Supercharge Your Innovation With Domain-Expert AI Agents!

Authentication key negotiation method with anti-key exposure characteristic in Internet of Vehicles environment

An authentication key negotiation and Internet of Vehicles technology, applied in the field of authentication key negotiation mechanism, can solve problems such as long duration of damage, security attacks, smart card theft attacks, etc., to achieve anti-key exposure, session key security, The effect of increased communication costs

Active Publication Date: 2021-11-09
JINAN UNIVERSITY
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the document "Security-enhanced three-partypairwise secret key agreement protocol for fog-based vehicular ad-hoccommunications" pointed out that there are some security attacks in Ma et al.'s scheme, such as internal attacks, smart card stolen attacks, known temporary information of specific sessions attacks, etc., and proposed an improved three-party key agreement scheme based on fog in the communication environment of the Internet of Vehicles
[0005] However, in the proposed authentication key agreement schemes in the Internet of Vehicles environment, the problem of user key exposure is hardly considered. In fact, due to low security settings or shallow security awareness of users, the user's key is very may be leaked
Once the user's key is known by the adversary, all security objectives will be destroyed, and the entire Internet of Vehicles system will be destroyed
Moreover, in most cases, it is difficult for users to notice that the key has been exposed. In this way, the duration of the damage caused by the key exposure may be very long, causing serious and irreversible consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication key negotiation method with anti-key exposure characteristic in Internet of Vehicles environment
  • Authentication key negotiation method with anti-key exposure characteristic in Internet of Vehicles environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] In recent years, with the rapid development of intelligent transportation systems, Internet of Vehicles has become a research hotspot, which is of great significance to improve traffic efficiency and safety, but it also faces some challenges. On the one hand, in the Internet of Vehicles, information is transmitted on open channels, so it is vulnerable to attacks from illegal users, such as forgery attacks, impersonation attacks, and replay attacks. Therefore, how to protect the privacy and security of users is the focus of research; on the other hand, due to the fast-moving characteristics of vehicles, the designed solution needs to be efficient, flexible, and low-latency while meeting the communication security requirements. Authenticated key agreement protocol is an important mechanism to protect data transmission. At present, some scholars have proposed an authenticated key agreement protocol suitable for the Internet of Vehicles environment. However, none of these p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication key negotiation method with a key exposure resistance characteristic in an Internet of Vehicles environment, which is named as a KERAKA method. In the invention, the vehicle can establish the session key with any edge node only by registering once, and the difference between the method and the traditional scheme is that a main public key of an Internet of Vehicles system does not need to be set in an initialization stage, so that the storage overhead is reduced and the security is improved. In addition, the method has an anti-key exposure function. Specifically, in each time period, the private key of the user can be periodically updated with the help of the authorization server, so that even if the private key of the user in the current time period is exposed, the security of the private key in the previous or later time period cannot be influenced. Compared with an existing scheme, the method has obvious advantages in the aspects of safety performance and calculation overhead, and is more suitable for a complex and changeable car networking environment.

Description

technical field [0001] The technical field of the present invention is research on an efficient and secure authentication key agreement mechanism in the Internet of Vehicles environment, more specifically, the present invention is an authentication key agreement method based on edge computing with anti-key exposure characteristics in the Internet of Vehicles environment . Background technique [0002] In the connected car environment, security and privacy are the two main issues that need to be solved urgently. On the one hand, due to the openness of wireless networks, communication channels are vulnerable to illegal attacks, such as replay attacks, forgery attacks, impersonation attacks, and so on. On the other hand, with the improvement of people's safety awareness, they also pay more and more attention to privacy protection. It should be ensured that the personal sensitive information of car owners, such as identity information and form and route, will not be leaked. To...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L9/0863H04L9/083H04L9/085H04L9/0869H04L9/3242H04L67/12H04L69/26H04L67/10Y02D30/70
Inventor 王晓明姚梦婷甘庆晴林伊健
Owner JINAN UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More