Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Mutual Trust Cluster Collaborative Authentication Method for Anonymous Authentication in Vehicle Networks

An anonymous authentication and collaborative verification technology, which is applied in the field of security authentication and privacy protection of vehicle-mounted ad hoc networks, and can solve problems such as large vehicle space.

Active Publication Date: 2020-10-02
NAT UNIV OF DEFENSE TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) The vehicle space is large, and the attacker may be equipped with computing resources much larger than ordinary users;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Mutual Trust Cluster Collaborative Authentication Method for Anonymous Authentication in Vehicle Networks
  • A Mutual Trust Cluster Collaborative Authentication Method for Anonymous Authentication in Vehicle Networks
  • A Mutual Trust Cluster Collaborative Authentication Method for Anonymous Authentication in Vehicle Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention is realized in the following ways. First, relevant information is added to the puzzle design according to the real-time driving situation of the vehicle, so as to limit attackers from constructing hash puzzles in advance. Second, in the certificate issuance stage, the mutual trust cluster collaborative verification is used to integrate computing resources between legal vehicles, which improves the efficiency of certificate verification.

[0048] 1. Puzzle Design

[0049] The classic hash puzzle consists of two parts, namely the message and the puzzle. The value of the answer is evaluated by the length of the binary string obtained after hash mapping with all zeros. That is, it is assumed that

[0050]

[0051] Based on the one-way nature of the hash operation, the possibility of using the construction method to generate a puzzle that meets this condition is negligible, that is, it is assumed that the vehicle can only rely on parameter traversal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mutual trust cluster cooperative verification method for Internet of vehicles anonymous authentication, including the following steps: designing hash puzzles to limit attackers from pre-constructing a computing problem, and integrating computing resources between legal vehicles by using a cooperative verification mode. Thereby, the verification speed can be improved, andstrong practical values and good application prospects can be achieved.

Description

technical field [0001] The invention relates to the communication field of an intelligent traffic system, in particular to the security authentication and privacy protection of a vehicle ad hoc network. Background technique [0002] Intelligent transportation system is the development direction of future transportation system. As an important support of intelligent transportation system, vehicle ad hoc network has great application value in road safety and traffic management. Vehicles periodically (every 100ms to 300ms) broadcast traffic heartbeat messages (such as vehicle speed, direction, position, brake pedal pressure, etc.) Of course, like the other side of a double-edged sword, such applications also hide security and privacy risks: attackers can track interested vehicles to collect vehicle location information and driving trajectories, or forge false information to intentionally cause traffic accidents. In this regard, the vehicular ad hoc network adopts an anonymous...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/08
CPCH04L9/3236H04L9/3268H04L67/12
Inventor 孙一品苏金树庞立会钟求喜张博锋赵宝康陈荣茂刘宇靖兰唯
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products