Internet of Vehicles equipment identity authentication method based on blockchain technology

A device identity and authentication method technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve problems such as inability to guarantee security, and achieve the effect of space performance and safety performance advantages

Active Publication Date: 2019-11-08
SOUTHEAST UNIV
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the private key of a certain server is leaked, the attacker can use the private key to arbitrarily carry out certificate forgery attacks on certificate query nodes such as vehicle terminals, which still cannot gua

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Vehicles equipment identity authentication method based on blockchain technology
  • Internet of Vehicles equipment identity authentication method based on blockchain technology
  • Internet of Vehicles equipment identity authentication method based on blockchain technology

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0036] Example 1

[0037] like Figure 1-Figure 4 As shown, a method for identity authentication of Internet of Vehicles devices based on blockchain technology,

[0038] This method builds a distributed blockchain CA system based on the blockchain idea, and completes the identity authentication of the communication nodes of the Internet of Vehicles through the CA blockchain design; the blocks in the blockchain are updated by authoritative nodes and newly added certificate blocks Composed of, the blocks are connected by double chains, such as figure 2 The two chains shown are the authoritative node update chain and the common chain, the authoritative node update chain connects the adjacent authoritative nodes, and the common chain directly connects the adjacent blocks without distinguishing the block type; all The communication nodes can query the synchronous CA blockchain, and the authoritative node has the authority to generate blocks. Through the confirmation mechanism of...

Example Embodiment

[0040] Example 2

[0041] 1. The update design of the authoritative node update block and the newly added certificate block is as follows:

[0042] 1) The authoritative node update block consists of a 240-byte block header and a variable-length block body, such as image 3 shown. The block header field includes the 4-byte current block version number Version, the 32-byte previous block hash value PreHash, the 32-byte current block content hash value ContentHash, the 8-byte block generation time stamp TimeStamp, and the 64 Byte public key AuthorPubkey of the current block generator, 64-byte block signature Signature, number of new and old authoritative nodes NodeNum in the 4-byte block body, and 32-byte last authoritative node block hash LastAuthBlock. The block body content of the authoritative node update block is divided into two parts, which are expressed in utf8 plaintext encoding. The block body contains the list of all authoritative node public keys that have become ef...

Example Embodiment

[0044] Example 3

[0045] 2. The architecture design and identity authentication mechanism of CA blockchain authentication system are as follows:

[0046] The working scenario of the distributed CA authentication system architecture is as follows: figure 1 shown. The authoritative node cluster and blockchain CA synchronization server in the figure are cloud CA blockchains; traffic lights and vehicle communication nodes belong to end devices, and each end device obtains the required node certificate through OBU via RSU or base station to communicate with the cloud. In the figure, the cloud CA blockchain consists of two parts: the authoritative node cluster and the blockchain CA synchronization server. The authoritative node cluster is the block producer of the blockchain. Only the authoritative nodes have the authority to add new blocks. They pass distributed A consensus algorithm keeps the blockchain in sync. The synchronization server is used to receive the certificate que...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Vehicles equipment identity authentication method based on the blockchain technology. According to the method, a distributed blockchain CA system is constructedbased on a blockchain thought. The identity authentication of the Internet of Vehicles communication node is completed through CA block chain design of a double-chain and double-block type hybrid structure. The double blocks are an authoritative node updating block and a newly added certificate block. The authoritative node updating block is used for updating current legal and effective authoritative nodes. The newly added certificate block is used for recording communication nodes such as legal vehicle-mounted communication equipment, roadside infrastructure and a remote server which are newly accessed to the network. The double chains are an authoritative node updating chain and a common chain, the authoritative node updating chain is connected with the adjacent authoritative nodes, andthe common chain is directly connected with the adjacent blocks without distinguishing block types. According to the method provided by the invention, the security authentication of the identity can be completed without depending on a third party in an unsafe network environment. Compared with a traditional distributed CA system, the distributed CA system has the advantages of time performance, space performance and safety performance.

Description

technical field [0001] The invention relates to the field of Internet of Vehicles data security, in particular to a method for authenticating the identity of an Internet of Vehicles device based on block chain technology. Background technique [0002] Due to the diversity and uncertainty of communication objects in the Internet of Vehicles, it is impossible to guarantee that the public keys of all possible communication nodes will be stored in advance to realize the identity authentication of both communication parties in an insecure communication network. CA is required to complete the public key authentication of nodes . [0003] There are currently three commonly used CA solutions: a single centralized CA; a distributed CA with shared private and public keys; and a distributed CA with independent public and private keys. Once a single centralized CA is attacked, even if the private key is not leaked, it will still lead to the paralysis of the entire network. The advanta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3236H04L9/3252H04L9/3263H04L9/3297H04L63/08H04L67/104H04L67/1044
Inventor 秦文虎尚昊孙立博刘英杰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products