CN105812132A - Group password negotiation method based on Vehicle to X (V2X) network - Google Patents

Group password negotiation method based on Vehicle to X (V2X) network Download PDF

Info

Publication number
CN105812132A
CN105812132A CN201410840776.4A CN201410840776A CN105812132A CN 105812132 A CN105812132 A CN 105812132A CN 201410840776 A CN201410840776 A CN 201410840776A CN 105812132 A CN105812132 A CN 105812132A
Authority
CN
China
Prior art keywords
node
vehicle
negotiation
message
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410840776.4A
Other languages
Chinese (zh)
Other versions
CN105812132B (en
Inventor
王成金
陈山枝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gohigh Data Networks Technology Co ltd
Datang Gaohong information communication (Yiwu) Co.,Ltd.
Datang Gaohong Zhilian Technology Chongqing Co ltd
China Academy of Telecommunications Technology CATT
Original Assignee
BEIJING DATANG GAOHONG DATA NETWORK TECHNOLOGY Co Ltd
Zhejiang Gaohong Electronic Technology Co Ltd
China Academy of Telecommunications Technology CATT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING DATANG GAOHONG DATA NETWORK TECHNOLOGY Co Ltd, Zhejiang Gaohong Electronic Technology Co Ltd, China Academy of Telecommunications Technology CATT filed Critical BEIJING DATANG GAOHONG DATA NETWORK TECHNOLOGY Co Ltd
Priority to CN201410840776.4A priority Critical patent/CN105812132B/en
Publication of CN105812132A publication Critical patent/CN105812132A/en
Application granted granted Critical
Publication of CN105812132B publication Critical patent/CN105812132B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a group password negotiation method based on a Vehicle to X (V2X) network. The method comprises: an initiating node broadcasts a negotiation operating message comprising a group communication queue to surrounding nodes agreeing to join a group, vehicle nodes sequentially generate and broadcast negotiation password messages according to the sequence of unique identifiers of the surrounding nodes in the group communication queue, the initiating node generates and broadcasts a final negotiation password message after receiving the negotiation password message of the last vehicle node, and the surrounding nodes generate group passwords using the final negotiation password message, thereby realizing secret communication with the vehicle nodes in the group. By using the characteristics of the V2X network, the method realizes a group password negotiation process among the vehicle nodes and ensures secure communication among the vehicle nodes.

Description

Group cipher machinery of consultation based on vehicle-mounted short haul connection net
Technical field
The present invention relates to a kind of group cipher machinery of consultation based on vehicle-mounted short haul connection net, belong to vehicle-carrying communication network technology field.
Background technology
Vehicle-mounted short haul connection (VehicletoX:V2X) network is (CAN-ControllerAreaNetwork), bus or train route (Vehicle-2-RSU) in the car by short-range communication technique realizations such as radio communication, GPS/GIS, sensings, workshop (Vehicle-2-Vehicle), the outer communication between (vehicle-2-Infrastructure), people's car (Vehicle-2-Person) of car.
V2X, as a kind of mobile radio network being core node with the vehicle in constantly moving, has the fast-changing feature of topological structure, and especially the opening of its communication media causes that channel safety is poor, compares legacy network and is more subject to attack.Simultaneously as V2X is the core of following intelligent transportation system (ITS), relating to the high-security applications such as safety and automatic Pilot, relatively conventional network, the loss that its safety brings can be bigger, and therefore, safety is had higher requirement by V2X.
Group key agreement method is to be generated a shared group key by joint consultation in many ways, and any participant is unable to pre-determine the value of group key.Characteristic by means of V2X network, as all vehicles are in equal standing, vehicle-mounted node periodic broadcasting heartbeat message etc., application group cryptographic key negotiation method in V2X network, both vehicle advantage quantitatively can have been played, again can secure communication between support vehicles, improve the safety of V2X network.
Summary of the invention
In view of the foregoing, it is an object of the invention to provide a kind of group cipher machinery of consultation based on vehicle-mounted short haul connection net, the method is the characteristic utilizing V2X network, it is achieved the group cipher negotiations process between vehicle-mounted node, it is ensured that the secure communication between vehicle-mounted node.
For achieving the above object, the present invention is by the following technical solutions:
A kind of group cipher machinery of consultation based on vehicle-mounted short haul connection net, comprises the following steps:
S1: initiate node node towards periphery and send the request message consulting group key;
S2: surroundings nodes receives this request message, sends, to initiating node, the response message adhereed to;
S3: initiation node sets up group communication queue after receiving this response message, this group communication queue includes unique mark of surroundings nodes and the marker bit of correspondence;
S4: initiate node node broadcasts negotiation message towards periphery, this negotiation message includes the information such as unique mark of group communication queue, initiation node;
S5: after surroundings nodes receives this negotiation message, is stored in this locality by the group communication queuing message in message;
S6: according to the uniquely identified order of surroundings nodes in group communication queue, after first vehicle-mounted node receives this negotiation message, utilize random function to generate secret exponent x1, and generate negotiation code message [ID1, Z1, Y1], wherein,Then code message is consulted to node broadcasts about by what generate;
S7: after receiving the negotiation code message of first vehicle-mounted node, node around first vehicle-mounted node, updates group communication queue, is updated to by the marker bit of first vehicle-mounted node and sends, meanwhile, initiate node and preserve the negotiation code message that first vehicle-mounted node sends;
S8: the vehicle-mounted node of i-th receives the negotiation code message [ID of the i-th-1 vehicle-mounted nodei-1, Zi-1, Yi-1] after, utilize random function to generate secret exponent xi, and generate negotiation code message [IDi, Zi, Yi], wherein,
Z i = ( Z i - 1 ) x i = ( g Π k = 1 i - 1 x k ) x i = g Π k = 1 i x k
Y i = ∪ k = 1 , . . . , i - 1 { Z i - 1 x i / x k } ∪ { Z i - 1 } = ∪ k = 1 , . . . , i { Z i - 1 x i / x k } = ∪ k = 1 , . . . , i { Z i 1 / x k }
And the negotiation code message [ID that will generatei, Zi, Yi] to node broadcasts about;
S9: after receiving the negotiation code message of the vehicle-mounted node of i-th, the surroundings nodes of the vehicle-mounted node of i-th updates group communication queue, meanwhile, initiates node and preserves the negotiation code message that the vehicle-mounted node of i-th sends;
S10: initiate node and receive in group communication queue after the negotiation code message of last vehicle-mounted node transmission, initiation node stochastic generation secret exponent xN, and generate YN、ZN, wherein,
Z N = ( Z N - 1 ) x N = ( g Π k = 1 N - 1 x k ) x N = g Π k = 1 N x k
Y N = ∪ k = 1 , . . . , N - 1 { Z N - 1 x N / x k } ∪ { Z N } = ∪ k = 1 , . . . , N { Z N - 1 x N / x k } = ∪ k = 1 , . . . , N { Z N 1 / x k }
Then, initiate node node towards periphery and send final negotiation code message [IDF, YN], wherein, IDF is uniquely identified, by surroundings nodes, the index queue formed;
S11: surroundings nodes receives negotiation code message [IDF, the Y that this is finalN] after, it is thus achieved that the group cipher after negotiation K = g x 1 x 2 . . . x N .
Further,
Surroundings nodes sends interval time by one, updates the group communication queue that this locality preserves.
Arrive described transmission interval time time, according to the marker bit of the i-th-1 vehicle-mounted node in group communication queue, the vehicle-mounted node of i-th judges that the i-th-1 vehicle-mounted node is not as sending state, the vehicle-mounted node of i-th utilizes the negotiation code message of the i-th-2 vehicle-mounted nodes, generate and consult code message, and the negotiation code message of generation is broadcasted.
Arrive described transmission interval time time, judge that the i-th-1 vehicle-mounted node is not as sending state according to the marker bit in group communication queue, the information of this i-th-1 vehicle-mounted node is deleted by surroundings nodes from the group communication queue that this locality preserves.
When having new vehicle-mounted node to add group, perform following steps:
S21: initiate node to being newly added vehicle-mounted node and send the request message consulting group key;
S22: be newly added vehicle-mounted node to initiating node and send the response message adhereed to;
S23: this negotiation code message is sent to and is newly added vehicle-mounted node after receiving the negotiation code message that in group communication queue, last vehicle-mounted node sends by initiation node, is newly added vehicle-mounted node and utilizes random function to generate secret exponent xN, and generate negotiation code message [IDN, ZN, YN], wherein,
Z N = ( Z N - 1 ) x N = ( g Π k = 1 N - 1 x k ) x N = g Π k = 1 N x k
Y N = ∪ k = 1 , . . . , N - 1 { Z N - 1 x N / x k } ∪ { Z N - 1 } = ∪ k = 1 , . . . , N { Z N - 1 x N / x k } = ∪ k = 1 , . . . , N { Z N 1 / x k }
Then the negotiation code message [ID that will generateN, ZN, YN] to node broadcasts about;
S24: initiate node and receive negotiation code message [IDN, ZN, YN] after, utilize random function to generate secret exponent xN+1, and generate YN+1、ZN+1, wherein,
Z N + 1 = ( Z N ) x N + 1 = ( g Π k = 1 N x k ) x N + 1 = g Π k = 1 N + 1 x k
Y N + 1 = ∪ k = 1 , . . . , N { Z N x N + 1 / x k } ∪ { Z N + 1 } = ∪ k = 1 , . . . , N + 1 { Z N x N + 1 / x k } = ∪ k = 1 , . . . , N + 1 { Z N + 1 1 / x k }
Then, initiate node node towards periphery and be newly added negotiation code message [IDF`, the Y that the transmission of vehicle-mounted node is finalN+1], wherein, IDF` be by surroundings nodes and be newly added vehicle-mounted node uniquely identify the index queue formed;
S25: surroundings nodes and be newly added vehicle-mounted node and receive final negotiation code message [IDF`, YN+1] after, it is thus achieved that the group cipher after negotiation
When having vehicle-mounted node to exit group, perform following steps:
S31: initiate, the negotiation code message of each surroundings nodes that node preserves from this locality, to delete the negotiation code message exiting vehicle-mounted node, then utilize random function to generate secret exponent xN, and generate YN、ZN, wherein,
Z N = ( Z N - 1 ) x N = ( g Π k = 1 N - 1 x k ) x N = g Π k = 1 N x k
Y N = ∪ k = 1 , . . . , m - 1 , m + 1 , . . . N - 1 { Z N - 1 x N / x k } ∪ { Z N } = ∪ k = 1 , . . . , m - 1 , m + 1 , . . . N - 1 { Z N - 1 x N / x k } = ∪ k = 1 , . . . , m - 1 , m + 1 , . . . N - 1 { Z N 1 / x k }
Afterwards, initiate node and send final negotiation code message [IDF``, Y to all surroundings nodes except exiting vehicle-mounted nodeN], wherein, IDF`` is uniquely identified, by surroundings nodes all except exiting vehicle-mounted node, the index queue IDF`` formed;
S32: the surroundings nodes except exiting vehicle-mounted node receives final negotiation code message [IDF``, YN] after, it is thus achieved that the group cipher after final negotiationWherein, exiting vehicle-mounted node is the vehicle-mounted node of m-th.
It is an advantage of the current invention that:
The group cipher machinery of consultation based on vehicle-mounted short haul connection net of the present invention, utilize the characteristic of V2X network, as vehicle-mounted node periodic broadcasting heartbeat message, all vehicles are on an equal footing, achieve in V2X network the group cipher negotiations process between vehicle-mounted node in communication range, ensure that the secure communication between vehicle-mounted node, improve the safety of V2X network.
Accompanying drawing explanation
Fig. 1 is the method flow diagram of the present invention.
Detailed description of the invention
Below in conjunction with drawings and Examples, the present invention is further detailed explanation.
In V2X network, the regular node broadcasts towards periphery of each node comprises the heartbeat message of the oneself state information such as geographical position, state, unique mark, travel direction, each node receives the heartbeat message that surroundings nodes sends simultaneously, know the situation of surroundings nodes according to the heartbeat message received, realize communicating with surroundings nodes.By means of the heartbeat message of periodic broadcasting between each node, can realize that the vehicle-mounted node in communication range is formed group, initiate group cipher negotiation, monitor group negotiation message transmission situation and group's maintenance etc., and then complete group cipher negotiations process, it is ensured that secure communication between vehicle-mounted node in group.
Fig. 1 is the method flow diagram of the present invention.As it can be seen, the group cipher machinery of consultation based on vehicle-mounted short haul connection net disclosed by the invention, comprise the following steps:
1, initiate node node towards periphery and send the request message consulting group key, this request message includes initiating the information such as unique mark (ID) of node, the sequence number (initiate node send the serial number of request message to identify different initiation requests, calculating of again making zero when this sequence number is more than certain value for recording) of request message and request flag position (flag bit for mark request message);
2, surroundings nodes receives this request message, if adhereing to group, then to initiating node transmission response message, this response message includes the information such as the sequence number of request message, response flag bit;
3, after initiating the response message adhereing to group that node receives surroundings nodes reply, setting up group communication queue, this group communication queue includes unique mark of each surroundings nodes and the marker bit (for whether flag node has sent negotiation message) of correspondence;
4, when arriving the access request threshold time of default, initiating node node broadcasts negotiation message towards periphery, this negotiation message includes group communication queue, initiates unique mark of node, asks the sequence number of message, consults the information such as flag bit (for indicating the flag bit of negotiation message);
5, after each node in group receives negotiation message, the group communication queuing message in this message is stored in this locality;
6, according to the uniquely identified order of surroundings nodes in group communication queue, as first vehicle-mounted node (ID1) receive this negotiation message after, utilize random function generate secret exponent x1, generate on this basis and consult code message [ID1, Z1, Y1], and by this negotiation code message to node broadcasts about;Wherein,G is a primitive element on a mould p;
7, after receiving the negotiation code message of first vehicle-mounted node, node around first vehicle-mounted node, update the group communication queue that this locality preserves, specifically, it is revised as sends group communication queue uniquely identifies with first vehicle-mounted node corresponding marker bit, it was shown that in group, first vehicle-mounted node has been successfully transmitted negotiation code message;Meanwhile, initiate node and the negotiation code message that first vehicle-mounted node sends is stored in this locality;
8, the vehicle-mounted node of i-th is receiving the negotiation code message [ID of the i-th-1 vehicle-mounted nodei-1, Zi-1, Yi-1] after, utilize random function to generate secret exponent xi, generate on this basis and consult code message [IDi, Zi, Yi], wherein,
Z i = ( Z i - 1 ) x i = ( g Π k = 1 i - 1 x k ) x i = g Π k = 1 i x k - - - ( 1 )
Y i = ∪ k = 1 , . . . , i - 1 { Z i - 1 x i / x k } ∪ { Z i - 1 } = ∪ k = 1 , . . . , i { Z i - 1 x i / x k } = ∪ k = 1 , . . . , i { Z i 1 / x k } - - - ( 2 )
And the negotiation code message [ID that will generatei, Zi, Yi] to node broadcasts about;
9, after receiving the negotiation code message of the vehicle-mounted node of i-th, the surroundings nodes of the vehicle-mounted node of i-th updates the group communication queue that this locality preserves, namely, it is revised as sends group communication queue uniquely identifies with the vehicle-mounted node of i-th corresponding marker bit, it was shown that in group, the vehicle-mounted node of i-th has been successfully transmitted negotiation code message;Meanwhile, initiate node and the negotiation code message that vehicle-mounted for i-th node sends is stored in this locality;
10, after initiation node receives the negotiation code message that last vehicle-mounted node in group communication queue (N-1 vehicle-mounted node) sends, node stochastic generation secret exponent x is initiatedN, and utilize this secret exponent xNGenerate YN、ZN, wherein,
Z N = ( Z N - 1 ) x N = ( g Π k = 1 N - 1 x k ) x N = g Π k = 1 N x k - - - ( 3 )
Y N = ∪ k = 1 , . . . , N - 1 { Z N - 1 x N / x k } ∪ { Z N } = ∪ k = 1 , . . . , N { Z N - 1 x N / x k } = ∪ k = 1 , . . . , N { Z N 1 / x k } - - - ( 4 )
Then, initiating node and send, to the oriented initiation node of institute, the surroundings nodes (N-1 in group vehicle-mounted node) consulting code message and send final negotiation code message, what this was final consult code message includes the Y of generationN, and uniquely identify, by N-1 vehicle-mounted node, the index queue IDF formed, i.e. initiation node is to final negotiation code message [IDF, the Y of the individual vehicle-mounted node broadcasts of N-1 aboutN];
11, N-1 vehicle-mounted node receives final negotiation code message [IDF, the Y initiating node broadcastsN] after, the group cipher after final negotiation can be obtained
Considering that in V2X network, vehicle is in the state being continually changing, in fact it could happen that because of the reason such as network delay or link failure, code message is consulted in the unsuccessful transmission of certain vehicle-mounted node or the situations such as packet loss occurs in the negotiation code message of transmission;For solving this problem, set one and send interval time, by the group communication queue that vehicle-mounted node this locality preserves, it may be judged whether there is vehicle-mounted node there is a problem;Specifically, when arriving the transmission interval time set, the vehicle-mounted node of i-th reads in the group communication queue of its preservation the i-th-1 vehicle-mounted node and uniquely identifies and the marker bit of correspondence, find but without the negotiation code message receiving the i-th-1 vehicle-mounted node, now, the vehicle-mounted node of i-th is no longer waiting for, and directly utilizes the negotiation code message of the i-th-2 received vehicle-mounted nodes, generate the negotiation code message of self, then the negotiation code message of generation is broadcasted;Meanwhile, each vehicle-mounted node is by group communication queue and sends interval time, updates the group communication queue that this locality preserves, the relevant information of the i-th-1 vehicle-mounted node is deleted from group communication queue.
When the vehicle change in group, e.g., there is new vehicle-mounted node to add group, or when vehicle-mounted node rolls the communication range of group away from, process in accordance with the following methods:
When there being new vehicle-mounted node request to add group:
21, after initiation node is perceived by heartbeat message and around has new vehicle-mounted node, it is newly added vehicle-mounted node to this and sends the request message consulting group key;
22, it is newly added vehicle-mounted node and adheres to group, send, to initiating node, the response message adhereed to;
23, after initiating the negotiation code message that node receives the individual vehicle-mounted node transmission of N-1 in group communication queue, this negotiation code message is sent to and is newly added vehicle-mounted node (now, it is newly added vehicle-mounted node and is designated as node N, initiate node and be designated as node N+1), it is newly added vehicle-mounted node and utilizes random function to generate secret exponent xN, generate on this basis and consult code message [IDN, ZN, YN], wherein,
Z N = ( Z N - 1 ) x N = ( g Π k = 1 N - 1 x k ) x N = g Π k = 1 N x k - - - ( 5 )
Y N = ∪ k = 1 , . . . , N - 1 { Z N - 1 x N / x k } ∪ { Z N - 1 } = ∪ k = 1 , . . . , N { Z N - 1 x N / x k } = ∪ k = 1 , . . . , N { Z N 1 / x k } - - - ( 6 )
And the negotiation code message [ID that will generateN, ZN, YN] to node broadcasts about;
24, after initiation node receives and is newly added the negotiation code message that vehicle-mounted node sends, random function is utilized to generate secret exponent xN+1, and utilize this secret exponent xN+1Generate YN+1、ZN+1, wherein,
Z N + 1 = ( Z N ) x N + 1 = ( g Π k = 1 N x k ) x N + 1 = g Π k = 1 N + 1 x k - - - ( 7 )
Y N + 1 = ∪ k = 1 , . . . , N { Z N x N + 1 / x k } ∪ { Z N + 1 } = ∪ k = 1 , . . . , N + 1 { Z N x N + 1 / x k } = ∪ k = 1 , . . . , N + 1 { Z N + 1 1 / x k } - - - ( 8 )
Then, initiating node and send, to the oriented initiation node of institute, the surroundings nodes (N-1 in group vehicle-mounted node and be newly added vehicle-mounted node N) consulting code message and send final negotiation code message, what this was final consult code message includes the Y of generationN+1, and uniquely identified, by N number of vehicle-mounted node, the index queue IDF` formed, i.e. initiate node to final negotiation code message [IDF`, the Y of N number of vehicle-mounted node broadcasts aboutN+1];
25, N number of vehicle-mounted node receives final negotiation code message [IDF`, the Y initiating node broadcastsN+1] after, the group cipher after final negotiation can be obtainedIt is newly added the vehicle-mounted node that vehicle-mounted node may utilize in this group cipher and group to securely communicate.
When there being vehicle-mounted node to exit group (vehicle-mounted node rolls group communication scope away from, initiation node forbids that some node participates in group communication etc.), it is assumed that the vehicle-mounted node of m-th exits group, then process in accordance with the following methods:
31, initiate, the negotiation code message of each vehicle-mounted node that node preserves from this locality, to delete the negotiation code message of the vehicle-mounted node of m-th, then utilize random function to generate secret exponent xN, and utilize this secret exponent xNGenerate YN、ZN, wherein,
Z N = ( Z N - 1 ) x N = ( g Π k = 1 N - 1 x k ) x N = g Π k = 1 N x k - - - ( 9 )
Y N = ∪ k = 1 , . . . , m - 1 , m + 1 , . . . N - 1 { Z N - 1 x N / x k } ∪ { Z N } = ∪ k = 1 , . . . , m - 1 , m + 1 , . . . N - 1 { Z N - 1 x N / x k } = ∪ k = 1 , . . . , m - 1 , m + 1 , . . . N - 1 { Z N 1 / x k } - - - ( 10 )
Then, initiate node to send, to the oriented initiation node of institute except vehicle-mounted node m, the surroundings nodes (N-2 in group individual vehicle-mounted node) consulting code message and send final negotiation code message, what this was final consults the YN that code message includes generating, and uniquely identified, by N-2 vehicle-mounted node, the index queue IDF`` formed, namely, initiate node to final negotiation code message [IDF``, the Y of the vehicle-mounted node broadcasts of N-2 aboutN];
32, N-2 vehicle-mounted node receives final negotiation code message [IDF``, the Y initiating node broadcastsN] after, the group cipher after final negotiation can be obtainedVehicle-mounted node m cannot continue other nodes in same group and carry out secret communication.
The group cipher machinery of consultation based on vehicle-mounted short haul connection net of the present invention, it it is the characteristic utilizing V2X network, in network each vehicle be on an equal footing, each vehicle-mounted node periodic broadcasting heartbeat message etc., vehicle-mounted node within certain communication range is formed group, vehicle-mounted node in group sends negotiation code message according to the order of sequence, ultimately generate group cipher, it is achieved that the secret communication of vehicle-mounted node in group, improve the safety of V2X network.
The above is presently preferred embodiments of the present invention and the know-why used thereof; for a person skilled in the art; when without departing substantially from the spirit and scope of the present invention; any based on apparent changes such as the equivalent transformation on technical solution of the present invention basis, simple replacements, belong within scope.

Claims (6)

1. based on the group cipher machinery of consultation of vehicle-mounted short haul connection net, it is characterised in that comprise the following steps:
S1: initiate node node towards periphery and send the request message consulting group key;
S2: surroundings nodes receives this request message, sends, to initiating node, the response message adhereed to;
S3: initiation node sets up group communication queue after receiving this response message, this group communication queue includes unique mark of surroundings nodes and the marker bit of correspondence;
S4: initiate node node broadcasts negotiation message towards periphery, this negotiation message includes the information such as unique mark of group communication queue, initiation node;
S5: after surroundings nodes receives this negotiation message, is stored in this locality by the group communication queuing message in message;
S6: according to the uniquely identified order of surroundings nodes in group communication queue, after first vehicle-mounted node receives this negotiation message, utilize random function to generate secret exponent x1, and generate negotiation code message [ID1, Z1, Y1], wherein,Then code message is consulted to node broadcasts about by what generate;
S7: after receiving the negotiation code message of first vehicle-mounted node, node around first vehicle-mounted node, updates group communication queue, is updated to by the marker bit of first vehicle-mounted node and sends, meanwhile, initiate node and preserve the negotiation code message that first vehicle-mounted node sends;
S8: the vehicle-mounted node of i-th receives the negotiation code message [ID of the i-th-1 vehicle-mounted nodei-1, Zi-1, Yi-1]After, utilize random function to generate secret exponent xi, and generate negotiation code message [IDi, Zi, Yi], wherein,
Z i = ( Z i - 1 ) x i = ( g Π k = 1 i - 1 x k ) x i = g Π k = 1 i x k
Y i = ∪ k = 1 , . . . , i - 1 { Z i - 1 x i / x k } ∪ { Z i - 1 } = ∪ k = 1 , . . . , i { Z i - 1 x i / x k } = ∪ k = 1 , . . . , i { Z i 1 / x k }
And the negotiation code message [ID that will generatei, Zi, Yi] to node broadcasts about;
S9: after receiving the negotiation code message of the vehicle-mounted node of i-th, the surroundings nodes of the vehicle-mounted node of i-th updates group communication queue, meanwhile, initiates node and preserves the negotiation code message that the vehicle-mounted node of i-th sends;
S10: initiate node and receive in group communication queue after the negotiation code message of last vehicle-mounted node transmission, initiation node stochastic generation secret exponent xN, and generate YN、ZN, wherein,
Z N = ( Z N - 1 ) x N = ( g Π k = 1 N - 1 x k ) x N = g Π k = 1 N x k
Y N = ∪ k = 1 , . . . , N - 1 { Z N - 1 x N / x k } ∪ { Z N } = ∪ k = 1 , . . . , N { Z N - 1 x N / x k } = ∪ k = 1 , . . . , N { Z N 1 / x k }
Then, initiate node node towards periphery and send final negotiation code message [IDF, YN], wherein, IDF is uniquely identified, by surroundings nodes, the index queue formed;
S11: surroundings nodes receives negotiation code message [IDF, the Y that this is finalN] after, it is thus achieved that the group cipher after negotiation K = g x 1 x 2 . . . x N .
2. the group cipher machinery of consultation based on vehicle-mounted short haul connection net as claimed in claim 1, it is characterised in that surroundings nodes sends interval time by, updates the group communication queue that this locality preserves.
3. the group cipher machinery of consultation based on vehicle-mounted short haul connection net as claimed in claim 2, it is characterized in that, arrive described transmission interval time time, according to the marker bit of the i-th-1 vehicle-mounted node in group communication queue, the vehicle-mounted node of i-th judges that the i-th-1 vehicle-mounted node is not as sending state, the vehicle-mounted node of i-th utilizes the negotiation code message of the i-th-2 vehicle-mounted nodes, generate and consult code message, and the negotiation code message of generation is broadcasted.
4. the group cipher machinery of consultation based on vehicle-mounted short haul connection net as claimed in claim 3, it is characterized in that, arrive described transmission interval time time, judging that the i-th-1 vehicle-mounted node is not as sending state according to the marker bit in group communication queue, the information of this i-th-1 vehicle-mounted node is deleted by surroundings nodes from the group communication queue that this locality preserves.
5. the group cipher machinery of consultation based on vehicle-mounted short haul connection net as claimed in claim 4, it is characterised in that when having new vehicle-mounted node to add group, perform following steps:
S21: initiate node to being newly added vehicle-mounted node and send the request message consulting group key;
S22: be newly added vehicle-mounted node to initiating node and send the response message adhereed to;
S23: this negotiation code message is sent to and is newly added vehicle-mounted node after receiving the negotiation code message that in group communication queue, last vehicle-mounted node sends by initiation node, is newly added vehicle-mounted node and utilizes random function to generate secret exponent xN, and generate negotiation code message [IDN, ZN, YN], wherein,
Z N = ( Z N - 1 ) x N = ( g Π k = 1 N - 1 x k ) x N = g Π k = 1 N x k
Y N = ∪ k = 1 , . . . , N - 1 { Z N - 1 x N / x k } ∪ { Z N - 1 } = ∪ k = 1 , . . . , N { Z N - 1 x N / x k } = ∪ k = 1 , . . . , N { Z N 1 / x k }
Then the negotiation code message [ID that will generateN, ZN, YN] to node broadcasts about;
S24: initiate node and receive negotiation code message [IDN, ZN, YN] after, utilize random function to generate secret exponent xN+1, and generate YN+1、ZN+1, wherein,
Z N + 1 = ( Z N ) x N + 1 = ( g Π k = 1 N x k ) x N + 1 = g Π k = 1 N + 1 x k
Y N + 1 = ∪ k = 1 , . . . , N { Z N x N + 1 / x k } ∪ { Z N + 1 } = ∪ k = 1 , . . . , N + 1 { Z N x N + 1 / x k } = ∪ k = 1 , . . . , N + 1 { Z N + 1 1 / x k }
Then, initiate node node towards periphery and be newly added negotiation code message [IDF ', the Y that the transmission of vehicle-mounted node is finalN+1], wherein, IDF ' for by surroundings nodes and be newly added vehicle-mounted node uniquely identify the index queue formed;
S25: surroundings nodes and be newly added vehicle-mounted node and receive final negotiation code message [IDF ', YN+1] after, it is thus achieved that the group cipher after negotiation
6. the group cipher machinery of consultation based on vehicle-mounted short haul connection net as claimed in claim 4, it is characterised in that when having vehicle-mounted node to exit group, perform following steps:
S31: initiate, the negotiation code message of each surroundings nodes that node preserves from this locality, to delete the negotiation code message exiting vehicle-mounted node, then utilize random function to generate secret exponent xN, and generate YN、ZN, wherein,
Z N = ( Z N - 1 ) x N = ( g Π k = 1 N - 1 x k ) x N = g Π k = 1 N x k
Y N = ∪ k = 1 , . . . , m - 1 , m + 1 , . . . N - 1 { Z N - 1 x N / x k } ∪ { Z N } = ∪ k = 1 , . . . , m - 1 , m + 1 , . . . N { Z N - 1 x N / x k } = ∪ k = 1 , . . . , m - 1 , m + 1 , . . . N - 1 { Z N 1 / x k }
Afterwards, initiate node to all surroundings nodes except exiting vehicle-mounted node send final negotiation code message [IDF ", YN], wherein, IDF " for uniquely being identified, by surroundings nodes all except exiting vehicle-mounted node, the index queue IDF formed ";
S32: the surroundings nodes except exiting vehicle-mounted node receive final negotiation code message [IDF ", YN] after, it is thus achieved that the group cipher after final negotiationWherein, exiting vehicle-mounted node is the vehicle-mounted node of m-th.
CN201410840776.4A 2014-12-30 2014-12-30 Group cipher machinery of consultation based on vehicle-mounted short haul connection net Active CN105812132B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410840776.4A CN105812132B (en) 2014-12-30 2014-12-30 Group cipher machinery of consultation based on vehicle-mounted short haul connection net

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410840776.4A CN105812132B (en) 2014-12-30 2014-12-30 Group cipher machinery of consultation based on vehicle-mounted short haul connection net

Publications (2)

Publication Number Publication Date
CN105812132A true CN105812132A (en) 2016-07-27
CN105812132B CN105812132B (en) 2019-07-26

Family

ID=56980184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410840776.4A Active CN105812132B (en) 2014-12-30 2014-12-30 Group cipher machinery of consultation based on vehicle-mounted short haul connection net

Country Status (1)

Country Link
CN (1) CN105812132B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107274720A (en) * 2017-05-05 2017-10-20 广州汽车集团股份有限公司 A kind of autonomous driving vehicle and many car cooperative control methods, system
CN109005539A (en) * 2018-09-06 2018-12-14 东北大学 Vehicle node location privacy protection method in VANETs based on encryption Mix-Zone
CN109640325A (en) * 2018-12-29 2019-04-16 西安邮电大学 The method for managing security towards fleet based on expandable type contribution group cipher key negotiation
CN111757277A (en) * 2019-03-28 2020-10-09 大众汽车有限公司 Method, apparatus and program for base station of vehicle and mobile communication system
US11457459B2 (en) 2018-01-18 2022-09-27 Huawei Cloud Computing Technologies Co., Ltd. Communication mode selection method and apparatus

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004254120A (en) * 2003-02-20 2004-09-09 Toyota Motor Corp Encryption communication method, mobile terminal and mobile body
CN1848724A (en) * 2005-04-05 2006-10-18 华为技术有限公司 Method for realizing key consultation in mobile self-organizing network
CN101399660A (en) * 2007-09-28 2009-04-01 华为技术有限公司 Method and device for negotiating group cipher
CN101521664A (en) * 2008-10-28 2009-09-02 上海电力学院 Method for establishing agreement group key based on sensor network
CN102364919A (en) * 2011-09-19 2012-02-29 深圳市警豹电子科技有限公司 Grouping method of mobile terminal in automobile service system
CN103402200A (en) * 2013-07-11 2013-11-20 北京邮电大学 Secret key generation method based on wireless channel characteristics in frequency division duplex system
CN103813317A (en) * 2012-11-07 2014-05-21 中国移动通信集团公司 Wireless sensor network group key agreement method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004254120A (en) * 2003-02-20 2004-09-09 Toyota Motor Corp Encryption communication method, mobile terminal and mobile body
CN1848724A (en) * 2005-04-05 2006-10-18 华为技术有限公司 Method for realizing key consultation in mobile self-organizing network
CN101399660A (en) * 2007-09-28 2009-04-01 华为技术有限公司 Method and device for negotiating group cipher
CN101521664A (en) * 2008-10-28 2009-09-02 上海电力学院 Method for establishing agreement group key based on sensor network
CN102364919A (en) * 2011-09-19 2012-02-29 深圳市警豹电子科技有限公司 Grouping method of mobile terminal in automobile service system
CN103813317A (en) * 2012-11-07 2014-05-21 中国移动通信集团公司 Wireless sensor network group key agreement method
CN103402200A (en) * 2013-07-11 2013-11-20 北京邮电大学 Secret key generation method based on wireless channel characteristics in frequency division duplex system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
何聚厚等: "对等组内安全通信密钥协商协议", 《西北工业大学学报》 *
王成金: "推进TD_LTE技术在V2X的应用__提升交通安全和效率", 《现代电信科技》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107274720A (en) * 2017-05-05 2017-10-20 广州汽车集团股份有限公司 A kind of autonomous driving vehicle and many car cooperative control methods, system
US11457459B2 (en) 2018-01-18 2022-09-27 Huawei Cloud Computing Technologies Co., Ltd. Communication mode selection method and apparatus
CN109005539A (en) * 2018-09-06 2018-12-14 东北大学 Vehicle node location privacy protection method in VANETs based on encryption Mix-Zone
CN109005539B (en) * 2018-09-06 2021-12-14 东北大学 Privacy protection method for vehicle node positions in VANETs based on encrypted Mix-Zone
CN109640325A (en) * 2018-12-29 2019-04-16 西安邮电大学 The method for managing security towards fleet based on expandable type contribution group cipher key negotiation
CN109640325B (en) * 2018-12-29 2021-11-30 西安邮电大学 Motorcade-oriented safety management method based on extensible contribution group key negotiation
CN111757277A (en) * 2019-03-28 2020-10-09 大众汽车有限公司 Method, apparatus and program for base station of vehicle and mobile communication system
CN111757277B (en) * 2019-03-28 2022-04-08 大众汽车有限公司 Method, apparatus and program for base station of vehicle and mobile communication system
US11363670B2 (en) 2019-03-28 2022-06-14 Volkswagen Aktiengesellschaft Methods, apparatuses and computer programs for transportation vehicles and for a base station of a mobile communication system

Also Published As

Publication number Publication date
CN105812132B (en) 2019-07-26

Similar Documents

Publication Publication Date Title
CN105812132A (en) Group password negotiation method based on Vehicle to X (V2X) network
US10721670B2 (en) System and method of rebroadcasting messages for reliable vehicular communications
Meneguette et al. SMART: an efficient resource search and management scheme for vehicular cloud-connected system
Lu et al. Anonymity analysis on social spot based pseudonym changing for location privacy in VANETs
CN102916889A (en) Instant route selection based on multi-path communication time and credibility in VANET (Vehicular Ad-Hoc Network)
CN102340434A (en) Multihoming access-based loop avoidance method and edge devices
Math et al. V2X application-reliability analysis of data-rate and message-rate congestion control algorithms
US10079891B2 (en) Clusterhead device that functions as a gateway between vehicular ad-hoc network and cellular network
CN104956763B (en) Method and apparatus for device-to-device communication
CN103858363A (en) Apparatus and method for transmitting and receiving multicast data in wireless communication system
Ahmed et al. Secure resource allocation for LTE-based V2X service
CN106657261A (en) Coalition game and distance prediction based inter-vehicle data transmission method in Internet of Vehicles
CN105812133A (en) Message authentication and group key negotiation method based on vehicle-mounted short distance communication network
CN107580372B (en) Random access method in V2X network
Ali Shah et al. Coverage differentiation based adaptive tx-power for congestion and awareness control in vanets
CN107926071B (en) Method for terminal-to-terminal communication in a cellular mobile radio network and system related thereto
CN103957579B (en) A kind of access selection method of vehicle-mounted heterogeneous network communication
Singh et al. CCAPS: Cooperative context aware privacy scheme for VANETs
Rico Garcia et al. Performance of MAC protocols in beaconing Mobile Ad-hoc Multibroadcast Networks
CN106888487B (en) Link disconnection method and device
Gazdar et al. A cluster based secure architecture for vehicular ad hoc networks
CN108834229B (en) Fuzzy clustering algorithm of vehicle-mounted self-organizing network
Das Improving throughput and energy efficiency in vehicular ad-hoc networks using Internet of vehicles and mobile femto access points
CN104754686A (en) Vehicle-mounted short-distance communication network based DSDV routing optimization method
CN113225709B (en) Relay strategy optimization method for assisting 5G NR (third generation network) Internet of vehicles communication at urban intersection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20170630

Address after: 322099 No. 968 Xuefeng West Road, Beiyuan street, Zhejiang, Yiwu

Applicant after: DATANG GOHIGH INFORMATION AND COMMUNICATION RESEARCH INSTITUTE (YIWU) CO.,LTD.

Applicant after: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

Applicant after: BEIJING GOHIGH DATA NETWORKS TECHNOLOGY Co.,Ltd.

Address before: 322000 Zhejiang city of Yiwu province Su Fu Lu Suxi town No. 126 322000

Applicant before: ZHEJIANG GAOHONG ELECTRONIC TECHNOLOGY Co.,Ltd.

Applicant before: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

Applicant before: BEIJING GOHIGH DATA NETWORKS TECHNOLOGY Co.,Ltd.

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 322099 No. 968, Xuefeng West Road, Beiyuan street, Yiwu City, Zhejiang Province

Patentee after: Datang Gaohong information communication (Yiwu) Co.,Ltd.

Patentee after: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

Patentee after: BEIJING GOHIGH DATA NETWORKS TECHNOLOGY Co.,Ltd.

Address before: 322099 No. 968, Xuefeng West Road, Beiyuan street, Yiwu City, Zhejiang Province

Patentee before: DATANG GOHIGH INFORMATION AND COMMUNICATION RESEARCH INSTITUTE (YIWU) CO.,LTD.

Patentee before: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

Patentee before: BEIJING GOHIGH DATA NETWORKS TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder
TR01 Transfer of patent right

Effective date of registration: 20211230

Address after: 400040 No. 35, Jinghe Road, Huxi street, high tech Zone, Shapingba District, Chongqing

Patentee after: Datang Gaohong Zhilian Technology (Chongqing) Co.,Ltd.

Address before: 322099 No. 968, Xuefeng West Road, Beiyuan street, Yiwu City, Zhejiang Province

Patentee before: Datang Gaohong information communication (Yiwu) Co.,Ltd.

Patentee before: CHINA ACADEMY OF TELECOMMUNICATIONS TECHNOLOGY

Patentee before: BEIJING GOHIGH DATA NETWORKS TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right