Internet of vehicles identity privacy protection method and system and storage medium

A technology of Internet of Vehicles and identity, applied in the field of Internet of Vehicles, can solve problems such as exposure of user identities, theft verification attacks, system security impacts, etc., to solve risks and excessively concentrated calculations, reduce the risk of leakage, and reduce the workload of encryption Effect

Active Publication Date: 2021-10-26
CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to achieve conditional privacy protection, some schemes adopt the pseudonym pool scheme, that is, a number of pseudonyms are generated by the trust organization in the initialization stage and stored in the vehicle OBU (On board Unit). However, because the number of pseudonyms is limited, the reuse of this scheme is not high. , after the pseudonym is used several times, it will still become a fixed value, which will expose the user's identity
Most of the existing solutions are based on the premise of absolute security of the OBU. The system security parameters are stored in the OBU, and the OBU can infinitely generate irrelevant pseudonyms. The operator can generate legal pseudonyms indefinitely, and can pretend to be any legal entity, then the security of the entire system will be affected
In addition, there are also plans to save all vehicle data mapping pairs in the network in the RSU, but a single RSU may be damaged, or suffer from a theft verification attack, leaking the data stored in it, and the security of the entire system will also be threatened
Therefore, although the existing framework can solve some security issues in the vehicle network, it still has its limitations in security issues, such as low reusability or security issues caused by saving the same parameters in different entities, etc., so there is still a need for a A more secure and feasible conditional identity privacy protection scheme for Internet of Vehicles

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of vehicles identity privacy protection method and system and storage medium
  • Internet of vehicles identity privacy protection method and system and storage medium
  • Internet of vehicles identity privacy protection method and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033]Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0034] In the existing framework, the solutions are all based on the assumption that the vehicle-mounted OBU is absolutely safe. If an OBU is compromised, the security of the entire system will be threatened. In addition, there are also proposals to save all vehicle data mapping pairs in the network in the RSU, but a single RSU may be attacked by a theft verifier and leak the data stored in it, then the attacker can forge any vehicle.

[0035] In response to the above problems, in order to prevent a single entity from being damaged and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Vehicles identity privacy protection method and system and a storage medium. According to the method, different root secrets representing different user identities are split into a plurality of sub-secrets in a secret sharing mode, and the sub-secrets are stored in a plurality of RSUs. Due to the fact thatthreshold value sub-secrets are needed for recovering the root secrets, when data of a certain RSU is lost, the user root secrets cannot be recovered, and therefore the user identity privacy cannot be exposed. According to the method, association of data in different RSUs is achieved through temporary identity constant values, the ciphertext is encrypted through an attribute-based encryption method, dynamic updating is achieved in a decentralization scene, the risk of RSU leakage is reduced, safety is improved, the attribute-based encryption can achieve a one-to-N encryption and decryption mode which cannot be achieved through a traditional encryption scheme, and the encryption workload of an encryptor is reduced. The method is improved on the basis of a traditional center tracking scheme, cooperative tracking of multiple RSUs is achieved, and the problem that risks and calculated amount are too concentrated is solved.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Vehicles, in particular to a method, a protection system and a storage medium for protecting identity privacy of the Internet of Vehicles. Background technique [0002] In recent years, with the improvement of people's living standards, the number of private vehicles has increased exponentially. The ever-increasing number of vehicles has caused traffic congestion and frequent traffic accidents, which have caused great troubles to people's daily travel. The Internet of Vehicles (IoV) is developed from the Internet of Things (IoT). In the Internet of Vehicles, different entities can transmit data to each other by listening to each other's broadcast information. Vehicles in the network will periodically broadcast traffic status, such as speed, traffic accidents, brake light warnings, lane change warnings, emergency light warnings, location and other information. Entities make scient...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/10H04W12/00H04W12/122H04W4/44H04L9/32
CPCH04W12/02H04W12/10H04W12/009H04W12/122H04W4/44H04L9/3247H04L2209/80H04L2209/84
Inventor 夏卓群曾令轩谷科
Owner CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products