A privacy protection identity authentication system and method for Internet of Vehicles

A privacy protection and identity authentication technology, applied in the field of wireless network security, can solve problems such as witch attacks, achieve the effect of improving performance, avoiding certificate storage and management overhead, and ensuring anonymity

Active Publication Date: 2022-02-22
NORTHEASTERN UNIV LIAONING
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the identity-based authentication mechanism, the vehicle can generate any number of certificates by itself, but at the same time, it must also solve the Sybil attack caused by the pseudonym generated by the vehicle itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy protection identity authentication system and method for Internet of Vehicles
  • A privacy protection identity authentication system and method for Internet of Vehicles
  • A privacy protection identity authentication system and method for Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0040] The purpose of the present invention is to provide a privacy-protected identity authentication system and method oriented to the Internet of Vehicles. A third-party trust agency issues anonymous certificates to vehicle users who apply for registration, and the user has only one legally available certificate at the same time, ensuring that the user is at the same time. Complete identity authentication without revealing your true identity. At the same time, under special circumstances, you can restore the identity of vehicle users who have illegal behaviors in the network through a third-party authentication agency to ensure the conditional anonymity and effective authentication of users. Limit malicious users in the network from causing Sybil attacks.

[0041] figure 1 It is a schematic framework diagram of the privacy protection identit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy protection identity authentication system and method oriented to the Internet of Vehicles, and relates to the technical field of wireless network security. The system includes certificate issuing center CRA, vehicle user, roadside unit RSU and identity review and authentication center IRA. The method includes: an initial stage, an anonymous credential issuance stage; a credential presentation and verification stage, and an anonymous credential identity review stage. The invention uses anonymous certificates to ensure that users complete identity authentication without revealing their true identities, and can also perform identity review and identity recovery on vehicle users who have illegal behaviors in the network, ensuring the conditional anonymity of users , thereby improving the intensity of privacy protection; the invention does not need to store a large number of certificates, thereby avoiding certificate storage and management overhead, and greatly improving the performance of the authentication system. At the same time, the user in the present invention has only one legally available certificate at the same time, which can effectively limit malicious users in the network from causing sybil attacks.

Description

technical field [0001] The present invention relates to the technical field of wireless network security, in particular to a privacy protection identity authentication system and method for Internet of Vehicles. Background technique [0002] With the rapid development and wide application of wireless communication technology, the interconnection between objects has become a common phenomenon in daily life. The Internet of Things (IoT) has been associated with many fields such as intelligent transportation systems. VANETs (vehicular ad hoc networks, vehicular ad hoc network) is an important part of intelligent transportation system. VANETs not only allow vehicle-to-vehicle (V2V) communication, but also allow vehicles to communicate with roadside infrastructure, that is, roadside unit RSU (Road Side Unit). During the driving process, vehicles in the Internet of Vehicles need to periodically broadcast safety messages, that is, beacon information. The purpose of beacon messag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/321
Inventor 高天寒赵聪郭楠
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products