A distributed authentication method for Internet of Vehicles based on block chain technology

An authentication method, a technology of the Internet of Vehicles, which is applied in the field of access authentication in the Internet of Vehicles, and can solve problems such as long computing delays, inapplicable delay-sensitive Internet of Vehicles, RSU attacks, etc.

Active Publication Date: 2022-04-05
南京清科链谷科技服务有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Traditional IoV distributed authentication directly uses Road Side Unit (RSU, Road Side Unit) to verify the identity of the vehicle. However, RSU is extremely vulnerable to various attacks. Therefore, the trust issue of RSU must be considered in distributed authentication.
In addition, the bilinear mapping operation is a common method in identity authentication. However, due to its long calculation delay, it is not suitable for the delay-sensitive Internet of Vehicles. Therefore, the efficiency of the authentication protocol in the existing technology needs to be improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A distributed authentication method for Internet of Vehicles based on block chain technology
  • A distributed authentication method for Internet of Vehicles based on block chain technology
  • A distributed authentication method for Internet of Vehicles based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] In the distributed authentication scheme of the present invention, the design process of the distributed authentication protocol is mainly based on the following contents:

[0022] Considering that the trust degree of RSU is not as good as the trusted center, and RSU is a semi-trusted IoV facility, the present invention allows RSU to spontaneously establish a credible edge authentication chain through three times or three-stage broadcasting, thereby divi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the field of access authentication in the Internet of Vehicles, in particular to a distributed authentication method for the Internet of Vehicles based on block chain technology. Based on the principle of high reliability and high efficiency, under the premise of considering the trust of edge nodes, RSU spontaneously establishes an edge authentication chain through three-stage broadcasting, thereby dividing the Internet of Vehicles into multiple edge authentication areas; RSUs in the area pass Chebyshev The semi-group characteristics of the mapping realize the rapid authentication of local vehicles; the RSU as a blockchain node stores the authentication records of the vehicles, and when the vehicle behavior changes, the local vehicle list is updated in time; finally, the random oracle model is used to verify the proposed authentication scheme. The security of the invention is proved; the invention can realize distributed access authentication with high efficiency and high reliability under the premise of considering the RSU trust problem.

Description

technical field [0001] The invention relates to the field of access authentication in the Internet of Vehicles, in particular to a distributed authentication method for the Internet of Vehicles based on block chain technology. Background technique [0002] In recent years, privacy and security issues in the Internet of Vehicles (IoV, Internet of Vehicles) have become a hot issue. Ensuring the safe and efficient access of legal on-board units (OBU, On Broad Units) to IoV is the key to solving this problem. Therefore, the design of the access authentication protocol is very important. [0003] Authentication protocols in IoV can be divided into two categories: centralized authentication and distributed authentication. Among them, there are three main problems in centralized authentication. First, due to the large number of vehicle nodes, this will bring huge authentication pressure to the central server; second, when edge vehicles perform access authentication, they need to s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/06H04W4/40H04W12/02H04W12/06H04L9/00
CPCH04W4/06H04W4/40H04W12/06H04W12/02H04L9/001
Inventor 黄宏武张海波刘开健
Owner 南京清科链谷科技服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products