Lightweight anonymity authentication method with privacy protection and based on Internet of Vehicles

An anonymous authentication and privacy protection technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve the problems of being unable to track real identities and vehicles

Active Publication Date: 2018-12-07
SOUTHWEST PETROLEUM UNIV
View PDF6 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, due to the use of anonymous authentication schemes, there may be flaws in which vehic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight anonymity authentication method with privacy protection and based on Internet of Vehicles
  • Lightweight anonymity authentication method with privacy protection and based on Internet of Vehicles
  • Lightweight anonymity authentication method with privacy protection and based on Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solutions of the present invention will be clearly and completely described below in conjunction with the embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0046] refer to Figure 1-4 , the present invention provides a lightweight anonymous authentication method with privacy protection based on the technical solution of the Internet of Vehicles:

[0047] Such as figure 1 As shown, the lightweight anonymous authentication method with privacy protection based on Internet of Vehicles includes:

[0048] S1. Initialization step: a system on the trusted center TA side is specially used to generate various random parameters to generate public parameters and set a hash function. The public...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight anonymity authentication method with privacy protection and based on Internet of Vehicles. The method comprises the steps of initialization, generation of a private key of a vehicle-mounted communication unit, generation of secrecy information capable of anonymity authentication, information decryption and verification, and tracking of anonymous identity. A trustable center generates an anonymous identity for an intelligent vehicle as well as the private key of the anonymous identity, an ElGamaL encryption algorithm and a modified Schnorr signature algorithm are combined to generate the information capable of anonymity, transmission information is transmitted in an encrypted way in authentication protocols, and the information cannot be decrypted unless using the secret key of a roadside base station unit; when a dispute of a traffic accident occurs, the anonymous identity can be tracked; and the method has prospects in practical application.

Description

technical field [0001] The invention relates to the technical field of wireless communication of the Internet of Vehicles, in particular to a lightweight anonymous authentication method with privacy protection based on the Internet of Vehicles. Background technique [0002] Intelligent vehicle networking is composed of fixed network facilities, network management centers, roadside network access points, mobile nodes (such as vehicles equipped with communication equipment and sensors) and wireless network connections between them. The most important and important service of smart car networking is to provide smart driving and traffic safety. However, there are a large number of problems and hidden dangers in the intelligent vehicle network. Before these problems are not resolved, it is difficult to really deploy the intelligent vehicle network. Since the intelligent vehicle network is a mobile vehicle self-organizing network, and most of the groups are ordinary vehicle users...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3247H04L63/0421H04L63/08H04L67/12H04L2209/805
Inventor 张晓均牟黎明赵芥何小曼刘帅唐尧王力红李怀谷
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products