Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for credible authentication between modules in intelligent networked vehicle

An authentication method and inter-module technology, applied in transmission systems, digital transmission systems, secure communication devices, etc.

Active Publication Date: 2021-01-05
ANHUI UNIVERSITY
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Purpose of the invention: The purpose of the invention is to solve the problem of internal security communication of existing intelligent networked vehicles, provide a method for realizing inter-module authentication and fast message authentication, combine module authentication and message authentication, and propose based on trusted computing technology The authentication method in intelligent networked vehicles is to build a trusted execution environment based on the TPM in trusted computing, so as to realize the security and credibility of the module, and realize the rapid authentication of the message on this basis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for credible authentication between modules in intelligent networked vehicle
  • Method and system for credible authentication between modules in intelligent networked vehicle
  • Method and system for credible authentication between modules in intelligent networked vehicle

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0108] In this embodiment, related experiments are carried out in the linux system, wherein the calculation related to the trusted platform module TPM is implemented in Intel SGX (Software Guard Extensions). Figure 5 Indicates the time when TA issues certificates and in-vehicle module verification certificates. exist Figure 6 In this example, the time overhead of related PBA signatures is shown. The message authentication time for messages of different lengths from 1KB to 2MB is as follows: Figure 7 shown.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted computing-based method for security authentication between internal modules of an intelligent networked vehicle. The method comprises the processes of system initialization, certificate generation and verification, mutual authentication and key agreement between the modules, rapid message authentication, variable node module revocation and the like. According to the invention, a trusted computing technology is used for guaranteeing the security and credibility of the modules, remote certification is used for verifying the security states of the modules, and efficient message authentication is adopted. According to an intelligent networked vehicle communication model in the invention, module authentication and rapid message authentication can be realized. Whether the modules are in a safe state or not only needs to be verified periodically, and rapid message authentication of the modules can meet the requirement for verification of a large amount of real-time data in the intelligent networked vehicle.

Description

technical field [0001] The invention belongs to the communication security technology of intelligent networked vehicles, and in particular relates to a trusted authentication method and system between modules in intelligent networked vehicles. Background technique [0002] With the development of computer control technology, intelligent networked vehicles have gradually become a research hotspot. Intelligent networked vehicles mainly rely on the computer system in the car to realize unmanned driving. Intelligent networked vehicles mainly include three parts: data perception, data processing and control execution. Various sensors equipped in the vehicle are responsible for collecting real-time data, and the vehicle computing and communication unit (VCU) is responsible for processing the data received from the sensors, making timely decisions and finally sending them to the actuators. The actuator is responsible for receiving instructions collected from the VCU to implement ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L9/0841H04L9/0897H04L9/3234H04L9/3263H04L9/3242H04L63/0869H04L67/12
Inventor 仲红操文文杨明崔杰张庆阳张静许艳
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products