Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Message Authentication Method for Internet of Vehicles Based on Edge Computing

A technology of message authentication and edge computing, which is applied in the field of vehicle network communication security, can solve problems such as insufficient computing efficiency, failure to meet performance requirements, redundant authentication, etc., and achieve low message authentication redundancy, low computing and communication overhead, The effect of high operating efficiency

Active Publication Date: 2020-09-01
ANHUI UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to solve these security and privacy issues in the Internet of Vehicles, in recent years, many researchers have proposed authentication schemes with their own characteristics, but these schemes basically have redundant authentication, the calculation efficiency is not high enough, and the performance requirements cannot be met in extreme cases.
[0004] In order to solve the problem of redundant authentication and computing efficiency in the field of vehicle network message authentication, this scheme proposes an efficient message authentication scheme for vehicle network based on edge computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message Authentication Method for Internet of Vehicles Based on Edge Computing
  • Message Authentication Method for Internet of Vehicles Based on Edge Computing
  • Message Authentication Method for Internet of Vehicles Based on Edge Computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] The edge computing-based vehicle networking message authentication method of this embodiment includes the following steps:

[0059] (1) System initialization of participating entities in the Internet of Vehicles: parameter generation, and vehicle generation of pseudonyms and signatures;

[0060] (2) Message authentication of RSU and vehicle: RSU elects an edge computing vehicle (ECV), ECV performs tasks, and RSU checks the authentication result of ECV and vehicle message authentication.

[0061] In the parameter generation phase of step (1), TA generates the necessary system parameters, and then TA preloads these system parameters into the vehicle's TPD (tamper-proof device, anti-tampering device) and all RSUs through a secure communication channel. Specific steps are as follows:

[0062] 1) TA randomly selects two large prime numbers p, q, and one defined as y 2 =x 3 The nonsingular elliptic curve E of +ax+b mod q (where a,b∈F p ), and in group G q The generator P...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an efficient message authentication method for a vehicular ad hoc network based on edge computing, which comprises the steps of system initialization of participating entitiesof the Internet of vehicles, wherein the step comprises two processes such as parameter generation and vehicle pseudonym and signature generation; and (2) message authentication of an RSU (Roadside Unit) and a vehicle, wherein the step comprises four processes such that the RSU elects an edge computing vehicle (ECV), the ECV executes a task, the RSU checks an authentication result of the ECV and vehicle message authentication is performed. The signing portion of the invention adopts an elliptic curve cryptography based operation, thereby enabling the computation and transmission overhead to below; further the ECV is elected according to a fuzzy logic control theory to achieve local optimal election; the ECV is set to help the RSU to achieve quick and accurate message signature authentication; and the RSU reduces the redundant authentication of the whole system to the maximum extent through broadcasting the authentication result, and the operating efficiency of the whole vehicular ad hoc network is improved.

Description

technical field [0001] The invention relates to vehicle network communication security technology, in particular to an edge computing-based vehicle network message authentication method. Background technique [0002] With the development of the automobile industry and the improvement of the economic level, the number of automobiles continues to increase, and people's demand for automobile safety and driving comfort is becoming more and more urgent. The Internet of Vehicles (VANET, Vehicular Ad Hoc Network) emerged as the times require, and has become a research hotspot that the government, research institutions and vehicle manufacturers have paid close attention to. A typical Internet of Vehicles consists of three parts: Trusted Authority (TA, Trust Authority), Roadside Unit (RSU, Roadside Unit) and Roadside Unit (OBU, On BoardUnit). The OBU of the vehicle is mainly responsible for two kinds of communication, namely, vehicle-to-vehicle communication (V2V) and vehicle-to-RSU...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/08H04L29/06H04L9/30
Inventor 崔杰魏璐仲红许艳张静陈志立石润华
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products