Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted LBS service protocol implementation method based on privacy protection

A service agreement and privacy protection technology, applied in the field of car networking security, which can solve the problems of group member key leakage and excessive permissions.

Active Publication Date: 2020-04-28
NANTONG UNIVERSITY
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the group signature itself has many flaws. It has a manager, and the manager has too much authority. Once the manager is compromised by the attacker, all group member keys will be leaked. In addition, adding and deleting group members need to change group key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted LBS service protocol implementation method based on privacy protection
  • Trusted LBS service protocol implementation method based on privacy protection
  • Trusted LBS service protocol implementation method based on privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0131] In order to clearly illustrate the technical features of the solution, the solution will be described below through specific implementation modes.

[0132] see Figure 1 to Figure 6 , the present invention is: a kind of trusted LBS service protocol implementation method based on privacy protection comprises the following steps:

[0133] Step 1, system settings:

[0134] The key generation center (PKG) deployed in the traffic authority (TA) constructs the addition group and the same factorial group, and then uses the ring signature technology to prepare for system initialization, and publishes the public parameters for the ring signature.

[0135] Step 2, user registration:

[0136] All users, including vehicles, roadside units and LBS servers, must register with the local traffic authority before joining the Internet of Vehicles. The traffic authority is responsible for checking and verifying the user's identity information, and registering for it after passing the re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted LBS service protocol implementation method based on privacy protection, and belongs to the technical field of Internet of Vehicles security. According to the technicalscheme, the trusted LBS protocol implementation method based on privacy protection comprises the four steps of system setting, user registration, position hiding and signature verification. The beneficial effects of the invention are as follows: bidirectional trusted communication between a vehicle user and an LBS server in an Internet of Vehicles LBS environment is realized, position concealmentand identity concealment are generated through cooperation of an OBU, the LBS and the TA, position concealment of the LBS server by the OBU is achieved, meanwhile, identity authentication of the OBUis achieved, and the adopted certificateless ring signature scheme is more suitable for the Internet of Vehicles environment and has unconditional anonymity and unforgeability.

Description

technical field [0001] The invention relates to the technical field of vehicle networking security, in particular to a privacy protection-based trusted LBS service protocol implementation method. Background technique [0002] Vehicle Networking (VANET) is one of the symbols of smart cities and has a very broad development prospect. It is a large-scale interactive network composed of information such as vehicle location, speed and route. [0003] The car networking system is mainly composed of on-board unit (OBU), roadside unit (RSU), traffic authority center (TA) and LBS server. The key generation center (PKG) is deployed in TA: [0004] On-board unit (OBU): The on-board unit is a smart device installed in each vehicle, and is an indispensable basic configuration in the Internet of Vehicles. The vehicle-mounted unit periodically sends beacon information to surrounding vehicles, which greatly improves road traffic safety. [0005] Roadside Unit (RSU): A roadside unit is a b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L63/0421H04L9/3255H04L63/08H04L67/12H04L67/52
Inventor 曹利张俐邵长虹张淼曹可心
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products