A Signature Algorithm for Anti-tampering of Massive Data in Internet of Vehicles

A data signature and batch data technology, applied in digital transmission systems, encryption devices with shift registers/memory, user identity/authority verification, etc. The effect of strong security and excellent calculation speed

Active Publication Date: 2022-04-29
SOUTHEAST UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When a related Internet of Vehicles application (such as a traffic police accident identification application) requires the vehicle to transmit such data, it generally specifies a complete time period of recorded data for one-time transmission, that is, if the application requires the vehicle's recorded data for a certain hour, the vehicle device needs to Before transmission, the 18,000 pieces of data in this hour are checked against tampering. If it is done through the CBC-MAC algorithm, it will be very time-consuming. In addition, the device needs to check the integrity of the overall recorded data to ensure the integrity of the records. The data group as a whole is complete, there is no deleted data, and CBC-MAC cannot complete the record

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Signature Algorithm for Anti-tampering of Massive Data in Internet of Vehicles
  • A Signature Algorithm for Anti-tampering of Massive Data in Internet of Vehicles
  • A Signature Algorithm for Anti-tampering of Massive Data in Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further explained below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the following specific embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention.

[0028] A tamper-proof signature algorithm for large amounts of data in the Internet of Vehicles, its overall structure is as follows: figure 1 As shown, for each piece of original data, its corresponding signature will be calculated and saved together. The data storage file is based on the time when the data was generated.

[0029] For each piece of original data, its corresponding signature will be calculated and saved together. The data storage file is based on the time when the data was generated. The first data signature algorithm in each file adopts figure 2 The header data signature algorithm shown in this document is used to complete the connection between th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a tamper-proof signature algorithm for a large amount of data in the Internet of Vehicles. The algorithm uses a combination of a chain storage structure, a hash digest algorithm and a CBC-MAC algorithm to store locally stored data in the Internet of Vehicles, such as vehicle speed and GPS. Anti-tamper protection for large batches of data generated in equal cycles. The algorithm stores the batch data in files according to the data generation time, and connects the files through the header data signature algorithm to realize the chain storage structure; connects the data frames in the same file through the non-header signature algorithm. This algorithm adds AES encryption operation to avoid the risk of packet replacement attack; and this algorithm only needs to perform AES and SHA256 once, and the calculation speed is better than CBC-MAC. Through the above algorithm, no matter whether the attacker deletes the last piece of data or modifies the content of the last piece of data, he can detect it through the signature check of this group of data. Through this algorithm, the tamper-proof signature and authentication of the original data frame can be realized, which has stronger security and higher computing efficiency.

Description

technical field [0001] The invention relates to the field of Internet of Vehicles data security, in particular to a signature algorithm aimed at preventing tampering of large quantities of data in the Internet of Vehicles. Background technique [0002] Compared with the transmission of real-time generated data, the authenticator and the signer of the large-scale data stored locally in the Internet of Vehicles are the same, that is, they are all completed by the on-board recording device, so the signature of historical data can be completed by the private key of the device. Only owned by this device. [0003] In addition, the historical record data is generally generated in a certain period, and because the engine may be turned off during the driving process and the vehicle may be powered off, the on-board recording device cannot predict the end of the recording, so the device needs to separately record each set of data generated sign. Since the recording cycle of such data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/06H04L67/12
CPCH04L9/3247H04L9/3239H04L9/0631H04L9/0643H04L67/12
Inventor 秦文虎尚昊孙立博刘英杰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products