A Lightweight Anonymous Authentication Method with Privacy Protection Based on Internet of Vehicles

A privacy protection and anonymous authentication technology, applied in the field of lightweight anonymous authentication, it can solve the problems of inability to track real identity and vehicles.

Active Publication Date: 2021-01-26
SOUTHWEST PETROLEUM UNIV
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, due to the use of anonymous authentication schemes, there may be flaws in which vehicles cannot be tracked
For example, after a vehicle hit and run, its real identity cannot be tracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Lightweight Anonymous Authentication Method with Privacy Protection Based on Internet of Vehicles
  • A Lightweight Anonymous Authentication Method with Privacy Protection Based on Internet of Vehicles
  • A Lightweight Anonymous Authentication Method with Privacy Protection Based on Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solutions of the present invention will be clearly and completely described below in conjunction with the embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0046] refer to Figure 1-4 , the present invention provides a lightweight anonymous authentication method with privacy protection based on the technical solution of the Internet of Vehicles:

[0047] Such as figure 1 As shown, the lightweight anonymous authentication method with privacy protection based on Internet of Vehicles includes:

[0048] S1. Initialization step: a system on the trusted center TA side is specially used to generate various random parameters to generate public parameters and set a hash function. The public...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight anonymous authentication method with privacy protection based on the Internet of Vehicles, which includes: an initialization step, a private key generation step for a vehicle communication unit, a confidential information generation step that can be anonymously authenticated, an information decryption and verification step, and an anonymous authentication step. Identity Tracing Steps. The invention generates anonymous identity and private key of anonymous identity for intelligent vehicles through trusted center, combines ElGamal encryption algorithm and modified Schnorr signature algorithm to generate anonymous information, and realizes encrypted transmission of transmitted information in authentication protocol , only the private key of the roadside base station unit can be decrypted; when a dispute arises, the anonymous identity can also be tracked, which has important practical application prospects.

Description

technical field [0001] The invention relates to the technical field of wireless communication of the Internet of Vehicles, in particular to a lightweight anonymous authentication method with privacy protection based on the Internet of Vehicles. Background technique [0002] Intelligent vehicle networking is composed of fixed network facilities, network management centers, roadside network access points, mobile nodes (such as vehicles equipped with communication equipment and sensors) and wireless network connections between them. The most important and important service of smart car networking is to provide smart driving and traffic safety. However, there are a large number of problems and hidden dangers in the intelligent vehicle network. Before these problems are not resolved, it is difficult to really deploy the intelligent vehicle network. Since the intelligent vehicle network is a mobile vehicle self-organizing network, and most of the groups are ordinary vehicle users...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3247H04L63/0421H04L63/08H04L67/12H04L2209/805
Inventor 张晓均牟黎明赵芥何小曼刘帅唐尧王力红李怀谷
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products