Unlock instant, AI-driven research and patent intelligence for your innovation.

An Efficient Data Transmission Method Based on Identity in Vehicular Ad Hoc Networks

A data transmission method and vehicle-mounted self-organization technology, applied in the field of identity-based efficient data transmission, can solve the problem of short transmission messages, achieve efficient location privacy protection, integrity and confidentiality protection, and reduce communication time and computing costs. Effect

Active Publication Date: 2019-07-26
SOUTHEAST UNIV
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(5) Short transmission message
Furthermore, while working on the current topic, we found that none of the existing cryptographic primitives can be directly used to achieve the goals discussed above

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Efficient Data Transmission Method Based on Identity in Vehicular Ad Hoc Networks
  • An Efficient Data Transmission Method Based on Identity in Vehicular Ad Hoc Networks
  • An Efficient Data Transmission Method Based on Identity in Vehicular Ad Hoc Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further described below in conjunction with the accompanying drawings.

[0056] Vehicle ad hoc network model such as figure 2 shown. It includes three entities: trusted institutions, vehicles and roadside infrastructure, each entity has an identity, and the identity information defining trusted institutions, vehicles and roadside infrastructure are: ID TA 、ID v and ID RSU . The trusted authority generates keys and system public parameters and transmits the corresponding keys to vehicles and roadside infrastructure, respectively. After the vehicle obtains the key and public parameters distributed by the trusted organization, it needs to use a signature algorithm to generate a signature for the message to be sent, then encrypt it and send it to the roadside infrastructure. After the roadside infrastructure receives the message, it needs to first decrypt the message, and then use the signature algorithm to verify the message.

[0057] T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based high-efficiency data transmission method in a vehicular ad hoc network. The method comprises the following steps of (1) a key generation stage and (2) a data transmission stage, wherein the key generation stage is as follows: a trust institution generates an own private key, a vehicle private key, a road-side unit private key and system public parameters and respectively sends corresponding key materials to a vehicle and a road-side unit; the data transmission stage is as follows: the vehicle utilizes a signature algorithm to generates a signature of a message, encrypts the message and vehicle identity information and sends a ciphertext and a signature thereof to the road-side unit together; after the road-side unit receives the ciphertext, the road-side unit utilizes the own private key to decrypt to obtain the message and the vehicle identity information and utilizes the signature algorithm to verify the integrity of the message. According to the method, when the private key is constructed, an algebraic signature and a Lagrange interpolating polynomial are utilized to replace a bilinear mapping method in the conventional scheme, the complicated pseudonym management is avoided, the computational cost is remarkably reduced while the communication time is shortened, and the requirements for safety and high efficiency of a data transmission protocol are met.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to an efficient identity-based data transmission method in a vehicle ad hoc network. Background technique [0002] In recent years, with the development of ITS (Intelligent Transportation Systems), people are paying more and more attention to the research of Vehicular Ad Hoc Networks (VANET, Vehicular Ad Hoc Networks), especially in vehicle emergency warning, traffic congestion management, etc. aspects of application. In order to ensure the security of the communication between the vehicle and the roadside infrastructure (Road-Side Unit, RSU) and simplify the key management process, the data transmission protocol of VANET usually uses identity-based encryption technology to protect data transmission. [0003] No matter how the technology is implemented, the identity-based data transmission protocol suitable for VANET consists of three parts: trusted authority (T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32H04L29/06H04L29/08
CPCH04L9/0861H04L9/0866H04L9/3066H04L9/3247H04L63/0428H04L63/08H04L67/12
Inventor 万长胜李静韩民杨
Owner SOUTHEAST UNIV