Time-triggered in-vehicle network message authentication method based on hierarchical multi-layer one-way key chain

An in-vehicle network, time-triggered technology for key distribution

Inactive Publication Date: 2017-12-12
JILIN UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a time-triggered vehicle-mounted network message authentication method based on a hierarchical multi-layer one-

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time-triggered in-vehicle network message authentication method based on hierarchical multi-layer one-way key chain
  • Time-triggered in-vehicle network message authentication method based on hierarchical multi-layer one-way key chain
  • Time-triggered in-vehicle network message authentication method based on hierarchical multi-layer one-way key chain

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0065] It includes the following steps:

[0066] The first stage: the sending node is initialized. In this stage, the sending node constructs a hierarchical multi-layer one-way key chain, and credibly distributes the initial key of the first key chain of each layer to its receiving node;

[0067] The second stage: send the message and key of the node multicast verification;

[0068] The third stage: the receiving node verifies the received message and key;

[0069] The construction of a hierarchical multi-layer one-way key chain by the sending node in the first stage of the present invention includes the following steps:

[0070] Definition 1: The structure of a hierarchical n-layer one-way key chain is defined as a set of n two-tuples S={(α 1 ,β 1 ),(α 2 ,β 2 ),...,, (α n ,β n )}, where α i And β i They are used to represent the length of each one-way key chain of the i-th layer (i∈[1,...n]), excluding its initial key and key size;

[0071] Definition 2: The key generation function of a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a time-triggered vehicle network message authentication method based on a hierarchical multi-layer unidirectional key chain, which belongs to the time-triggered vehicle network data authentication method under the Internet of Vehicles environment. The sending node is initialized, the sending node builds a hierarchical multi-layer one-way key chain and distributes the initial key; the sending node multicasts the verified message and key; the receiving node verifies the received message and key. The present invention is based on the concept of delayed release of hierarchical multi-layer key chains. The bottom key has a shorter release delay and length to authenticate real-time communication data, and each high-level key has a longer release delay and length. The length is used to credibly distribute the initial key of its lower layer key chain, and the sending node only needs to calculate and store the first key chain of each layer in advance; trigger the resource constraints, real-time and security of the vehicle network at time It provides an appropriate trade-off between performance and greatly reduces the overhead of bandwidth, storage and computing resources generated by message authentication.

Description

technical field [0001] The invention relates to a time-triggered vehicular network message authentication method based on a hierarchical multi-layer unidirectional key chain, which is used to ensure the integrity of data on the time-triggered vehicular network and the authenticity of data sources under the Internet of Vehicles environment. Background technique [0002] Networking enables automobiles to have richer comfort and infotainment functions. For example, automobile manufacturers use mobile APPs to provide services such as door lock control, heating adjustment, manual parking, and software updates, and have greatly promoted the intelligentization of automobiles. , The development of traffic intelligence, but at the same time it also brings new information security risks to cars. Traditionally, the vehicle control system is physically isolated from the outside world, so the internal network of the current vehicle control system (ie vehicle network, such as CAN / CAN_FD, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06H04L29/08H04J3/06
CPCH04L9/0819H04J3/0638H04L9/0861H04L63/0435H04L63/06H04L63/083H04L63/12H04L67/12
Inventor 赵睿秦贵和秦俊刘家侨雷雨龙孙铭会刘毅晏婕
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products