Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and device for security authentication of Internet of Vehicles communication based on national secret algorithm

A national secret algorithm and security authentication technology, which is applied in the field of vehicle network communication security authentication based on the national secret algorithm, can solve problems such as network delay, resource waste, and imperfect roadside facilities, so as to prevent message replay attacks and ensure confidentiality Sexuality, the effect of reducing the number of times

Active Publication Date: 2022-05-24
NANJING UNIV OF SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (3) Imperfect roadside facilities: The roadside facility nodes that can access the Internet of Vehicles data are not universal, causing network delays or resource waste

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for security authentication of Internet of Vehicles communication based on national secret algorithm
  • Method, system and device for security authentication of Internet of Vehicles communication based on national secret algorithm
  • Method, system and device for security authentication of Internet of Vehicles communication based on national secret algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] An embodiment of the present invention is a security authentication method for Internet of Vehicles communication based on a national secret algorithm. Based on the SM2 digital signature algorithm, the SM2 public key encryption algorithm and the SM3 hash algorithm, the on-board terminals and roadside facilities in the Internet of Vehicles realize the Two-way identity authentication between terminals and roadside facilities, such as figure 1 shown.

[0071] The on-board terminal and the roadside facility are factory-preset with a random number generator in the security chip to generate the private key respectively , , and stored in the storage unit of the security chip, which cannot be acquired by external devices.

[0072] Before the two-way security identity authentication between the vehicle terminal and the roadside facility, the vehicle terminal and the roadside facility respectively send the certificate request file to the CA, and the CA respectively issues th...

Embodiment 2

[0108] Another embodiment of the present invention is a vehicle networking vehicle terminal based on a national secret algorithm, including a random number generation module, a certificate issuance module, an identity authentication message construction module, and an authentication module, such as Figure 5 shown. The vehicle-mounted terminal in this embodiment implements the security authentication method for the vehicle-to-vehicle communication vehicle terminal based on the national secret algorithm described in Embodiment 1, wherein,

[0109] The random number generation module generates a private key through the random number generator in the security chip preset in the vehicle terminal, and stores the private key in the storage unit of the security chip, which cannot be acquired by external equipment;

[0110] The certificate issuing module is used for the vehicle terminal to send the certificate request file to the CA, and to receive the digital certificate generated by...

Embodiment 3

[0114] Another embodiment of the present invention is a vehicle networking roadside facility based on a national secret algorithm, including a random number generation module, a certificate issuance module, an identity authentication message construction module, and an authentication module, such as Figure 5 shown. The roadside facility of this embodiment implements the security authentication method for the roadside facility of the Internet of Vehicles communication based on the national secret algorithm described in Embodiment 1, wherein,

[0115] The random number generation module generates a private key through the random number generator in the security chip preset in the roadside facility, and stores the private key in the storage unit of the security chip, which cannot be acquired by external equipment;

[0116] The certificate issuance module is used for the roadside facility to send the certificate request file to the CA, and to receive the digital certificate gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of vehicle network security, and discloses a vehicle network communication security authentication method, system and equipment based on a national secret algorithm. The method of the present invention includes: the vehicle-mounted terminal constructs an identity authentication request message and sends it to the roadside facility; the vehicle-mounted terminal receives the identity authentication response message and verifies the signature; if the verification is successful, the vehicle-mounted terminal calculates the session key and its hash value and constructs a confirmation message to send To the roadside facility; it is used by the roadside facility to calculate the session key and its hash value for comparison and verification; if the hash values ​​are equal, the security authentication succeeds and a session key is generated; if they are not equal, the security authentication fails. The present invention combines SM2 digital signature algorithm, SM2 public key encryption algorithm and SM3 hash algorithm to ensure that the method can be applied to the communication process between vehicle-mounted terminals and roadside facilities, and can resist Various attacks.

Description

technical field [0001] The invention belongs to the technical field of Internet of Vehicles security, and in particular relates to a security authentication method, system and device for Internet of Vehicles communication based on a national secret algorithm. Background technique [0002] Driven by the existing computer and communication technology, the traditional automobile industry realizes the communication between vehicles and between vehicles and roadside facilities by carrying sensor equipment and communication equipment. However, due to the openness and high-speed mobility of the Internet of Vehicles communication environment, the vehicle's user identity, geographic location and other private information may be exposed in the network. If the user's identity is not legally authenticated, the user's information cannot be effectively protected, and the Internet of Vehicles communication will bring a series of security problems such as user privacy leakage, identity frau...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/33G06F21/45G06F21/60G06F21/64G06F7/58
CPCG06F21/33G06F21/45G06F21/602G06F21/64G06F7/588H04L63/08G06F21/44H04L9/32H04L2209/84H04L9/3247H04L9/3263
Inventor 戚湧刘洺君
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products