Key-insulated safe car networking V2I authentication system and method

An authentication system, a technology of the Internet of Vehicles, which is applied in the field of security authentication for communication between vehicles and infrastructure, and can solve the problems of time-consuming bilinear mapping and limited resources.

Active Publication Date: 2018-05-01
CHONGQING UNIV OF POSTS & TELECOMM
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In addition, vehicles and devices installed on vehicles for executing cryptographic algorithms are resource-constrained, and a large number of security sol...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key-insulated safe car networking V2I authentication system and method
  • Key-insulated safe car networking V2I authentication system and method
  • Key-insulated safe car networking V2I authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0036] refer to Figure 1-Figure 3 , the specific embodiments of the present invention are as follows:

[0037] 1. In the most initial situation, each element under the Internet of Vehicles is initialized. First, the key generation center PKG generates a series of basic system environment parameters and selects random numbers As the system master key, and calculate the system public key PK pub =SK msk P, choose random number As the private key of the helper TPD, and calculate its corresponding public key PK TPD =SK TPD • P; all these four parameters are preloaded into the helper TPD. Road side unit RSU selects random number As your own private key, and calculate the corresponding public key PK rsu =SK rsu ·P. Among them, the public key of the vehicle OBU and its corresponding public key carrying the assistant TPD have been loaded in advance, and finally, the key generation center PKG publishes the public parameter set:

[0038] param={a,b,p,q,P,PK pub , PK TPD ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key-insulated safe car networking V2I authentication system and method and relates to the field of car networking. Although many car networking oriented safety authenticationschemes exist at present, the schemes are all basically based on an assumption that 'keys are safely saved', and most of the schemes are constructed by using bilinearity. However, a car networking environment has excellent openness, an intelligent terminal and other information processing equipment board on vehicles are generally inadequate in safety protection, and resources are constrained. Therefore, key leakage risk and cost calculation problems need to be considered while designing the authentication scheme. The invention provides an effective safety authentication method for solving theproblems, and the safety authentication method is applicable to authentication during communication between vehicles and infrastructure in a car networking state. By using a key-insulated method, thekey safety of the whole system is not reduced even if temporary keys leak, and the method has anonymity and forward and backward safety. Moreover, according to the method, lightweight elliptic curve operation is adopted, so that the authentication process is effective.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Vehicles, in particular to a security authentication method for communication between vehicles and infrastructure (V2I) under the Internet of Vehicles. Background technique [0002] The emergence of intelligent transportation systems has a crucial impact on traffic safety and efficiency. With the increasing demand for a safer and more efficient intelligent transportation system, the development of vehicle ad hoc networks (Internet of Vehicles) has received a lot of attention in research institutions and various industries in recent years. [0003] The Internet of Vehicles is considered to be a variant of the mobile ad hoc network. Its communication channel is open, so attackers can easily capture, change, replay and delete the information transmitted in the Internet of Vehicles, which will cause a lot of security problems. This has a major impact on the entire system. For example, assumi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W4/44H04W12/041
CPCH04W12/02H04W12/04H04W12/06
Inventor 周由胜刘思伶龙兴旺蒋溢
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products