Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity-based internet of Vehicles privacy security protection method

A technology of privacy security and Internet of Vehicles, which is applied in the direction of services based on specific environments, security devices, and secure communication devices, and can solve problems such as network attack and non-support of V2V communication

Inactive Publication Date: 2021-01-19
丹阳市威鼎汽配有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The amount of calculation and storage of OBU in the RSU-based scheme is much smaller than other schemes, but the signature and verification signature in this scheme largely depend on RSU, so V2V communication is not supported, and all communication depends on RSU
The authentication scheme based on group signature reduces the requirement for OBU storage capacity, but introduces the role of group administrator, if this role is attacked, it will cause a serious blow to the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based internet of Vehicles privacy security protection method
  • Identity-based internet of Vehicles privacy security protection method
  • Identity-based internet of Vehicles privacy security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] The method of the invention is based on the elliptic curve encryption algorithm and bilinear pairing mapping theory to perform bidirectional verification of different algorithms of OBU and RSU.

[0045] The system is initialized, CA selects the elliptic curve in the finite field, defines the cyclic addition group and the cyclic multiplication group, and generates the system parameters of the scheme according to the principle of bilinear pairing.

[0046] The CA selects a random number in the finite field pool as the system private key, and calculates the system public key in combination with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of mobile communication, and discloses an identity-based Internet of Vehicles privacy security protection method, which comprises the following steps: (1) after a system is initialized, enabling a roadside unit infrastructure (RSU) to register to a certificate authority / trusted center (CA), and enabling the CA to generate a certificate for the RSU; (2) generatinga pseudo identity by an on board unit (OBU); (3) when the OBU enters the RSU coverage area of the roadside unit, performing bidirectional verification on the RSU and the OBU through different algorithms; (4) enabling the CA to process and broadcast the verification result. According to the method disclosed in the invention, scheme design is carried out by combining an elliptic curve algorithm with a bilinear pair mapping theory, the unique advantages of the RSU are utilized, and the main information of the system is stored in the RSU; different algorithm bidirectional authentication between the RSU and the OBU is carried out by using a shared key, an identity ID and a handshake principle in a communication process; therefore the security and efficiency of identity authentication are improved.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method for protecting privacy and security of Internet of Vehicles based on two-way authentication of identity. Background technique [0002] The Internet of Vehicles (IOV) is a vital part of the intelligent transportation system. It is a spontaneously created network form, mainly used for data exchange. It is composed of entities on the road connected to each other to sense traffic conditions and supervise The running status of the car can effectively improve the road traffic. The architecture of the vehicle network is as follows figure 1 shown. The Internet of Vehicles can provide a variety of intelligent service models for smart transportation, integrating technologies such as the Internet of Things, traditional Internet, and mobile Internet, but it also creates more complex security issues. Due to the high mobility of vehicle nodes, attackers can access, threaten and d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/069H04L9/32H04L9/30H04W4/44H04W4/46
CPCH04L9/3273H04L9/3268H04L9/3252H04L9/3073H04W4/44H04W4/46H04L2209/84H04L2209/80
Inventor 崔恒荣
Owner 丹阳市威鼎汽配有限公司