Batch authentication method for privacy protection in Internet-of-Vehicles environment

A technology of privacy protection and authentication method, which is applied in the direction of services based on specific environments, vehicle communication, vehicle parts, etc.

Active Publication Date: 2021-09-07
JIANGSU UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially in rural areas with few vehicles, the system cannot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Batch authentication method for privacy protection in Internet-of-Vehicles environment
  • Batch authentication method for privacy protection in Internet-of-Vehicles environment
  • Batch authentication method for privacy protection in Internet-of-Vehicles environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] This example assumes that the three vehicles are Vehicle 1 、Vehicle 2 and Vehicle 3 , the roadside unit is the RSU, and the law enforcement agency is the LEA. Take this as an example to specifically illustrate the above-mentioned links.

[0058] Link i (system initialization generates corresponding parameters):

[0059] The law enforcement agency LEA generates a bilinear map e: G×G→G T , where G is the additive cyclic group, G T is a multiplicative cyclic group of order q. Next, LEA selects the generator g in G, and in G r Choose two different generators g=e(g,g) and h=e(h,h) in . LEA sets the public parameter as para=(q, G, G T , g, g, h, e); Based on the above parameters, LEA selects x, y, x 1 , x 2 , x 3 , x 4 , x 5 , λ∈Z q ,calculate Then the LEA public key pk LEA =(λ, h, Y 1 , Y 2 , Y 3 , Y 4 , Y 5 ), private key sk LEA =(x 1 , x 2 , x 3 , x 4 , x 5 ).

[0060] Stage ii (the corresponding participant completes the registration):

[0061...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a batch authentication method for privacy protection in an Internet-of-Vehicles environment. The method comprises the following links of system initialization, registration of participants, message signature, message batch verification, real identity tracing of vehicles, regular updating of public keys of law enforcement offices and updating of vehicle certificates. The invention provides a privacy protection identity authentication protocol based on bilinear pairing, a vehicle signs a message related to traffic and sends the signature and a blind certificate to a nearby roadside unit, and the roadside unit can independently detect the validity of the message by using non-interactive zero-knowledge proof. According to the invention, a safe, efficient and privacy-protected identity authentication environment is provided for the Internet of Vehicles, and the privacy protection and traceability problems of vehicle identities are solved.

Description

technical field [0001] The invention belongs to in-vehicle communication technology, in particular to a batch authentication method for privacy protection in an Internet of Vehicles environment. Background technique [0002] The Internet of Vehicles is of great significance to the development of intelligent transportation systems. The Internet of Vehicles is a heterogeneous network that integrates communication between vehicles and other roadside facilities. This heterogeneous network enables vehicles to wirelessly exchange time-critical information such as road safety, navigation and other roadside services. In particular, roadside units (RSUs) have been equipped with edge computing devices to address computational complexity and transmission overhead issues. This enables the RSU to process vehicle authentication requests locally without relying on time-consuming cloud servers. [0003] However, the Internet of Vehicles architecture brings a large amount of real-time mes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04W4/48H04W12/06
CPCH04L9/3218H04L9/3263H04L9/3247H04W4/48H04W12/068
Inventor 石启琛冯霞王良民谢晴晴王晓峰贾雪丹余春堂
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products