Identity-based internet of Vehicles privacy security protection method
A technology of privacy security and Internet of Vehicles, which is applied in the direction of services based on specific environments, security devices, and secure communication devices, and can solve problems such as network attack and non-support of V2V communication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0044] The method of the invention is based on the elliptic curve encryption algorithm and bilinear pairing mapping theory to perform bidirectional verification of different algorithms of OBU and RSU.
[0045] The system is initialized, CA selects the elliptic curve in the finite field, defines the cyclic addition group and the cyclic multiplication group, and generates the system parameters of the scheme according to the principle of bilinear pairing.
[0046] The CA selects a random number in the finite field pool as the system private key, and calculates the system public key in combination with...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


