Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Signature algorithm for preventing large-batch data from being tampered in Internet of Vehicles

A data signature and mass-volume technology, applied in digital transmission systems, encryption devices with shift registers/memory, user identity/authority verification, etc., can solve problems such as time-consuming and inability to complete records, and achieve high computing efficiency, Strong security and excellent computing speed

Active Publication Date: 2019-10-15
SOUTHEAST UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When a related Internet of Vehicles application (such as a traffic police accident identification application) requires the vehicle to transmit such data, it generally specifies a complete time period of recorded data for one-time transmission, that is, if the application requires the vehicle's recorded data for a certain hour, the vehicle device needs to Before transmission, the 18,000 pieces of data in this hour are checked against tampering. If it is done through the CBC-MAC algorithm, it will be very time-consuming. In addition, the device needs to check the integrity of the overall recorded data to ensure the integrity of the records. The data group as a whole is complete, there is no deleted data, and CBC-MAC cannot complete the record

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature algorithm for preventing large-batch data from being tampered in Internet of Vehicles
  • Signature algorithm for preventing large-batch data from being tampered in Internet of Vehicles
  • Signature algorithm for preventing large-batch data from being tampered in Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further explained below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the following specific embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention.

[0028] A tamper-proof signature algorithm for large amounts of data in the Internet of Vehicles, its overall structure is as follows: figure 1 As shown, for each piece of original data, its corresponding signature will be calculated and saved together. The data storage file is based on the time when the data was generated.

[0029] For each piece of original data, its corresponding signature will be calculated and saved together. The data storage file is based on the time when the data was generated. The first data signature algorithm in each file adopts figure 2 The signature algorithm of the header data shown in the document is used to complete the connection betw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a signature algorithm for preventing large-batch data from being tampered in the Internet of Vehicles. The algorithm adopts a combination of a chain storage structure, a hash digest algorithm and the CBC-MAC algorithm to perform tamper-proof protection on large-batch data, such as vehicle speed, GPS and the like, which are stored locally in the Internet of Vehicles and generated periodically. According to the algorithm, batch data is stored in different files according to data generation time, and the files are connected through a text data signature algorithm to realize a chain storage structure; and the data frames are connected in the same file through a non-text-head signature algorithm. According to the algorithm, AES encryption operation is added to avoid therisk of packet replacement attacks; moreover, the algorithm only needs to perform AES and SHA256 once, and the calculation speed is superior to that of the CBC-MAC. Through the algorithm, no matter whether an attacker deletes the previous data or modifies the content of the previous data, the data can be detected through signature check of the group of data. By means of the algorithm, tamper-proofsignature and authentication of the original data frame can be achieved, and higher safety and higher calculation efficiency are achieved.

Description

technical field [0001] The invention relates to the field of Internet of Vehicles data security, in particular to a signature algorithm aimed at preventing tampering of large quantities of data in the Internet of Vehicles. Background technique [0002] Compared with the transmission of real-time generated data, the authenticator and the signer of the large-scale data stored locally in the Internet of Vehicles are the same, that is, they are all completed by the on-board recording device, so the signature of historical data can be completed by the private key of the device. Only owned by this device. [0003] In addition, the historical record data is generally generated in a certain period, and because the engine may be turned off during the driving process and the vehicle may be powered off, the on-board recording device cannot predict the end of the recording, so the device needs to separately record each set of data generated sign. Since the recording cycle of such data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/06H04L29/08
CPCH04L9/3247H04L9/3239H04L9/0631H04L9/0643H04L67/12
Inventor 秦文虎尚昊孙立博刘英杰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products