Internet of Vehicles security data sharing method based on edge computing

A technology for edge computing and secure data, applied in the field of vehicle network communication security, which can solve problems such as RSU delay and heavy load

Inactive Publication Date: 2019-08-06
河南工学院
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional method of vehicle cross-domain data sharing relies on RSU, which will cause serious delay and heavy load on RSU

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Vehicles security data sharing method based on edge computing
  • Internet of Vehicles security data sharing method based on edge computing
  • Internet of Vehicles security data sharing method based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] According to the edge computing-based security data sharing method for Internet of Vehicles in this embodiment, the interaction diagram is as follows figure 2 As shown, it mainly includes the following steps:

[0045] (1) Initialization of all entities in the Internet of Vehicles: TA generates system parameters, and TA issues necessary parameter information for each vehicle;

[0046] (2) Safe data sharing between vehicles: vehicle release request information, edge computing vehicle processing and forwarding request information, data release vehicle encrypted data, and data request vehicle decryption data.

[0047] Step (1) TA generates system parameters, TA generates necessary system parameters, including elliptic curve parameters, system public key, master private key, etc. The specific steps are as follows:

[0048] 1) TA randomly selects q, and based on the finite field F q Select two random numbers a and b, generate one defined as y 2 =x 3 The non-singular elli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Vehicles safety data sharing method based on edge computing, which comprises the following steps: (1) initializing all entities of the Internet of Vehicles, including generating system parameters by a trusted authority (TA), and issuing necessary parameter information to each vehicle; and (2) safe sharing of data between vehicles, wherein the step comprises four processes of enabling a vehicle to release request information, enabling ECV to process and forward the request information, enabling a data release vehicle to encrypt the data and enabling a datarequest vehicle to decrypt the data. According to the attribute strategy encryption and decryption part, operation based on elliptic curve cryptography is used, so that the calculation and transmission expenditure is relatively low; through an attribute encryption algorithm based on a ciphertext strategy, the data sender can control the accessibility of the data by defining an attribute access strategy, thereby facilitating the sharing of the data among vehicles in different domains.

Description

technical field [0001] The invention relates to vehicle network communication security technology, in particular to a vehicle network security data sharing method based on edge computing. Background technique [0002] Vehicle Networking (VANETs) is an important application of mobile ad hoc networks in the field of transportation. The core architecture was first proposed in 2001. The core idea of ​​the Internet of Vehicles is that vehicles automatically connect to the mobile network within a specific communication range, and these connected vehicles are able to exchange information such as speed, location and data detected by on-board sensors. The communication methods of the Internet of Vehicles include vehicle-to-vehicle communication (V2V) and communication between vehicles and public infrastructure (V2I). By realizing real-time information exchange, traffic services are provided for people. [0003] VANETs usually consist of three parts, namely Trusted Authority (TA), Ro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/46H04W12/00H04W12/06H04L9/32H04L9/30H04W12/03
CPCH04W4/46H04W12/009H04W12/06H04L9/3252H04L9/3066H04W12/03
Inventor 赵开新孙新领宋歌魏勇孙冬
Owner 河南工学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products