Strong Privacy Preserving Dual Authentication Method Based on Node Identity and Reputation in Internet of Vehicles

A two-factor authentication and privacy protection technology, applied in the field of information security, can solve problems such as incomplete reliability, achieve the effect of rapid judgment basis, protect trajectory privacy, and enhance accuracy

Active Publication Date: 2019-07-19
CHONGQING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the aforementioned security issues such as the incomplete reliability of authentication based on objective evidence and the privacy and efficiency requirements caused by the large-scale and high-dynamic characteristics of the Internet of Vehicles, the present invention proposes a strong privacy protection based on vehicle node identity and reputation for the vehicle-background communication scenario. The double authentication method aims to improve the security of vehicle nodes and background authentication, privacy protection and accuracy of authentication decision-making under the condition of time tolerance, so as to provide accurate judgment basis for later V2V authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Strong Privacy Preserving Dual Authentication Method Based on Node Identity and Reputation in Internet of Vehicles
  • Strong Privacy Preserving Dual Authentication Method Based on Node Identity and Reputation in Internet of Vehicles
  • Strong Privacy Preserving Dual Authentication Method Based on Node Identity and Reputation in Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The specific implementation of the present invention will be further explained in detail below in conjunction with the accompanying drawings.

[0022] Such as figure 2 Shown is a schematic diagram of the communication scene between the vehicle node and the background application server and the V2V communication scene of the present invention, image 3 It is a structural diagram of the overall architecture of the authentication system. These include: authentication server (TA: Trust Authority), node reputation evaluation server (ES: Evaluation Server), high reputation node storage server (IDB: IdentityDatabase), intelligent vehicle node (V i ,V j ), and a background application server cluster (AppSC: Application ServerCluster). Since the RSU is responsible for forwarding, the image 3 Not indicated in.

[0023]Such as Figure 4 Shown is a schematic diagram of the vehicle node internal data flow principle of the present invention, including: environmental informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a strong privacy protection dual authentication method based on node identities and reputations in Internet of vehicles. A user registers with an authentication center to obtain unique secret information shared with the authentication center; the user stores vehicle node initialization parameter information into a TPM security storage area; when the user expects interaction between vehicle applications on vehicle nodes and a background application server, the user needs to input identity information and an authentication process of the vehicle nodes and a background is executed by TA; the authentication process is as follows: a temporary encryption key with the TA is established to carry out symmetrical encryption transmission on the information through a bilinear pairing principle, the TA carries out integrity and consistency detection on the received information, verifies legality of real and temporary identities of the vehicle nodes and calls an ES to compute the node reputation, if the identities of the vehicle nodes are legal finally and the reputations exceed a threshold, the authentication of communication between the vehicle nodes and the background is completed. According to the method, the authentication security is enhanced, the identity privacy and the trajectory privacy of the user are protected, the authentication efficiency is improved and the authentication time delay is reduced.

Description

technical field [0001] The invention belongs to the field of information security, and relates to a wireless communication technology for vehicle-mounted mobile application interaction in a vehicle networking environment, in particular to authentication and information encryption technologies. Background technique [0002] The Internet of Vehicles is the specific application of the Internet of Things in the automotive field. Based on the in-vehicle mobile Internet (Telematics), it is a system for exchanging information between vehicles and X (X: vehicles, roads, people and the Internet, etc.) according to agreed communication protocols and data interaction standards. However, excessive reliance on intelligent perception technology, control technology, communication technology and computer technology will make the Internet of Vehicles system deployed on a large scale in the future more vulnerable to malicious attacks. For this reason, in recent years, with the upsurge of Int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/12
Inventor 刘宴兵王宇航常光辉李露叶青
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products