A method, protection system, and storage medium for protecting identity privacy in the Internet of Vehicles

A car networking and identity technology, applied in the field of car networking, can solve problems such as exposure of user identity, theft verification attack, system security impact, etc., to solve risks and excessive calculation volume, reduce the risk of leakage, and reduce the workload of encryption Effect

Active Publication Date: 2022-05-27
CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to achieve conditional privacy protection, some schemes adopt the pseudonym pool scheme, that is, a number of pseudonyms are generated by the trust organization in the initialization stage and stored in the vehicle OBU (On board Unit). However, because the number of pseudonyms is limited, the reuse of this scheme is not high. , after the pseudonym is used several times, it will still become a fixed value, which will expose the user's identity
Most of the existing solutions are based on the premise of absolute security of the OBU. The system security parameters are stored in the OBU, and the OBU can infinitely generate irrelevant pseudonyms. The operator can generate legal pseudonyms indefinitely, and can pretend to be any legal entity, then the security of the entire system will be affected
In addition, there are also plans to save all vehicle data mapping pairs in the network in the RSU, but a single RSU may be damaged, or suffer from a theft verification attack, leaking the data stored in it, and the security of the entire system will also be threatened
Therefore, although the existing framework can solve some security issues in the vehicle network, it still has its limitations in security issues, such as low reusability or security issues caused by saving the same parameters in different entities, etc., so there is still a need for a A more secure and feasible conditional identity privacy protection scheme for Internet of Vehicles

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, protection system, and storage medium for protecting identity privacy in the Internet of Vehicles
  • A method, protection system, and storage medium for protecting identity privacy in the Internet of Vehicles
  • A method, protection system, and storage medium for protecting identity privacy in the Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033]The following describes in detail the embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are exemplary and are only used to explain the present invention, and should not be construed as a limitation of the present invention.

[0034] In the existing framework, the solutions are based on the assumption that the vehicle OBU is absolutely safe. If an OBU is breached, the security of the entire system will be threatened. In addition, there is also a scheme to store all vehicle data mapping pairs in the network in the RSU, but a single RSU may be attacked by theft verifier and leak the data stored in it, then the attacker can forge any vehicle.

[0035] In view of the above problems, in order to prevent a si...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a protection system and a storage medium for protecting identity privacy of the Internet of Vehicles. The present invention splits different root secrets representing different user identities into several sub-secrets by means of secret sharing, and distributes the sub-secrets to multiple RSUs for storage. Since a threshold value of sub-secrets is required to restore the root secret, when an RSU Data loss cannot restore the user's root secret, so it will not expose the privacy of the user's identity; this method also uses the temporary identity value to realize the association of data in different RSUs, and the ciphertext is encrypted through the attribute-based encryption method. In a decentralized scenario Realize dynamic update, reduce the risk of RSU leakage, improve security, and attribute-based encryption can realize the one-to-N encryption and decryption mode that cannot be realized by traditional encryption schemes, reducing the encryption workload of the encryptor. This method improves on the traditional central tracking scheme, realizes the cooperative tracking of multiple RSUs, and also solves the problem of excessive concentration of risks and calculations.

Description

technical field [0001] The invention relates to the technical field of the Internet of Vehicles, in particular to a method for protecting identity privacy of the Internet of Vehicles, a protection system and a storage medium. Background technique [0002] In recent years, with the improvement of people's living standards, the number of private vehicles has increased exponentially. The ever-increasing number of vehicles has caused traffic congestion and frequent traffic accidents, which has caused great trouble to people's daily travel. The Internet of Vehicles (IoV) is developed from the Internet of Things (IoT), in which different entities can communicate data to each other by listening to each other's broadcast information. Vehicles in the network will periodically broadcast traffic status, such as speed, traffic accident, brake light warning, lane change warning, emergency light warning, location and other information. By analyzing the received traffic status informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/10H04W12/00H04W12/122H04W4/44H04L9/32
CPCH04W12/02H04W12/10H04W12/009H04W12/122H04W4/44H04L9/3247H04L2209/80H04L2209/84
Inventor 夏卓群曾令轩谷科
Owner CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products