Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Efficient message transmission and authentication method based on mobile vehicle ad hoc network

A vehicle self-organizing network and authentication method technology, which is applied to services based on a specific environment, communication between vehicles and infrastructure, vehicle components, etc.

Inactive Publication Date: 2018-04-10
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the message signing process of this mechanism is relatively complicated, and the system master private key is used alone for a long time, which has security problems
In 2013, the author Kyung-Ah S et al. proposed another identity-based message authentication mechanism in the paper "An efficient identity-based broadcast authentication scheme in wireless". This scheme greatly improves the security, but the scheme Batch authentication cannot be realized, that is, n messages can only be authenticated one by one, so the efficiency is low
In 2016, the author NW Lo et al. proposed a message authentication scheme based on elliptic curves in the paper "An Efficient Conditional Privacy-preserving Authentication Scheme for Vehicular SensorNetworks Without Parings", which solves the security problem and can realize message batch authentication , but the signature process of this scheme is complicated, the efficiency is not high, the number of tuples carried in the message transmission process is large, and the bandwidth requirement is high
In 2016, the author Xiaoming H et al. proposed an efficient message authentication scheme in the paper "Secure and pairing-Free Identity-Based BatchVerification Scheme in Vehicle Ad-Hoc Networks". This scheme is not only simple to initialize, but also efficient in message delivery authentication. It is also extremely high, but there are security risks in this mechanism, that is, the system master private key is used alone for a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient message transmission and authentication method based on mobile vehicle ad hoc network
  • Efficient message transmission and authentication method based on mobile vehicle ad hoc network
  • Efficient message transmission and authentication method based on mobile vehicle ad hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0060] The technical scheme that the present invention solves the problems of the technologies described above is:

[0061] Based on the secure message delivery and authentication, the present invention proposes an efficient message delivery authentication mechanism in the Internet of Vehicles environment, which is suitable for message security delivery and fast authentication in the mobile vehicle ad hoc network.

[0062] In this mechanism, the vehicle first registers with the authority TA (trusted center), and TA generates a unique real identity ID and corresponding key for the vehicle. Secondly, the tamper-proof (anti-tampering device) installed on the OBU (on-board unit) generates a fake identity ID a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an efficient message transmission and authentication method based on a mobile vehicle ad hoc network. The invention provides an efficient low-bandwidth message transmission andauthentication mechanism, the mechanism is a scheme based on identity encryption and anonymous authentication, can protect user privacy information in a message transmission and authentication process, and meanwhile if the transmitted message is not legitimate, the unique authority TA (trusted center) can track vehicle identity through a main private key; the mechanism also supports message batchtransmission and batch authentication. In the method, the authority TA (trusted center) is responsible for the generation of system security parameters in the environment of the Internet of Vehicles and is responsible for calculating and storing related data; and a RSU (road test unit) transits the information through a wireless channel and TA and OBU, and is responsible for calculating and transmitting related data.

Description

technical field [0001] The invention belongs to the field of data security of vehicle ad hoc networks, and in particular relates to message security transmission and authentication, message authentication efficiency and communication overhead under the environment of the Internet of Vehicles. Background technique [0002] With the increasing number of vehicles in today's society, traffic jams, parking difficulties, traffic accidents and some traffic-related problems frequently occur around us. Therefore, traffic management, safe driving and traffic communication are attracting more and more people's attention. As a special mobile ad hoc network, it is an important application form in the field of intelligent transportation. It aims to improve the driving safety and driving efficiency of road traffic, and can effectively strengthen traffic safety and prevent and control Congestion and improving the traffic driving environment have urgent practical application requirements, b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/44H04W4/46H04W12/04H04W12/06H04W12/041H04W12/106
CPCH04W12/04H04W12/06
Inventor 唐飞谭富元罗文俊洪钟
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products