Internet of Vehicles privacy protection trust model based on block chain

A privacy protection and trust model technology, applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve problems such as RSU malicious attacks, reduce malicious influence, strengthen message integrity, and prevent tampering. Effect

Active Publication Date: 2019-10-01
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a decentralized system, the trust management system is usually deployed in the roadside unit (RSU), but the RSU may be attacked maliciously, and the attacker will wantonly tamper with the vehicle reputation information stored in the RSU, so how to Effectively providing trust management services has also become an important issue that needs to be solved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Vehicles privacy protection trust model based on block chain
  • Internet of Vehicles privacy protection trust model based on block chain
  • Internet of Vehicles privacy protection trust model based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings of the specification.

[0071] A blockchain-based privacy protection trust model for the Internet of Vehicles includes the following steps:

[0072] Step 1. The trusted authority center TA chooses E k (x) is a symmetric encryption protocol that uses a key k to encrypt x. The public key and private key of the symmetric encryption protocol are the same key, and the following public parameters or objects are selected or generated at the same time:

[0073] Step 1-1, select G as the additive group whose point is on the elliptic curve, q is the order of G, and g is the generator of G.

[0074] Step 1-2, choose H as the hash function, H: {0,1}*→{0,1} n , That is, map a 0,1 data set with any length to a 0,1 data set with a length of n.

[0075] Step 1-3, generate Means from (Set of integers of arbitrary length with order q) Assign any element in the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an Internet of Vehicles privacy protection trust model based on a block chain. Vehicles on the road generate and broadcast messages through the vehicle-mounted ad hoc network toshare surrounding traffic information so as to improve the traffic efficiency and safety. However, due to the untrusted network environment of the vehicle-mounted ad hoc network, the privacy of the vehicle is easy to expose, and whether the received message is reliable cannot be judged. The message is anonymously sent by the vehicle through the ring signature technology, so that the vehicle is prevented from being tracked by a malicious vehicle. Messages sent by the vehicle are evaluated and screened through a reputation evaluation mechanism based on the block chain technology, and forged information in the messages is filtered. Based on the characteristics of the block chain, it is guaranteed that the vehicle reputation is not maliciously tampered, real-time synchronous updating of the vehicle reputation is achieved, and the safety and usability of the vehicle-mounted ad hoc network are further improved.

Description

Technical field [0001] The invention relates to the technical fields of car networking communication security, and in particular to a blockchain-based car networking privacy protection trust model. Background technique [0002] In recent years, vehicle-mounted ad hoc networks (VANETs) have been regarded as the infrastructure of intelligent transportation systems, which can improve traffic efficiency and ensure the safety of vehicles and pedestrians. In order to promote cooperation between vehicles and share valuable driving information, two kinds of communication are established in the vehicle-mounted ad hoc network, namely vehicle-to-vehicle (V2V) communication and vehicle-to-infrastructure (V2I) communication. Through a dedicated short-range communication radio, nearby vehicles exchange information with V2V and can directly communicate with the roadside unit (RSU) in the V2I. [0003] However, due to the fast moving speed of vehicle nodes in the vehicle ad hoc network and the sh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3255H04L63/0407H04L63/0435H04L63/08H04L63/1441H04L67/12
Inventor 黄海平马子洋刘星晨戴铭俞戴华王汝传孙翔朱鹏
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products