Method and system for credible authentication between modules in intelligent networked vehicle
An authentication method and inter-module technology, applied in transmission systems, digital transmission systems, secure communication devices, etc.
Active Publication Date: 2021-01-05
ANHUI UNIVERSITY
View PDF9 Cites 1 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
[0005] Purpose of the invention: The purpose of the invention is to solve the problem of internal security communication of existing intelligent networked vehicles, provide a method for realizing inter-module authentication and fast message authentication, combine module authentication and message authentication, and propose based on trusted computing technology The authentication method in intelligent networked vehicles is to build a trusted execution environment based on the TPM in trusted computing, so as to realize the security and credibility of the module, and realize the rapid authentication of the message on this basis
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Embodiment
[0108] In this embodiment, related experiments are carried out in the linux system, wherein the calculation related to the trusted platform module TPM is implemented in Intel SGX (Software Guard Extensions). Figure 5 Indicates the time when TA issues certificates and in-vehicle module verification certificates. exist Figure 6 In this example, the time overhead of related PBA signatures is shown. The message authentication time for messages of different lengths from 1KB to 2MB is as follows: Figure 7 shown.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM
Login to view more
Abstract
The invention discloses a trusted computing-based method for security authentication between internal modules of an intelligent networked vehicle. The method comprises the processes of system initialization, certificate generation and verification, mutual authentication and key agreement between the modules, rapid message authentication, variable node module revocation and the like. According to the invention, a trusted computing technology is used for guaranteeing the security and credibility of the modules, remote certification is used for verifying the security states of the modules, and efficient message authentication is adopted. According to an intelligent networked vehicle communication model in the invention, module authentication and rapid message authentication can be realized. Whether the modules are in a safe state or not only needs to be verified periodically, and rapid message authentication of the modules can meet the requirement for verification of a large amount of real-time data in the intelligent networked vehicle.
Description
technical field [0001] The invention belongs to the communication security technology of intelligent networked vehicles, and in particular relates to a trusted authentication method and system between modules in intelligent networked vehicles. Background technique [0002] With the development of computer control technology, intelligent networked vehicles have gradually become a research hotspot. Intelligent networked vehicles mainly rely on the computer system in the car to realize unmanned driving. Intelligent networked vehicles mainly include three parts: data perception, data processing and control execution. Various sensors equipped in the vehicle are responsible for collecting real-time data, and the vehicle computing and communication unit (VCU) is responsible for processing the data received from the sensors, making timely decisions and finally sending them to the actuators. The actuator is responsible for receiving instructions collected from the VCU to implement ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Application Information
Patent Timeline
Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L9/0841H04L9/0897H04L9/3234H04L9/3263H04L9/3242H04L63/0869H04L67/12
Inventor 仲红操文文杨明崔杰张庆阳张静许艳
Owner ANHUI UNIVERSITY
Who we serve
- R&D Engineer
- R&D Manager
- IP Professional
Why Eureka
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Social media
Try Eureka
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap