A message authentication method between an unmanned vehicle and a multi-mobile edge computing server

A technology of unmanned vehicles and edge servers, which is applied in the field of vehicle network communication security and can solve problems such as data integrity damage

Active Publication Date: 2018-12-14
ANHUI UNIVERSITY
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing edge computing and message authentication methods are only edge servers assisting roadside facility units in message authentication, but cannot be maliciously traced back. If the integrity of the data is damaged or tampered with, it may lead to fatal consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A message authentication method between an unmanned vehicle and a multi-mobile edge computing server
  • A message authentication method between an unmanned vehicle and a multi-mobile edge computing server
  • A message authentication method between an unmanned vehicle and a multi-mobile edge computing server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The technical solutions of the present invention will be described in detail below, but the protection scope of the present invention is not limited to the embodiments.

[0053] As shown in Table 1, the meanings of the corresponding parameters and symbols in this implementation are as follows:

[0054] Table 1

[0055]

[0056] like figure 1 As shown, in the message authentication method between unmanned vehicles and multi-mobile edge computing servers in this embodiment, the network model mainly includes three types of participants, namely trusted entities (TAs), edge servers, and vehicles.

[0057] Among them, TA is a public parameter of the trusted entity generation system, which can generate semi-private keys and pseudonyms for edge servers according to their real identities. According to the results of the verification phase, TA can trace malicious edge servers; edge servers have certain storage and The edge server of computing power, as the edge server of edg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A message authentication method between an unmanned vehicle and a multi-mobile edge computing server is disclosed. The steps are system parameter generation, pseudonym generation for a mobile edge computing server and semi-key extraction, and authentication of a message between the mobile edge computing server and the vehicle. The step comprises: the vehicle migrates a large number of calculationor stored tasks to the mobile edge computing server, the mobile edge computing server performs ring signature on the message, and the vehicle authenticates the message in batch. The invention introduces the edge computing into the traditional vehicle-mounted ad hoc network, and the vehicle can migrate the computing or storage tasks to the edge server to execute instead of sending them to the cloudend for centralized processing. In the signature part of the invention, ring signature is combined with pseudonym, and the application of ring signature effectively protects the privacy of mobile edge computing server and traces the malicious mobile edge computing server through pseudonym.

Description

technical field [0001] The invention belongs to vehicle network communication security technology, and in particular relates to a message authentication method between unmanned vehicles and multi-mobile edge computing servers. Background technique [0002] With the development of science and technology and the popularity of wireless networks, the Internet of Things (IoT) has developed into the era of the Internet of Everything (IoE). Nowadays, vehicles have become common means of transportation. In order to save time, more and more people choose to go to work by bus. Due to the complexity of the road environment, vehicles need to store and calculate a large amount of data (such as the driving speed of surrounding vehicles, traffic lights, etc.), but many vehicles only have limited storage and computing capabilities. To address these issues, in 2014, the European Telecommunications Standards Institute (ETSI) proposed the standardization of mobile edge computing terminology. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04L9/32H04L9/08
CPCH04L9/0863H04L9/0869H04L9/3247H04W12/02H04W12/06
Inventor 仲红潘垒张庆阳崔杰应作斌陈志立
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products