Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Vehicles cross-domain authentication method based on side chain technology trust model

A technology of trust model and authentication method, which is applied in the direction of services based on specific environments, communication between vehicles and infrastructure, wireless communication, etc., can solve the problems of complicated authentication process and privacy leakage, and achieve good storage and authentication pressure, The effect of solving the single point of failure problem

Active Publication Date: 2020-12-29
NANTONG UNIVERSITY +1
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] To sum up, PKI based on blockchain has realized decentralized authentication, but there are still problems such as privacy leakage and complicated authentication process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Vehicles cross-domain authentication method based on side chain technology trust model
  • Internet of Vehicles cross-domain authentication method based on side chain technology trust model
  • Internet of Vehicles cross-domain authentication method based on side chain technology trust model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0037] This embodiment provides a cross-domain authentication method for the Internet of Vehicles based on the side chain technology trust model, such as figure 1 As shown, it includes the following steps: S10 initialization and registration phase, CA center generates initialization parameters and assigns public and private keys to RSU{P r ,S r}, assign public and private keys to the vehicle {P v ,S v} and generate the domain identity certificate Cert v . In the phase of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an Internet of Vehicles cross-domain authentication method based on a side chain technology trust model. The Internet of Vehicles cross-domain authentication method comprises the following steps: S10, an initialization and registration stage; S20, a cross-domain vehicle identity verification stage; S30, repeating a cross-domain authentication stage; and S40, in an identity logout stage, if the RSU receives a plurality of logout applications for the same vehicle ID, informing a CA center of the logout applications, the CA center binding the identity ID of the vehicle to be logged out with a logout identifier 'REVOKE' and signing and disclosing the logout identifier 'REVOKE' in a main chain layer, and if the intelligent contract retrieves that the vehicle identity ID is marked with 'REVOKE', indicating that the vehicle identity is logout and cannot access a network. According to the Internet of Vehicles cross-domain authentication method based on the side chain technology trust model, the block chain side chain technology is innovatively applied to cross-domain identity authentication research of the Internet of Vehicles, and unforgeability, tamper resistance and traceability of vehicle identities are guaranteed through the characteristics of block chain distributed data storage and the like; the problem of centralized single-point failure of a cross-domainauthentication mechanism of the traditional Internet of Vehicles is solved.

Description

technical field [0001] The invention relates to the technical field of security application of the Internet of Vehicles, in particular to a cross-domain authentication method for the Internet of Vehicles based on a side chain technology trust model. Background technique [0002] The Internet of Vehicles is a system that uses vehicles as mobile sensing objects to perform wireless communication and interconnection perception between vehicles and X (vehicles, roads, Internet, etc.), and realize the integration of traffic intelligent management, service intelligent decision-making and vehicle intelligent control. Identity authentication is an important security mechanism to ensure the security of Internet of Vehicles information, and identity authentication based on Public Key Infrastructure (PKI) is currently a relatively mature and widely used authentication technology. In the Internet of Vehicles environment, the trusted authority (certification center, or CA) of the public k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/44H04W12/04H04W12/06H04L9/06H04L9/32
CPCH04W4/44H04L9/0643H04L9/3249
Inventor 曹利陈葳葳戴亮魏晓宁沈宇威
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products