A 5G-based V2X vehicle networking security communication system and method

A technology for secure communication and Internet of Vehicles, which is applied to secure communication devices, public keys for secure communication, and key distribution.

Active Publication Date: 2022-03-25
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, while V2X brings convenience, quickness and practicality to the communication among vehicles, traffic roadside infrastructure and pedestrians (hereafter, vehicles, traffic roadside infrastructure and pedestrians are referred to as V2X communication parties for short), there are also disadvantages that cannot be ignored. security risks
For example, the identities of all parties in V2X communication are counterfeited, and the information transmitted between parties is eavesdropped, tampered with, replayed, etc. These security threats are likely to cause major accidents, serious economic losses or other adverse effects, and damage the lives and properties of relevant users. Security and Privacy Poses Serious Threats
At the same time, in the V2X Internet of Vehicles environment, the storage resources and processing capabilities of the V2X communication parties themselves are limited (such as data and communication processing capabilities, storage capabilities, etc.), and it is impossible to predict and pre-set the use of Public key certificates or public keys of all possible (possibly infinite) other parties to the authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A 5G-based V2X vehicle networking security communication system and method
  • A 5G-based V2X vehicle networking security communication system and method
  • A 5G-based V2X vehicle networking security communication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0068] Such as figure 1 As shown, the embodiment of the present invention provides a 5G-based V2X Internet of Vehicles security communication system, including cloud, zero or at least one vehicle terminal, zero or at least one roadside terminal, zero or at least one pedestrian terminal, wherein , the sum of the total number of the vehicle end, the roadside end and the pedestrian end is at least two; the cloud includes a certificate server, a cloud security module, and is connected to the certificate server and the cloud security module respectively Internet of Vehicles server; the vehicle end incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a 5G-based V2X Internet of Vehicles security communication system and method, including a cloud, a vehicle terminal, a roadside terminal, and a pedestrian terminal, and the sum of the vehicle terminal, roadside terminal, and pedestrian terminal is at least two; the cloud includes a certificate Server, cloud security module and Internet of Vehicles server; the vehicle end includes the short-distance direct communication module of the vehicle end, the 5G communication module of the vehicle end, the security module of the vehicle end and the control module of the vehicle end; the roadside end includes the short-distance direct communication module of the roadside end, Roadside terminal 5G communication module, roadside terminal security module and roadside terminal control module; pedestrian terminal includes pedestrian terminal short-distance direct communication module, pedestrian terminal 5G communication module, pedestrian terminal security module and pedestrian terminal control module; according to 5G and V2X The characteristics of the Internet of Vehicles realize the V2X Internet of Vehicles identity authentication and group secure encrypted communication, making the V2X Internet of Vehicles identity authentication and group secure encrypted communication safe, reliable, simple and efficient.

Description

technical field [0001] The invention belongs to the technical field of V2X Internet of Vehicles communication, and in particular relates to a 5G-based V2X Internet of Vehicles secure communication system and method that can realize secure encrypted communication of the V2X Internet of Vehicles. Background technique [0002] Vehicle to Everything (V2X) is a new generation of information and communication technology that connects vehicles to everything. It is a general term for a series of vehicle communication technologies. V2X mainly includes Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Pedestrian (V2P), Vehicle to Network (V2N). ) and other modes. V2X is a key technology for future intelligent transportation. It can obtain a series of traffic information such as real-time road conditions, road information, and pedestrian information through communication, improve driving safety, reduce congestion, improve traffic efficiency, and provide in-vehicle ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/40H04L67/12H04L9/08H04L9/30H04L9/40
CPCH04W4/40H04L67/12H04L9/0838H04L9/3066H04L63/0823
Inventor 李平李鑫刘长河廖正赟孙晓鹏
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products