Mutual trust cluster cooperative verification method for Internet of vehicles anonymous authentication

An anonymous authentication and collaborative verification technology, which is applied in the field of security authentication and privacy protection of vehicle ad hoc networks, can solve the problem of large vehicle space

Active Publication Date: 2018-03-23
NAT UNIV OF DEFENSE TECH
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) The vehicle space is large, and the attacker may be equipped with computing resources much larger than ordinary users;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mutual trust cluster cooperative verification method for Internet of vehicles anonymous authentication
  • Mutual trust cluster cooperative verification method for Internet of vehicles anonymous authentication
  • Mutual trust cluster cooperative verification method for Internet of vehicles anonymous authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention is realized in the following ways. First, relevant information is added to the puzzle design according to the real-time driving situation of the vehicle, so as to limit attackers from constructing hash puzzles in advance. Second, in the certificate issuance stage, the mutual trust cluster collaborative verification is used to integrate computing resources between legal vehicles, which improves the efficiency of certificate verification.

[0046] 1. Puzzle Design

[0047] The classic hash puzzle consists of two parts, namely the message and the puzzle. The value of the answer is evaluated by the length of the binary string obtained after hash mapping with all zeros. That is, it is assumed that

[0048]

[0049] Based on the one-way nature of the hash operation, the possibility of using the construction method to generate a puzzle that meets this condition is negligible, that is, it is assumed that the vehicle can only rely on parameter traversal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mutual trust cluster cooperative verification method for Internet of vehicles anonymous authentication, including the following steps: designing hash puzzles to limit attackers from pre-constructing a computing problem, and integrating computing resources between legal vehicles by using a cooperative verification mode. Thereby, the verification speed can be improved, andstrong practical values and good application prospects can be achieved.

Description

technical field [0001] The invention relates to the communication field of an intelligent traffic system, in particular to the security authentication and privacy protection of a vehicle ad hoc network. Background technique [0002] Intelligent transportation system is the development direction of future transportation system. As an important support of intelligent transportation system, vehicle ad hoc network has great application value in road safety and traffic management. The vehicle periodically (every 100ms to 300ms) broadcasts traffic heartbeat messages (such as vehicle speed, direction, position, brake pedal pressure, etc.) and road condition information, so that the vehicle can obtain the perception ability beyond the visual range, thereby effectively avoiding traffic accidents and congestion. Of course, like the other side of a double-edged sword, such applications also hide security and privacy risks: attackers can track interested vehicles to collect vehicle loc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/08
CPCH04L9/3236H04L9/3268H04L67/12
Inventor 孙一品苏金树庞立会钟求喜张博锋赵宝康陈荣茂刘宇靖兰唯
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products