Method for protecting privacy of vehicle ad hoc network based on signcryption

A vehicle ad hoc network and privacy protection technology, applied in the direction of services based on specific environments, communication between vehicles and infrastructure, network topology, etc., can solve the problem that security and personal privacy are not fully guaranteed and are unlikely to be accepted and participation in VANET, restricting the development and application of VANET, to achieve the effect of ensuring security, improving efficiency, and preventing illegal attacks

Inactive Publication Date: 2018-02-09
CHONGQING UNIV OF POSTS & TELECOMM
View PDF10 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

People are unlikely to accept and participate in VANET when they are worried about their security and personal privacy, which seriously restricts the further development and application of VANET

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting privacy of vehicle ad hoc network based on signcryption
  • Method for protecting privacy of vehicle ad hoc network based on signcryption
  • Method for protecting privacy of vehicle ad hoc network based on signcryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0043] The technical scheme that the present invention solves the problems of the technologies described above is:

[0044] The signcryption-based vehicle ad hoc network privacy protection mechanism provided by the present invention includes the following steps, see figure 2 :

[0045] 1. A method for protecting privacy in a vehicle ad hoc network based on signcryption, comprising the following steps

[0046] S1: System initialization, the key generation center (Private Key Generator, PKG) and the trusted authority center (TrustedAuthority) generate system public parameters, where the system public parameters include two order p bilinear groups G and G T , the generator g in G and the bilinear map e: G...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention request to protect a method for protecting privacy of a vehicle ad hoc network based on signcryption. The method is used for solving a privacy protection problem when a vehicle node (OBU) under an environment of the Internet of vehicles communicates with a road side unit (RSU). On the basis of a digital signature mechanism and a pseudonym mechanism, the invention provides a signcryption mechanism which is an integrated scheme synthesizing encryption and signature; in the method, privacy protection on the vehicle node is achieved via the pseudonym mechanism. Under the environmentof the Internet of vehicles, the vehicle node sends own identity information to a TRA to generate a pseudonym, a secret key generation center generates a secret key corresponding to a private key of the pseudonym, the vehicle node uses the generated pseudonym and the secrete key to perform signcryption on a message and sends the message to the road side unit, after receiving the message, the roadside unit uses the private key to decrypt the message and verify the same, and the message is accepted if the verification is passed.

Description

technical field [0001] The invention belongs to the field of cryptography and the safety of the Internet of Vehicles, in particular to the privacy protection of users in the environment of the Internet of Vehicles. Background technique [0002] According to statistics on crashes, more than 6 million automobile accidents occur on U.S. highways each year. Probably more than 42,000 people died due to such accidents, and at the same time, about 3 million people were injured, and the economic losses caused by this exceeded 23 billion. Astonishingly, in the United States, about 5 people die in these accidents every hour, or 1 person every 12 minutes. To mitigate the threat of these potential crashes and improve the driver's driving experience, automakers and telecommunications companies have made great efforts to equip every car with wireless equipment. In this way, vehicles can communicate with each other, as well as between vehicles and roadside infrastructure at key road node...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04W4/44H04W12/02H04W12/06H04W84/18H04W12/041
CPCH04L9/0861H04W12/02H04W12/06H04W84/18
Inventor 唐飞洪钟罗文俊谭富元
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products