Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Efficient Pseudonym Management and Data Integrity Protection Protocol

A data integrity and pseudonym technology, applied in the field of IoT security, to reduce communication time and computing cost, provide location privacy protection, and balance the false recognition rate.

Active Publication Date: 2021-06-11
SOUTHEAST UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Current identity-based data integrity protocol schemes can satisfy requirements (1) and (2), while (3) is largely ignored
Furthermore, while working on the current topic, we found that none of the existing cryptographic primitives can be directly used to achieve the goals discussed above

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Efficient Pseudonym Management and Data Integrity Protection Protocol
  • An Efficient Pseudonym Management and Data Integrity Protection Protocol
  • An Efficient Pseudonym Management and Data Integrity Protection Protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The invention is further illustrated in conjunction with the accompanying drawings and specific embodiments.

[0048] Such as figure 1 As shown, the present invention relates to three entities, content between these entities, and four stages included in the protocol. The three entities defined by the present invention are: trusted mechanisms (TA), VHICLE and roadside infrastructure (RSU). The trusted mechanism generates a key material and transmits the corresponding key material to the vehicle and the roadside infrastructure. After the vehicle gets the key and public parameters distributed by the trusted mechanism, the message to be sent is sent to the roadside infrastructure after using the signature algorithm to generate a signature. After receiving the message, the roadside infrastructure needs to verify the message using the signature algorithm. The final trusted mechanism can track the vehicle by monitoring the pseudonym transport path, and finally obtain real identity...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a high-efficiency pseudonym management and data integrity protection protocol, which includes three entities: trusted institutions, vehicles and roadside infrastructures. The trusted institutions generate key materials and transmit corresponding key materials to vehicles and roadside infrastructures respectively. roadside infrastructure. After the vehicle obtains the key and public parameters distributed by the trusted organization, it needs to use the signature algorithm to generate a signature for the message to be sent and send it to the roadside infrastructure. After the roadside infrastructure receives the message, it needs to use the signature algorithm to verify the message. Finally, the trusted organization can track the vehicle by monitoring the pseudonym transmission path, and finally obtain the real identity and location information of the vehicle. The invention can not only ensure high-efficiency carpooling and save the transportation cost of the owner, but also improve the loading rate of the driver.

Description

Technical field [0001] The present invention belongs to the field of Internet security technology, and in particular, there is a way to apply to VaNet using a rulbon filter, k-anonymous and hash chain technology to achieve efficient and false name management and data integrity protection protocols. Background technique [0002] In intelligent transportation systems, the use of Vanet, Vehicular Ad Hoc Networks technology in vehicle emergency warning, traffic congestion management, etc. is a typical network of Internet of Things. In order to ensure communication security between vehicles and road-side units, RSUs provide location privacy and integrity protection, simplify deployment public key infrastructure (PKI) and symmetric key infrastructure, suitable for Vanet Safety solutions typically use identity-based encryption techniques for key management. [0003] Regardless of how technology is implemented, a typical identity-based integrity protection protocol includes three parts: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06H04W12/02H04W12/03H04W12/041H04W12/0431H04W12/106H04W12/121H04W84/18
CPCH04L9/0643H04L63/0421H04L63/062H04L63/08H04L63/123H04W12/02H04W12/04H04W12/10H04W84/18
Inventor 万长胜李静韩民杨
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products