Efficient anonymous identity authentication method in Internet of Vehicles environment

An identity authentication and car networking technology, applied in the field of efficient anonymous identity authentication in the car networking environment, can solve the problems of unmanned operation and management, the length of lattice signature needs to be optimized, and the lack of efficient and fast consensus mechanism, to achieve the protection of identity. Effect

Active Publication Date: 2020-07-03
NANTONG UNIVERSITY
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (2) Security of authentication nodes: Most of the authentication nodes RSU in the Internet of Vehicles are independent, unmanned operation and management
Cui Yongquan et al. proposed "Grid-based Ring Signature Privacy Protection for Internet of Vehicles", and designed a ring signature scheme using the lattice difficulty problem to achieve unconditional anonymity and ensure its security under quantum attacks, but the length of the lattice signature needs to be optimized.
[0018] (3) Anonymous authentication based on distributed public key infrastructure: Chen Jianguo et al. proposed the "Security and Privacy Protection Scheme for Internet of Vehicles Based on Tickets", which uses tickets to provide anonymous access and authentication for application services. However, with the increase in the number of vehicles, tickets Processing latency becomes an issue
Solve the authentication between cars and multi-servers and roadside units, but due to the large number of vehicles and frequent communication, there is a lack of efficient and fast consensus mechanism
[0020] It can be seen that none of the existing technologies can achieve efficient anonymous authentication in the Internet of Vehicles environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient anonymous identity authentication method in Internet of Vehicles environment
  • Efficient anonymous identity authentication method in Internet of Vehicles environment
  • Efficient anonymous identity authentication method in Internet of Vehicles environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. Of course, the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0069] 1. In the present invention, the vehicle management office is an authoritative organization, and its public public key and issuing certificate are valid and reliable. The vehicle management office issues certificates for vehicles and RSUs offline to ensure that even if online data is leaked, the identity of the vehicle owner will not be private Cause a direct threat.

[0070] 2. The OBU device is embedded in the vehicle and protected by tamper-proof facilities. The OBU device generates a temporary identity to realize anonymous communication between vehicles.

[0071] 3. RSU has strong computing power. All RS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an efficient anonymous identity authentication method in an Internet of Vehicles environment, and belongs to the technical field of Internet of Vehicles security. According to the technical scheme, the method comprises the following steps of vehicle offline registration, online registration and rapid identity authentication. The method has the beneficial effects that a temporary identity certificate Token mechanism is set, so that the authentication efficiency is improved while the vehicle anonymous two-way communication is realized; a block chain distributed account book mode is utilized, so that data traceability and tamper resistance are guaranteed, and the problems of relatively low identity authentication efficiency, easiness in attack and the like caused by traditional PKI authentication centralization of the Internet of Vehicles are solved; the combination of the blockchain PBFT consensus mechanism and the smart contract greatly reduces the authenticationtime delay of the traditional method.

Description

Technical field [0001] The invention relates to the technical field of car networking security, in particular to an efficient anonymous identity authentication method in a car networking environment. Background technique [0002] Internet of vehicles (IOV) is an open heterogeneous network composed of Vehicular Ad-HocNetwork (VANET) and mobile Internet. It realizes intelligent transportation through the real-time association and perception of vehicles, roads, and management platforms. Provide traffic safety, infotainment and other services. [0003] The basic structure of the Internet of Vehicles is mainly composed of three main parts: the traffic management center (TRC), the roadside unit (RSU), and the on-board unit (OBU): [0004] (1) The Traffic Management Center (TRC) is the highest authority in VANET. It is connected to the roadside unit (RSU) through a wired connection. It is mainly responsible for the initialization of traffic participants and the storage of core information;...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/10H04W12/12H04W12/02H04W4/40H04L9/30H04L9/32H04L29/08H04W4/44H04W4/46H04W12/03H04W12/069H04W12/106H04W12/122
CPCH04W12/06H04W12/02H04W4/40H04L9/3268H04L9/3297H04L9/3247H04L9/3213H04L9/3013H04L9/302H04L67/1097H04L67/12H04W4/44H04W4/46H04W12/03H04W12/068H04W12/106H04W12/122H04W12/069
Inventor 曹利陈葳葳邵长虹
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products