Vehicle-mounted network anonymous authentication system and method based on ring signature and vehicle communication platform

An anonymous authentication, in-vehicle network technology, used in transmission systems, user identity/authority verification, electrical components, etc., can solve the problem of not being able to meet the requirements of spontaneity, efficiency, anonymity, unforgeability, traceability, storage, and key escrow at the same time. And other issues

Active Publication Date: 2019-05-24
XIAN UNIV OF POSTS & TELECOMM
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Aiming at the privacy protection problems that arise, prior art 1 proposes a group signature-based privacy protection authentication scheme for the Internet of Vehicles, which can meet the requirements of anonymity and traceability, but requires the assistance of RSU and the problem of certificate storage; some The scheme adopts the conditional ring signature method. The existing technology 2 proposes a privacy protection communication scheme using the conditional anonymous ring signature in the Internet of Vehicles, which does not require the participation of the group manager, but there is a problem of certificate storage and revocation; the existing technology 3 proposes a An anonymous communication framework based on a pseudonym in the Internet of Vehicles environment. This framework includes several processes such as pseudonym generation, distribution, and regeneration, and uses a distributed optimization algorithm to change the pseudonym. However, the pseudonym method needs to constantly change the pseudonym , modifying the pseudonym at an inappropriate time period or location will cause the scheme to be invalid
At the same time, prior art 4 proposes a certificate-based anonymous authentication scheme for the Internet of Vehicles, which can satisfy conditional identity tracking and has high computing efficiency, but there are problems in certificate distribution, revocation and storage of a large number of certificates in this method; Prior Art 5 proposes a threshold anonymous authentication protocol for VANET, which achieves the goal of conditional privacy and traceability by using the threshold group signature method, but the group signature method requires the participation of the group manager in the authentication process, which will lead to power is too big
It can be seen that in the existing anonymous authentication schemes for in-vehicle networks, when meeting the requirements of anonymity and unforgeability, they cannot meet the requirements of tracking the identity when the receiver is found to forge messages; some of them meet the basic security requirements. However, it cannot meet the requirements of vehicles moving at any time and spontaneously forming a ring at any time in the vehicle network environment; even the use of an identity-based ring signature scheme will cause the problem of key custody, so that a trusted third party knows the private key of each member, which will cause unnecessary An honest third party forges any member's signature, reducing security
Therefore, the existing methods cannot simultaneously meet the target requirements of spontaneity, efficiency, anonymity, unforgeability and traceability
[0003] To sum up, the problem existing in the existing technology is: in the existing vehicle network anonymous authentication scheme, usually when meeting the requirements of anonymity and unforgeability, it cannot meet the requirement of tracking the identity when the receiver is found to forge the message ; Some meet the basic security requirements, but they cannot meet the requirements of vehicles moving at any time and spontaneously forming rings in the vehicular network environment; even the use of identity-based ring signature schemes will cause key escrow problems, so that trusted third parties know each member's private key, causing a dishonest third party to forge any member's signature, reducing security
For example, a modification and replay attack on it using a previously propagated message could be fatal to some users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle-mounted network anonymous authentication system and method based on ring signature and vehicle communication platform
  • Vehicle-mounted network anonymous authentication system and method based on ring signature and vehicle communication platform
  • Vehicle-mounted network anonymous authentication system and method based on ring signature and vehicle communication platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] The present invention utilizes a certificateless ring signature and a tracking algorithm to provide a ring signature-based vehicle network anonymous authentication system and method, which can ensure anonymity and unforgeability in the vehicle communication process, and at the same time use a certificateless method to efficiently solve the key custody problem. A tracking algorithm is formed by adding some relevant information to the ring signature, and when necessary, a trusted third party cooperates with all members in the ring to track the real identity of the signer, which effectively solves the problem that the ident...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of vehicle communication security, and discloses a vehicle-mounted network anonymous authentication system and method based on a ring signature, and a vehicle communication platform. The trust mechanism and the vehicle with the OBU are registered to generate a part of private keys; A vehicle of the OBU is registered and preloaded with public system parameters and corresponding public and private keys before being added into the vehicle-mounted ad hoc network. When the vehicle runs on a road, related state information is periodically broadcasted after safety certification; And when the signer finds that the signer anonymously leaks the false message or the behavior that the signer is damaged, the trust mechanism uncovers the real identity of thesender. According to the invention, the certificateless public key cryptosystem and the ring signature are combined to form the certificateless ring signature, so that anonymity and unforgeability aremet, and meanwhile, security authentication is met; A traceable algorithm is formed by adding related information to effectively solve the problem that when a signer anonymity leaks false messages orother destructive behaviors, identity tracking and revocation are carried out according to the received messages.

Description

technical field [0001] The invention belongs to the technical field of vehicle communication security, and in particular relates to a ring signature-based vehicle network anonymous authentication system and method, and a vehicle communication platform. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: in order to reduce traffic accidents, improve traffic conditions, and provide users with corresponding network services, VANET (vehicle network) is gradually emerging, which is a fusion of direct interconnection between vehicles , indirect interconnection, and the hybrid system structure network of interconnection between vehicles and roadside fixed facilities, which can realize vehicle-to-vehicle (Vehicle to Vehicle, V2V) and vehicle-to-roadside infrastructure (Vehicle to Infrastructure, V2I) The multi-hop wireless communication provides vehicles with a variety of safety applications (such as accident warning, tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 赖成喆胡天伟王文娟郭文龙郑东
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products