Internet of vehicles communication security authentication method, system and equipment based on national cryptographic algorithm

A national secret algorithm and security authentication technology, which is applied in the field of vehicle networking communication security authentication based on the national secret algorithm, can solve problems such as network delay, waste of resources, and imperfect roadside facilities, so as to prevent message replay attacks and ensure confidentiality. Sex, the effect of reducing the number of times

Active Publication Date: 2022-03-08
NANJING UNIV OF SCI & TECH
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (3) Imperfect roadside facilities: The roadside facility nodes that can access the Internet of Vehicles data are not universal, causing network delays or resource waste

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of vehicles communication security authentication method, system and equipment based on national cryptographic algorithm
  • Internet of vehicles communication security authentication method, system and equipment based on national cryptographic algorithm
  • Internet of vehicles communication security authentication method, system and equipment based on national cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] An embodiment of the present invention is a security authentication method for the Internet of Vehicles communication based on the national secret algorithm, based on the SM2 digital signature algorithm, the SM2 public key encryption algorithm and the SM3 hash algorithm, and the vehicle-mounted terminal and roadside facilities in the Internet of Vehicles realize the vehicle-mounted Two-way identity authentication between terminals and roadside facilities, such as figure 1 shown.

[0071] The random number generator in the safety chip is preset in the vehicle terminal and roadside facilities to generate private keys respectively , , and stored in the storage unit of the security chip and cannot be exported.

[0072] Before the vehicle-mounted terminal and the roadside facility perform two-way security identity authentication, the vehicle-mounted terminal and the roadside facility send certificate request files to the CA respectively, and the CA signs and generates di...

Embodiment 2

[0108] Another embodiment of the present invention is a vehicle-mounted vehicle terminal based on a national secret algorithm, including a random number generation module, a certificate issuance module, an identity authentication message construction module, and an authentication module, such as Figure 5 shown. The vehicle-mounted terminal of this embodiment implements the security authentication method for the vehicle-mounted terminal of the Internet of Vehicles communication based on the national secret algorithm as described in Embodiment 1, wherein,

[0109] The random number generation module generates a private key through the random number generator in the safety chip preset in the vehicle terminal, and stores it in the storage unit of the safety chip and cannot export it;

[0110] The certificate issuing module is used for the vehicle-mounted terminal to send a certificate request file to the CA, and receive the digital certificate generated by the CA signing the cert...

Embodiment 3

[0114] Another embodiment of the present invention is a car network roadside facility based on a national secret algorithm, including a random number generation module, a certificate issuance module, an identity authentication message construction module, and an authentication module, such as Figure 5 shown. The roadside facility in this embodiment implements the security authentication method for the vehicle network communication roadside facility based on the national secret algorithm as described in Embodiment 1, wherein,

[0115] The random number generation module generates a private key through the random number generator in the safety chip preset in the roadside facility, and stores it in the storage unit of the safety chip and cannot export it;

[0116] The certificate issuing module is used for the roadside facility to send the certificate request file to the CA, and receive the digital certificate generated by the CA to sign the certificate request file of the roads...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of Internet of Vehicles security, and discloses an Internet of Vehicles communication security authentication method, system and device based on a national cryptographic algorithm. The method comprises the following steps: a vehicle-mounted terminal constructs an identity authentication request message and sends the identity authentication request message to a roadside facility; the vehicle-mounted terminal receives the identity authentication response message and verifies the signature; if verification succeeds, the vehicle-mounted terminal calculates a session key and a hash value thereof, constructs a confirmation message and sends the confirmation message to the roadside facility; a session key and a hash value of the session key are calculated by the roadside facility for comparison verification; if the hash values are equal, the security authentication succeeds and a session key is generated, and if not, the security authentication fails. According to the method, the SM2 digital signature algorithm, the SM2 public key encryption algorithm and the SM3 hash algorithm are combined, so that the method can be applied to the communication process of the vehicle-mounted terminal and the roadside facility, and various attacks can be resisted with relatively low total computing resources and relatively low communication bandwidth.

Description

technical field [0001] The invention belongs to the technical field of Internet of Vehicles security, and in particular relates to a communication security authentication method, system and equipment for Internet of Vehicles based on a national secret algorithm. Background technique [0002] Driven by existing computer and communication technologies, the traditional automobile industry realizes communication between vehicles and between vehicles and roadside facilities by carrying sensor equipment and communication equipment. However, due to the openness and high-speed mobility of the Internet of Vehicles communication environment, private information such as vehicle user identity and geographic location may be exposed to the network. If the user identity is not legally authenticated, the user information cannot be effectively protected, and the Internet of Vehicles communication will bring a series of security problems such as user privacy disclosure, identity fraud, and fa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F21/45G06F21/60G06F21/64G06F7/58
CPCG06F21/33G06F21/45G06F21/602G06F21/64G06F7/588
Inventor 戚湧刘洺君
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products