Unlock instant, AI-driven research and patent intelligence for your innovation.

Design method of lightweight identity authentication protocol for in-vehicle network based on device fingerprint

A device fingerprint and identity authentication technology, which is applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve the problem that the identity information of wireless access devices is easy to be forged and tampered with, so as to improve security and efficiency Effect

Active Publication Date: 2020-05-05
JIANGSU UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then, the identity authentication of external access devices is carried out according to the identification results of all comparison fingerprint similarities in the fingerprint database, which solves the problem that the identity information of wireless access devices is easy to be forged and tampered, and then achieves only legal external devices In order to obtain the purpose of accessing the information authority in the vehicle, and thus improve the safety and efficiency of vehicle network communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design method of lightweight identity authentication protocol for in-vehicle network based on device fingerprint
  • Design method of lightweight identity authentication protocol for in-vehicle network based on device fingerprint
  • Design method of lightweight identity authentication protocol for in-vehicle network based on device fingerprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Method of the present invention mainly comprises following two parts:

[0027] 1. System initialization

[0028] External devices need to register with the registration center RC before use, and obtain the unique identity ID distributed by the registration center i After that, the registration center collects the radio frequency signal of the wireless device, performs preprocessing such as frequency conversion and amplitude modulation on the collected signal, intercepts the target signal and extracts the characteristics of the target signal, and then uses Hash in cryptography to extract the fingerprint features f i Do the operation, and finally put the wireless device ID i as well as Stored in the device fingerprint comparison database FD, and downloaded to the storage unit SU of legal vehicles.

[0029] 2. Authentication of wireless external devices

[0030] When the wireless peripheral device wants to obtain in-vehicle information through the vehicle wireless in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a device fingerprint-based vehicle-mounted network light identity authentication protocol design method. The method comprises the steps of (1) building of a system model: establishing a registration center (RC), an external device (ED), and a storage unit (SU) installed on a vehicle; (2) system initializing: registering, by the RC, the ED and distributing a device ID, building a fingerprint database (FD) of the device, and downloading the FD to the SU of a legal vehicle; and (3) identity authentication of a wireless external device. The method is better in identification, availability and uniqueness. ''Radio frequency fingerprint'' of an accessed device is protected by using a Hash function in cryptography, so that a problem that identity information of the wireless external access device is easy to forge and tamper is solved. Due to design of the device fingerprint-based light identity authentication scheme, it is ensured that only a legal external device can access information in the vehicle, so that the vehicle-mounted network communication is safer and more efficient.

Description

technical field [0001] The invention relates to the fields of device fingerprints, vehicle network, identity authentication protocol design and the like, in particular to the field of lightweight identity authentication protocol for vehicle network based on device fingerprints. Background technique [0002] With the development of automobile intelligence and networking, automobiles have more wireless interfaces, enabling the vehicle electronic control unit (ECU) to communicate with external devices or networks. These external wireless interfaces bring more convenience to drivers While being functional and functional, it also becomes an entry point for cyber attacks inside the car. Attackers will use the security loopholes in the in-vehicle network communication protocol to attack the in-vehicle network through wireless devices, thereby seriously endangering the personal and property safety of vehicle drivers, passengers, and traffic participants. [0003] Scholars at home a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/06H04L9/32
CPCH04L9/3236H04L63/0876H04L2209/80H04W12/06
Inventor 韩牟华蕾马世典刘帅万爱兰
Owner JIANGSU UNIV