System and method for preventing and controlling dissemination of untrusted resources in Internet of Vehicles

A vehicle networking and resource technology, applied in the field of information security, to avoid mistrust, meet real-time requirements, and improve efficiency

Active Publication Date: 2020-06-16
CHONGQING UNIV OF POSTS & TELECOMM
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The above studies on the access control and security of the Internet of Vehicles are aimed at the protection of resource owners, and adopt protection strategies for the outflow of resources. In turn, there are threats of malicious resource push and injection to vehicle terminals, so the inflow of vehicle terminal resources It is necessary to conduct control studies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for preventing and controlling dissemination of untrusted resources in Internet of Vehicles
  • System and method for preventing and controlling dissemination of untrusted resources in Internet of Vehicles
  • System and method for preventing and controlling dissemination of untrusted resources in Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solutions in the embodiments of the present invention will be described clearly and in detail below in conjunction with the accompanying drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0039] The technical scheme that the present invention solves the problems of the technologies described above is:

[0040] Such as figure 1 Shown is the overall structure structure diagram of the system of the present invention, including: trusted party TA, roadside infrastructure RSU, vehicle node V A and V B .

[0041] Such as figure 2 It is a vehicle terminal structure diagram, which is divided into several parts: TPM mainly stores and verifies vehicle attributes, and provides vehicle cryptographic services TPM provides cryptographic security services for vehicles, including CP-ABE technology, RSU digital signature technology, and asymmetric encryption and decryption Technology to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention requests to protect a system and method for controlling untrusted resource transmission in Internet of vehicles. The method comprises the following steps: designing an access control strategy and a node trust value calculation method for nodes of a resource output vehicle, limiting fixed attributes and dynamic attributes of the resource output vehicle, and dynamically generating a fine-grained access control strategy according to the traveling track of the vehicle to ensure that the access control strategy has better extensibility and flexibility. Thereby, the anonymous directional transmission of messages can be achieved, the waste of resources can be reduced, and the identity privacy of communication vehicles can be effectively protected; the calculation of node trust values can guarantee the trust degree of resource communicators and meet the security and privacy requirements of security related messages in Internet of vehicles; and malicious nodes can be effectively identified, and the injection of malicious resources and the transmission of untrusted resources can be prevented. The method disclosed by the invention can be widely applied to the related fields of mobile Internet, wireless sensor network and the like.

Description

technical field [0001] The present invention relates to the field of information security, relates to the wireless communication technology for vehicle-mounted mobile application interaction in the Internet of Vehicles environment, and particularly relates to access control and trusted computing. Background technique [0002] With the development of the Internet of Vehicles and the intelligentization of vehicles, the information security issues of vehicles are gradually exposed, and the research on its security and privacy has gradually become a research hotspot. The Internet of Vehicles is an open and dynamic network with high-speed topology changes and diverse resources. Vehicles in the network need to use authentication methods to protect their resources from illegal access by malicious nodes. [0003] Due to the self-organizing nature of the Internet of Vehicles, the verification method must also be flexible and scalable. The control strategy should be able to meet the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0263H04L63/102H04L63/20
Inventor 刘宴兵叶青常光辉王宇航李露
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products