etc., to achieve the effect of reducing computing overhead and ensuring communication security

Active Publication Date: 2016-10-12
ANHUI UNIVERSITY
View PDF2 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, the scheme cannot satisfy undeniable
[0007] In 2015, Horng et al found some security loopholes in Lee and Lai's scheme
Recently, Bayat et al. and He et al. also proposed their own improved security authentication schemes based on Lee and Lai's scheme, but the cryptographic related operations required for the signature and authentication processes in the schemes are complex and require too much computing overhead.
In the case of high vehicle density, traffic congestion, and large amount of communication information on the roads in the city center, it is easy to become the bottleneck of network communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient condition privacy protection and security authentication method in internet of vehicles
  • Efficient condition privacy protection and security authentication method in internet of vehicles
  • Efficient condition privacy protection and security authentication method in internet of vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] In bilinear pairing-based schemes, the bilinear map The group G in is generated on the elliptic curve y 2 =x 3 On +xmodn, where n is a 512-bit prime number, and the order q of the group G is a 160-bit prime number. In the scheme based on elliptic curve encryption ECC, when the same security level is achieved, the group G used is generated on the elliptic curve y 2 =x 3 On +ax+bmodn, where n is a 160-bit prime number and order q is a 160-bit prime number. Some of the main cryptographic operations are defined as follows, T bp is the time to perform a bilinear pairing operation, and the time to perform a scalar point product in a group based on bilinear pairings is T mp-bp , the time to perform a scalar point multiplication in the group based on elliptic curve ECC is T mp-ecc ,T mtp is the time to execute a hash function that maps to elements on the group. In the hardware environment of the Intel I7-4770 processor with a main frequency of 3.40GHz, 4Gb memory and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient condition privacy protection and security authentication method in an internet of vehicles. The efficient condition privacy protection and security authentication method comprises the following steps of: system initialization, generation of pseudonym identities and signature private keys of vehicles, signing and authentication of a message and tracing of real identities of the vehicles. The vehicles carry out cooperative communication with surrounding vehicles and roadside units deployed at both sides of a road by on-board units assembled on the vehicles, driving security of the vehicles can be effectively improved, and vehicle users can more conveniently and rapidly acquire related traffic services. The efficient condition privacy protection and security authentication method disclosed by the invention not only can meet security requirements in the internet of vehicles, but also optimizes the computing process of signature generation and verification in the communication. The efficient condition privacy protection and security authentication method is greatly improved on the aspect of efficiency of computing cost, communication cost and the like, and is more applicable to communication and application in the internet of vehicles.

Description

technical field [0001] The invention relates to the Internet of Vehicles and wireless communication technology, in particular to an efficient conditional privacy protection and security authentication method in the Internet of Vehicles. Background technique [0002] Vehicles have become a means of transportation that almost every family will use, and in all walks of life, such as police cars, ambulances, large trucks and other different types of large or small vehicles are all over the city's traffic roads. The rapid increase in the number of vehicles has brought many problems, such as more and more frequent traffic accidents, traffic congestion during the rush hour in big cities, traffic management by the Vehicle Supervision Bureau and the traffic department, etc. To solve these problems, research on vehicle networks and intelligent transportation systems is becoming more and more extensive. By equipping each vehicle with an on-board unit (OBU) that can communicate wireles...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/30H04L9/08
CPCH04L9/0869H04L9/3066H04L9/3249H04L9/3297H04L63/0421H04L63/123H04L63/126H04L67/12
Inventor 崔杰温靖宇仲红许艳
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products