Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Vehicle infrastructure cooperative security communication method based on hash encryption

A technology of secure communication and vehicle-road coordination, which is applied in the field of vehicle-mounted network and vehicle-use secure communication, can solve problems such as intermittent, lower communication quality, and lower authentication efficiency, and achieve safe and reliable identity authentication, confidentiality, and integrity Effect

Active Publication Date: 2017-08-15
TONGJI UNIV
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the IoV based on DSRC communication technology, the vehicle is connected through the on-board OBU and the drive test system RSU, but the connection cannot be maintained all the time, and the connection is intermittent, because the RSU is a single device and its communication range is short
And every time information exchange with RSU, identity authentication is required, which obviously reduces the quality of communication
In terms of authentication methods, digital certificates are also used for identity authentication, but the current number of cars in my country is 140 million, which will undoubtedly greatly increase the burden of key management and certificate management, and also reduce the efficiency of authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle infrastructure cooperative security communication method based on hash encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0035] The present invention provides a vehicle-road cooperative security communication method based on hash encryption. When a vehicle transmits information, the request information of the information sender needs to be added with the PIN (Personal Identification Number) code of the vehicle itself, and mixed according to the combination method defined by the communication parties. Finally, the generated information is encrypted by hash to generate a corresponding hash value, and the information receiver performs a query according to the received hash value. After querying, if the hash...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a vehicle infrastructure cooperative security communication method based on hash encryption. The method comprises the following steps: step 1), mixing connection request information and a PIN code into a secondary character string by an information sender, wherein the PIN code is a unique identification code corresponding to the information sender; step 2), performing hash encryption on the secondary character string, and generating a corresponding hash value; and step 3), maintaining a database that stores multiple hash values by an information receiver, after receiving the hash value in step 2) by the information receiver, traversing to find the database, and judging whether the received hash value is valid; if yes, then establishing a secure communication connection with the information sender; otherwise, refusing the connection. Compared with the prior art, the vehicle infrastructure cooperative security communication method based on the hash encryption provided by the invention has the advantages of being high in security, and capable of realizing access control and so on.

Description

technical field [0001] The invention relates to the field of vehicle network and vehicle safety communication, in particular to a vehicle-road collaborative safety communication method based on hash encryption. Background technique [0002] The development of the Internet of Vehicles in the future will depend on the development of its security technology. In the Internet of Vehicles based on DSRC communication technology, the vehicle is connected through the on-board OBU and the drive test system RSU, but the connection cannot always be maintained, and the connection is intermittent, because the RSU is a single device and its communication range is relatively short. However, identity authentication is required every time information is exchanged with the RSU, which significantly reduces the communication quality. In terms of authentication methods, digital certificates are also used for identity authentication, but the current number of cars in my country is 140 million, wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/06
CPCH04L9/0643H04L63/10H04L63/123H04L63/1441H04L67/12
Inventor 罗峰胡强谢凌风常欣伟
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products