Unmanned secure communication authentication protocol

A technology for safe communication and unmanned driving, applied in the field of unmanned vehicle safety communication authentication protocol, can solve problems such as the difficulty of trusted entities, and achieve the effect of reducing communication overhead, protecting privacy and ensuring privacy.

Active Publication Date: 2018-11-23
YANGZHOU UNIV
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, how to choose such a trusted entity becomes a difficult problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unmanned secure communication authentication protocol
  • Unmanned secure communication authentication protocol
  • Unmanned secure communication authentication protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described in detail below in conjunction with the above-mentioned accompanying drawings. It should be understood that after reading the teachings of the present invention, those skilled in the art can make various changes or modifications to the present invention, and these equivalent forms also fall within the scope defined by the appended claims of the present application.

[0045] Such as figure 1 As shown, VANET mainly includes three components: On-Board Unit (OBU), Roadside Unit (RSU) and Trusted Authentication Authority (TA). However, the security authentication protocol described in the present invention mainly refers to vehicle-to-vehicle communication (V2V), ie does not involve the RSU component. The security authentication scheme described in the present invention mainly involves two parts, TA and OBU. TA is responsible for the distribution and management of keys, and the tracking of malicious vehicles. OBU is responsibl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an unmanned secure communication authentication protocol and belongs to the field of unmanned motor vehicle ad hoc network information and communication. A vehicle obtains private data from a TA (Trusted Authorizer), generates a pseudonym and a corresponding private key offline and realize user authentication through bilinear mapping, so safety and privacy of the vehicle areensured. According to the protocol, hash chain elements are taken as keys for generating message authentication codes. In a delay exposure mode, a receiver receive the hash chain elements obtained ina delay mode and verify whether the last message authentication code can be generated or not. According to the protocol, a prediction value is generated and is sent to the receiver, so the receiver can verify validity of a message in real time, and robustness of the protocol is improved. According to the protocol, anonymity and privacy protection effects are achieved, and verifiability and integrity of data can be ensured. The protocol is also characterized by non-repudiation, non-relevance, conditional privacy protection, replay resistance and packet loss resistance. Normal communication authentication can be ensured.

Description

technical field [0001] The invention relates to a security communication authentication protocol for unmanned vehicles, aiming at information such as road conditions, driving conditions, emergency accidents and other information exchanged between unmanned vehicles, through security authentication, verifying the legality of the sender's identity, information integrity, etc., At the same time, it protects the privacy of the sender itself, and belongs to the field of unmanned motor vehicle ad hoc network information and communication. Background technique [0002] Vehicle Ad Hoc Networks (VANETs) is an implementation form of Mobile Ad Hoc Networks (MANETs). Because of the characteristics of autonomy and no fixed structure, multi-hop routing, dynamic changes in network topology, limited network capacity, and good scalability, VANET is widely used. The vehicle ad hoc network is mainly composed of three parts, namely the on-board unit (On-board Unit, OBU) installed on the vehicle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W12/10H04W12/12H04L9/08H04L9/06H04L9/32H04L29/06H04L29/08H04W4/06H04W4/40H04W4/46H04W84/18H04W12/106H04W12/122
CPCH04L9/0643H04L9/0869H04L9/3236H04L9/3247H04L63/0421H04L63/0869H04L67/12H04W12/02H04W12/06H04W12/10H04W12/12H04W84/18H04W4/06H04W4/46H04W4/40
Inventor 李鑫成殷新春刘亚丽
Owner YANGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products