V2X communication system, communication key distribution method and implicit authentication method

A communication system and communication key technology, applied in the field of intelligent vehicle communication, can solve problems such as low security, and achieve the effects of ensuring security and reliability, improving reliability and security, and improving security and reliability.

Active Publication Date: 2021-12-07
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the defects of low security existing in the prior art, the present invention discloses a V2X communication system, a communication key distribution method and an implicit authentication method, and the present invention can effectively improve the security and reliability of the V2X communication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • V2X communication system, communication key distribution method and implicit authentication method
  • V2X communication system, communication key distribution method and implicit authentication method
  • V2X communication system, communication key distribution method and implicit authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0069] This embodiment is regarded as a basic embodiment of the present invention, such as figure 1 As shown, it discloses a V2X communication system, including a first processing module 1, a second processing module 2, a third processing module 3 and a fourth processing module 4, the first processing module 1 is built in the vehicle end, The first processing module 1 includes a data generation unit 11 and a data storage unit 12, wherein the registration certificate generated based on the real identity information of the vehicle is stored in the data storage unit 12, and the private key and the return certificate are also stored in the data storage unit 12. And verify the pseudonym certificate passed; the data generation unit 11 generates the first request information for applying for the pseudonym certificate according to the registration certificate, and also generates the second request information for interactive communication in the system according to the vehicle key pack...

Embodiment approach 2

[0074] This embodiment is regarded as a preferred embodiment of the present invention, such as figure 2 As shown, it discloses a V2X communication key distribution method, including the following steps:

[0075] S1. The vehicle presets a registration certificate bound to the real identity when leaving the factory, and the customer sends a request to activate the registration certificate to the second processing module through the first processing module or sends a VIN code to the second processing module for activation;

[0076] Generate the first request information by the first processing module, and send the first request information to the second processing module; the message of the first request information includes: pseudonym certificate application request, statement number n, random function f(·) and Certificate of Registration;

[0077] S2. Receive the first request information, analyze the first request information, and extract the application number n and the ran...

Embodiment approach 3

[0095] This embodiment is regarded as a preferred embodiment of the present invention, such as image 3 As shown, it discloses a V2X key implicit authentication method, including the following steps:

[0096] S1. The first processing module randomly selects a set of corresponding signature key pairs and implicit certificates from the stored valid pseudonym certificates, and randomly selects {0, 1} coefficient polynomial e;

[0097]Calculate the signature according to the signature private key pair, and combine the communication information M to be sent to generate the information packet to be exchanged. The expression of the signature is Sign=sk'+H(M||Timestamp||cert||t)×emodq, Wherein said t=a*emodq;

[0098] Generate the information package to be interacted with according to the signature, and then integrate the vehicle identity information and the information to be interacted into the second request information, wherein the expression of the information package to be inter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a V2X communication system, a communication key distribution method and an implicit authentication method. First request information used for applying for a pseudonym certificate and second request information used for establishing a communication request are sent through a first processing module, and an intermediate key and a vehicle key packet are generated through a second processing module and a third processing module respectively; in the aspect of communication establishment, a communication link with the fourth processing module is established by the first processing module directly. According to the technical scheme, the secret key is generated in the mode that the secret key is disassembled and placed in different processing parties, and the secret key generation method is designed based on the small integer solution problem and has the good quantum attack resistance characteristic, and the mode can effectively avoid series connection between the secret key generator and the secret key requester; the auditing party of the communication request does not directly contact the generation party of the secret key, so that mutual series connection is avoided, and it is ensured that the access request of a non-authentication client is excluded; and the safety and reliability of the whole communication network are ensured.

Description

technical field [0001] The invention relates to the technical field of intelligent vehicle communication, in particular to a V2X communication system, a communication key distribution method and an implicit authentication method. Background technique [0002] With the development of intelligent networking, transportation vehicles are gradually equipped with computing and communication capabilities to promote the intelligent integration of transportation systems. In particular, the rapid development of V2X communication technology further strengthens the ability of vehicles to communicate with other entities (such as other vehicles, roadside units RSU, pedestrians, etc.). The intelligent trend of the transportation system not only enables vehicles to join the Internet of Everything, but also makes the transportation system more efficient and safer. [0003] Information security and privacy protection are crucial security elements of intelligent transportation systems. Authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/40H04W12/041H04W12/06H04W12/069H04W76/10
CPCH04W12/041H04W12/069H04W12/068H04W4/40H04W76/10
Inventor 肖佃艳李政陈燕呢李承泽范乐君赵怀瑾申任远
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products