Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for safe storage and sharing of Internet of Vehicles data based on hybrid architecture

A technology of data security storage and hybrid architecture, applied in the field of edge computing technology and cloud computing technology, can solve problems such as casualties, traffic accidents, leakage, etc., and achieve the effect of improving high latency

Active Publication Date: 2022-07-01
JIANGXI UNIV OF SCI & TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, if the vehicle's identity information is leaked during the communication process, private information such as the vehicle's location and running track may be exposed
Because the safety and integrity of traffic information is almost related to the protection of people in the car, once the transmitted data is wrong, it may cause traffic accidents and casualties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for safe storage and sharing of Internet of Vehicles data based on hybrid architecture
  • A method for safe storage and sharing of Internet of Vehicles data based on hybrid architecture
  • A method for safe storage and sharing of Internet of Vehicles data based on hybrid architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The hybrid architecture-based safe storage and sharing method for Internet of Vehicles data in the present invention mainly includes a transportation center (TC), a roadside unit (RSU), a vehicle (V), a trusted cloud service provider (TCS), and a private key. Generator (PKG) and Edge Computing Device (ECD). TC is used to register and store legal vehicle registration information; RSU is installed on both sides of the road and is mainly responsible for responding to vehicle verification and communication services; V can communicate with other units through its on-board unit; TCS is used to store and upload to the network during vehicle operation The complete information of the vehicle is summarized as follows: it is stored in the blockchain network to ensure the integrity and immutability of the information; the vehicle registration information can be used to generate the user's public key, and PKG is used to create the private key corresponding to the public key for the u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of vehicle networking safety communication, and discloses a method for safely storing and sharing vehicle networking data based on a hybrid architecture. The specific steps are as follows: S1 when there is a vehicle V i When you want to join the Internet of Vehicles, you need to obtain the corresponding public and private key pairs from TC and PKG respectively, and use this as the account number and login password similar to the traditional network. The invention uses the double-chain structure of the alliance chain-private chain to solve the problem of data integrity and security in the communication process, introduces the central authority for generating the private key in the identity-based digital signcryption algorithm, and designs a The ring signature scheme involving the binomial distribution of discrete centers combines edge computing technology with cloud computing technology to achieve the real-time and efficient purpose of the vehicle network. The reputation evaluation algorithm and node classification are introduced into the practical Byzantine fault tolerance mechanism (PBFT), which improves the High latency in the communication process.

Description

technical field [0001] The invention belongs to the security communication field of the Internet of Vehicles, and relates to the block chain technology, the identity-based digital signcryption algorithm, the edge computing technology and the cloud computing technology in the field of information security. Background technique [0002] According to the statistics of the Ministry of Public Security, there will be 33.28 million newly registered motor vehicles nationwide in 2020, an increase of 1.14 million or 3.56% over 2019. According to data analysis, there are nearly 200,000 traffic accidents in China every year, and an average of 1 person is killed in traffic accidents every 8 minutes. Vehicles in the IoV environment are equipped with advanced on-board sensors and intelligent electronic equipment, and are further equipped with a wireless communication device on-board unit (OBU), which can effectively complete the interactive communication between members of the IoV. Curren...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08H04L9/06H04L67/12
CPCH04L63/0421H04L9/0869H04L9/0643H04L9/3255H04L9/3297H04L9/3236H04L67/12
Inventor 巫光福王影军廖列法
Owner JIANGXI UNIV OF SCI & TECH