A Fleet-Oriented Secure Mobility Management Method Based on Aggregated Authentication

A management method and mobility technology, applied in the field of Internet of Vehicles, can solve the problems of not considering the authentication process, authentication signaling congestion, large computing overhead, etc., and achieve the effects of reducing authentication signaling overhead, reducing handover delay, and strong anonymity.

Active Publication Date: 2021-05-14
XIAN UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) There are long handover delays and lack of mobility support for roaming across various access networks
[0005] (2) There is a large computational overhead, and the authentication efficiency of the vehicle is low
[0006] (3) The group communication scenario in the vehicle network is not considered
[0007] The difficulty and significance of solving the above technical problems : In a heterogeneous network, access authentication is a key step to ensure secure communication, but most mobile IPv6 protocols only operate in the IP layer, and the authentication process is not considered during handover, but the authentication process is very important and will cause a large number of Delay; when a large number of vehicles want to access the Internet, they first need to access the wireless network safely, and should send access authentication requests to the core network in a short time or even at the same time, in addition, they must use IPsec to establish a connection with the core network These operations will result in communication and computing overhead for different nodes in the network on the communication path; if vehicles need to access the network almost simultaneously, each vehicle must perform a complete authentication and key agreement process with the core network separately, Then the traditional authentication protocol will suffer from high signaling overhead, which will lead to authentication signaling congestion and reduce authentication efficiency; due to the high communication and computing overhead, the original IPsec is not suitable for group-oriented vehicle environments; the significance of solving problem (1) lies in , can realize flexible and ubiquitous vehicle connection and real-time network management, ensure more efficient Internet access, ensure service continuity and quality of service (QoS) when the vehicle switches to another network, and provide services across various access Car roaming on the network provides transparent mobility support. The significance of solving problem (2) is that it can reduce the computational overhead of the scheme and improve the efficiency of vehicle authentication. The significance of solving problem (3) is that it can support high Mobility and a large number of vehicles, in the group situation, the group head can observe the movement status of the group members in real time for monitoring, in this group-based driving mode can collaboratively access various communication applications, such as data sharing or forwarding, And can significantly improve the performance of the vehicle network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fleet-Oriented Secure Mobility Management Method Based on Aggregated Authentication
  • A Fleet-Oriented Secure Mobility Management Method Based on Aggregated Authentication
  • A Fleet-Oriented Secure Mobility Management Method Based on Aggregated Authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0057] like figure 1 As shown, the aggregate authentication-based fleet-oriented secure mobility management method provided in the embodiment of the present invention includes the following steps:

[0058] S101: The vehicle enters the road network and participates in the framework, and chooses to establish a group;

[0059] S102: After the fleet enters the network, the vehicle detects a new access point, and the fleet and the new access network perform mutual authentication;

[0060] S103: The group leader accesses the network, and the network returns a response message; team members calculate their proxy signatures base...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of the Internet of Vehicles, and discloses a fleet-oriented security mobility management method based on aggregation authentication, adopting a software-defined network-based Internet of Vehicles-cellular network architecture, vehicles enter the road network and participate in the architecture, and then choose to establish Group; after the fleet enters the network, the vehicle detects a new access point, and the fleet and the new access network perform mutual authentication: the group leader accesses the network, and the network returns a response message; the fleet members calculate their proxy signatures based on the response message; the group The head collects the signatures of all members of the same team and aggregates them into a new signature; then sends the message and the new signature to the network; the network verifies the new signature and authenticates all member vehicles; the member vehicle authenticates the network. Combined with MIPv6-based mobility management, the present invention can realize safe and efficient fleet-oriented mobility management, reduce authentication signaling overhead and handover delay, and at the same time ensure data security of vehicle users.

Description

technical field [0001] The invention belongs to the technical field of Internet of Vehicles, and in particular relates to a fleet-oriented safe mobility management method based on aggregation authentication. Background technique [0002] At present, the existing technology commonly used in the industry is as follows : In recent years, with the continuous growth of automobile usage, more and more problems have emerged, such as: the carrying capacity of roads has almost reached the limit in many cities, the difficulty of vehicle management and monitoring, traffic safety, travel efficiency, environmental protection, Vehicle safety communication and other issues. With the widespread application of technologies such as mobile Internet, Internet of Things, and wireless sensor networks, the emergence of Internet of Vehicles has largely solved problems such as traffic jams and traffic accidents. The Internet of Vehicles is one of the effective ways to achieve the goal of intellige...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L9/32H04L9/08H04W4/46H04W12/02H04W12/03H04W12/041H04W12/06H04W12/0431H04W12/069
CPCH04L9/0838H04L9/3247H04L67/1044H04L67/12H04W4/46H04W12/02H04W12/04H04W12/06
Inventor 赖成喆王文娟胡天伟郭文龙李雅菲
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products