Distributed aggregation authentication method with privacy protection in vehicular ad hoc network

A vehicular ad hoc network and privacy protection technology, applied in the field of vehicular ad hoc network information security, can solve problems such as certificate or pseudonym management burden

Inactive Publication Date: 2018-08-24
EAST CHINA NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Some scholars have proposed solutions to solve the security and privacy of vehicle ad hoc networks, but some of them rely on time-consuming password operations, some cause the burden of certificate or pseudonym management, and some are based on ideal anti-penetration equipment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed aggregation authentication method with privacy protection in vehicular ad hoc network
  • Distributed aggregation authentication method with privacy protection in vehicular ad hoc network
  • Distributed aggregation authentication method with privacy protection in vehicular ad hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The distributed aggregation authentication method (DAPPA) with privacy protection in the vehicular ad hoc network of the present invention comprises the following parameters:

[0064] root trusted authority root TA;

[0065] Roadside unit RSU;

[0066] Indicates the jth RSU;

[0067] Indicates the jth vehicle;

[0068] Indicates that it is issued by the root TA to certificate;

[0069] express or real identity;

[0070] express internal pseudonym identification of the root TA based on generate, Valid for VP i ;

[0071] PPID i,t express The public pseudonym identity of the , which is based on the generate;

[0072] E. π (·) / D π (·) represents a symmetric encryption scheme, π is the key, E π ( ) and D π (·) are the encryption and decryption algorithms respectively;

[0073] Indicated by Or a hash-based message authentication code generated by the root TA.

[0074] A distributed aggregation authentication method with privacy protec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed aggregation authentication method with privacy protection in a vehicle-mounted ad hoc network. The method includes the following steps: setting a root trusted institution; setting a roadside unit; setting a vehicle; updating an internal pseudonym and an authentication key; Obtaining member secrets and authorization periods; vehicle generation signatures and updating member secrets; tracking, message verification, and information storage. The invention has the following characteristics: satisfying conditional non-associated privacy; not relying on ideal and strict anti-penetration equipment; no key trusteeship problem. The invention can achieve the safe and private communication of the vehicle ad hoc network.

Description

technical field [0001] The invention belongs to the field of vehicle ad hoc network information security, in particular to a distributed aggregation authentication method with privacy protection in the vehicle ad hoc network. Background technique [0002] A vehicular ad hoc network is an ad hoc network for inter-vehicle communication that can enhance the driving experience by improving traffic safety and efficiency. The vehicle ad hoc network is mainly composed of vehicles and roadside units. Each vehicle can exchange information with other vehicles and roadside units in the vicinity, through which information can reduce the possibility of accidents for drivers, and can also help drivers deal with common emergencies. [0003] In order to achieve the above-mentioned goals of VANET, it is particularly important to ensure that safety-related messages are received safely, and these messages should have authentication, non-repudiation and integrity. Otherwise, a malicious vehic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04W12/06H04W12/0433
CPCH04L9/0861H04L63/064H04L63/08H04L67/12H04W12/06
Inventor 张磊伍前红
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products