Efficient pseudonym management and data integrity protection protocol

A technology of data integrity and pseudonymity, which is applied in digital transmission systems, encryption devices with shift registers/memory, security devices, etc., to provide location privacy protection, balance false recognition rates, and reduce communication time and computing costs.

Active Publication Date: 2017-08-11
SOUTHEAST UNIV
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Current identity-based data integrity protocol schemes can satisfy requirements (1) and (2), while (3) is largely ignored
Furthermore, while working on the current topic, we found that none of the existing cryptographic primitives can be directly used to achieve the goals discussed above

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient pseudonym management and data integrity protection protocol
  • Efficient pseudonym management and data integrity protection protocol
  • Efficient pseudonym management and data integrity protection protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further explained below in conjunction with the accompanying drawings and specific embodiments.

[0048] Such as figure 1 As shown, the present invention involves three entities, the content of the communication between these entities, and the four phases contained in the protocol. The three entities defined in the present invention are: Trusted Authority (TA), Vehicle (Vhicle) and Roadside Infrastructure (RSU). The trusted authority generates keying material and communicates the corresponding keying material to the vehicle and the roadside infrastructure, respectively. After the vehicle obtains the key and public parameters distributed by the trusted organization, it needs to use the signature algorithm to generate a signature for the message to be sent and send it to the roadside infrastructure. After the roadside infrastructure receives the message, it needs to use the signature algorithm to verify the message. Finally, the trusted or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an efficient pseudonym management and data integrity protection protocol. The efficient pseudonym management and data integrity protection protocol comprises three entities: a trust agency, a vehicle and a road-side unit. The trust agency generates secret key data and transfers corresponding secret key data to the vehicle and the road-side unit. After obtaining a secret key and a public parameter distributed by the trust agency, the vehicle needs to generate a signature for to-be-sent information by using a signature algorithm and then sends the information to the road-side unit. After receiving the information, the road-side unit verifies the information by using the signature algorithm. Finally, the trust agency can trace the vehicle by monitoring a pseudonym transmission path so as to acquire real identity and position information of the vehicle eventually. Through adoption of the efficient pseudonym management and data integrity protection protocol, efficient car-pooling is ensured, the transportation costs of the car owner are saved, and the load rate of the driver is improved.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things security, and in particular relates to a protocol suitable for VANET to use Bloom filter, K-anonymity and hash chain technology to realize efficient pseudonym management and data integrity protection. Background technique [0002] In the intelligent transportation system, the application of Vehicular Ad Hoc Networks (VANET, Vehicular Ad Hoc Networks) technology in vehicle emergency warning, traffic congestion management, etc. is a typical IoT field scenario. In order to ensure the communication security between vehicles and roadside infrastructure (Road-Side Unit, RSU), provide location privacy and integrity protection, simplify the deployment of public key infrastructure (PKI) and symmetric key infrastructure, suitable for VANET Security schemes often use identity-based cryptography for key management. [0003] No matter how the technology is implemented, a typical identity-based inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04W12/02H04W12/04H04W12/10H04W84/18
CPCH04L9/0643H04L63/0421H04L63/062H04L63/08H04L63/123H04W12/02H04W12/04H04W12/10H04W84/18
Inventor 万长胜李静韩民杨
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products