CN112235801A - Authentication method for block chain-based reliability evaluation in wireless broadcast system - Google Patents

Authentication method for block chain-based reliability evaluation in wireless broadcast system Download PDF

Info

Publication number
CN112235801A
CN112235801A CN202011055103.XA CN202011055103A CN112235801A CN 112235801 A CN112235801 A CN 112235801A CN 202011055103 A CN202011055103 A CN 202011055103A CN 112235801 A CN112235801 A CN 112235801A
Authority
CN
China
Prior art keywords
aircraft
radar
credibility
key
attribute information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011055103.XA
Other languages
Chinese (zh)
Inventor
季赛
袁杨
沈剑
王晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Information Science and Technology
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN202011055103.XA priority Critical patent/CN112235801A/en
Publication of CN112235801A publication Critical patent/CN112235801A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an authentication method for reliability evaluation based on a block chain in a wireless broadcast system, which specifically comprises the following steps: the aircraft acquires self-credibility attribute information by using a sensor, and uploads a self-identity card number and the credibility attribute information to a radar in a wireless transmission mode; the radar calculates the reliability grade according to the reliability attribute information of the aircraft, verifies whether the reliability grade passes or not, and transmits the reliability grade to other radars; the identity card number, the credibility attribute information and the credibility grade of the aircraft passing the verification are uploaded to a block chain for storage; the radar and the verified aircraft calculate a session key for subsequent communication to authenticate the communication. The certificate and the token are used as parameters in the authentication process for transmission, so that the calculation and communication overhead in the multiple authentication processes of the aircraft and the radar is reduced, and the method is more suitable for running in equipment with limited resources; the block chain design improves the confidentiality and the expandability of information.

Description

Authentication method for block chain-based reliability evaluation in wireless broadcast system
Technical Field
The invention relates to the field of wireless communication, in particular to an authentication method based on block chain credibility evaluation in a wireless broadcast system.
Background
In the existing communication scheme, the aircraft needs to be re-authenticated from the signal coverage area of one radar to the signal coverage area of another radar, and the aircraft and the radar need to bear more calculation and communication overhead, are not suitable for equipment with limited calculation and storage and are not suitable for actual requirements. In the authentication and key agreement stage of the aircraft and the radar, a shared session key is established by the radar and the aircraft in the communication range of the radar, if malicious users exist in the communication range, the malicious users can initiate key attack by acquiring data sent by the radar to the aircraft or to the next radar to destroy the authentication and key agreement process of the aircraft and the radar, so that the privacy of the aircraft is leaked or the shared session key cannot be established. Meanwhile, the existing key negotiation scheme provides authentication service or avoids man-in-the-middle attack by using a public key infrastructure, so that the requirement on calculation and communication capacity is high, modular exponentiation with high calculation overhead needs to be executed, and the method is not suitable for being applied to a resource-limited wireless broadcast environment.
Disclosure of Invention
The purpose of the invention is as follows: in order to solve the above problems, the present invention provides an authentication method based on block chain reliability evaluation in a wireless broadcast system.
The technical scheme is as follows: in order to realize the purpose of the invention, the technical scheme adopted by the invention is as follows: an authentication method based on block chain credibility evaluation in a wireless broadcast system specifically comprises the following steps:
s1: the aircraft utilizes a sensor to collect self-credibility attribute information;
the credibility attribute information can reflect attribute information values of the integrity state and the behavior mode of the aircraft, and comprises the flight speed of the aircraft, the times of malicious behaviors, the credibility level verification passing times and the communication authentication passing times;
the credibility level can reflect whether the aircraft has malicious behaviors or not, and helps the radar to identify whether the aircraft has conditions for entering the system or not.
S2: when the aircraft enters the range covered by the radar, the identity card number and the credibility attribute information of the aircraft are uploaded to the radar in a wireless transmission mode;
s3: the radar calculates the corresponding credibility grade according to the credibility attribute information of the aircraft and verifies the credibility grade, and the specific operation steps are as follows:
s3.1: after the radar receives the credibility attribute information of the aircraft at the time t, firstly, the instantaneous credibility level of the aircraft at the time t is calculated, and the calculation formula is as follows:
Figure BDA0002710618990000021
wherein the content of the first and second substances,
Figure BDA0002710618990000022
representing the instant credibility grade of credibility attribute information containing m attributes at the time t; beta is anA weight representing the nth confidence attribute information; alpha is alphanRepresenting an nth confidence attribute information value; m represents the number of credibility attribute information values;
s3.2: after the instant credibility grade of the t moment is obtained through calculation, the credibility grade of the aircraft at the t moment is calculated according to the credibility grade of the aircraft obtained through calculation at the previous moment, and the calculation formula is as follows:
Figure BDA0002710618990000023
wherein the content of the first and second substances,
Figure BDA0002710618990000024
representing the confidence level of the aircraft at time t; Δ t represents t and t-The interval time of (c); lambda and eta represent the reliability change condition coefficient;
Figure BDA0002710618990000025
representing the level of confidence of the aircraft at the previous moment;
the credibility grade value of the aircraft is not a constant value, but the credibility grade value of the mobile medical intelligent device at the current moment is calculated through the credibility grade value at the previous moment of each iteration;
s3.3: verifying the calculated credibility level of the aircraft by the radar;
if the calculated credibility level of the aircraft is lower than the standard set by the radar, the radar considers that the aircraft is a malicious person and refuses to provide service for the aircraft;
otherwise, the radar adds the identity card number, the credibility attribute information and the credibility grade information of the aircraft into the block chain and simultaneously transmits the identity card number, the credibility attribute information and the credibility grade information to other radars in the system, and the other radars in the system store the identity card number, the credibility attribute information and the credibility grade information of the aircraft in the own block chain.
S4: the aircraft negotiates with the radar to generate a common session key for communication;
the radar and the aircraft can negotiate to generate a session key for communication in two modes, namely initial communication authentication and re-communication authentication;
when an aircraft never communicates with any radar or the initial communication authentication fails, the aircraft communicates with the radar and performs the initial communication authentication;
otherwise, the aircraft directly communicates with the radar to re-authenticate by using the certificate and the token as transmission parameters;
in the communication re-authentication, the certificate and the token are used as parameters in the authentication process for transmission, so that the calculation and communication overhead in the authentication process of the aircraft and the radar is greatly reduced compared with a primary authentication mode, and the communication re-authentication method is more suitable for running in equipment with limited resources. It is of significant advantage when the aircraft passes initial authentication with any radar and then chooses to pass re-authentication instead of initial authentication when communicating with other radars.
The communication initial authentication process of the aircraft and the radar specifically comprises the following steps:
setting M radars with numbers i, i belonging to [1, M ]; n aircrafts are provided, and the number of the aircrafts is j, and j belongs to [1, N ];
s4.1: initializing a system:
the secret key generation center generates a public key PKI and a private key a for the radar iiThe public key PKI is divided into two parts, namely PKI (i,1) and PKI (i,2), and the public key and the private key are stored in the radar i;
the key generation center generates a public key PK and a private key u for the aircraft jjThe public key PK is divided into two parts, namely PK (j,1) and PK (j,2), and the public key and the private key are stored in the aircraft j;
parameters of the key generation center during system operation: a bilinear map
Figure BDA0002710618990000031
Three hash functions H1,H2And H3
Wherein G and GTIs a p-order cyclic group satisfying bilinear mapping; two different generators in the cyclic group G are G and h; a isiAnd ujPrivate keys of the radar i and the aircraft j are respectively non-zero integers randomly selected in a p-order integer domain; the three hash functions are: h1:G→{0,1}*
Figure BDA0002710618990000032
S4.2: the aircraft j and the radar i respectively generate keys for themselves:
aircraft j utilizes its own private key ujAnd the public key PKI of the radar i generates a secret key for itself as follows:
Figure BDA0002710618990000033
wherein PKIi,1Is a first part of the public key of radar i;
the radar i utilizes the private key a held by the radar iiAnd aircraft j's public keyThe PK generates a key for itself as:
Figure BDA0002710618990000034
and sent to aircraft j; wherein, PKj,1Is a first part of the aircraft j public key;
radar i from the integer domain
Figure BDA0002710618990000035
In which a random number r is selectediCalculation generation
Figure BDA0002710618990000036
At the same time to Ri,1And Ri,2Storing, and adding Ri,2And current time node TaSending to the aircraft j;
s4.3: the aircraft j and the radar i generate a common session key according to respective key negotiation, and the method specifically comprises the following steps:
s4.31: aircraft j generates a session key:
after receiving the information sent by the radar i, the aircraft j firstly verifies S4.2 the time node TaThe effectiveness of (a); if not, terminating the process;
otherwise, the aircraft j is based on the parameter SK S4.21rAnd Ri,2Computationally generated key
Figure BDA0002710618990000041
Wherein ID represents the identity number of the aircraft j;
Figure BDA0002710618990000042
indicating aircraft at TaA confidence level of the time; PKIi,2Is a second part of the public key of radar i;
finally, the aircraft j calculates the session key through bilinear mapping
Figure BDA0002710618990000043
S4.32: radar i generates a session key:
Radari is based on S4.2 said parameter SK1rAnd Ri,1Calculating a secret key
Figure BDA0002710618990000044
Radar i can be based on secret key SK3Calculating session keys
Figure BDA0002710618990000045
S4.4: validating a session key generated by an aircraft j
Figure BDA0002710618990000046
And radar i generated session key
Figure BDA0002710618990000047
Whether the two are consistent;
if the two are consistent, the aircraft j and the radar i generate a common session key, normal communication can be performed, and the initial authentication is passed;
otherwise, the aircraft j and the radar i cannot communicate, and the initial authentication is not passed.
The radar and aircraft communication re-certification specifically comprises the following steps:
s4.5: and (3) generating a certificate:
radar i from p order integer domain
Figure BDA0002710618990000048
In the method, an integer v is randomly selectediThen calculates and generates a certificate OC1And OC2,OC1Is sent to the next radar i +1, OC2Is sent to the aircraft j;
wherein, OC1Is calculated by the formula
Figure BDA0002710618990000049
OC2Is calculated by the formula
Figure BDA00027106189900000410
PKIi+1,2Have public for the next radar i +1A second part of the key;
s4.6: generation of the token:
the radar i +1 receives the certificate OC1Then, from the p-order integer field
Figure BDA00027106189900000411
In the random selection of an integer vi+1Computationally generating token Ri+1,1And Ri+1,2Wherein R isi+1,1Stored by radar i +1 and not published externally, Ri+1,2As a token to aircraft j;
s4.7: the generation of the aircraft j and radar i +1 session key specifically comprises the following steps:
aircraft j receives token Ri+1,2And certificate OC2Calculation generation
Figure BDA00027106189900000412
And
Figure BDA00027106189900000413
then use
Figure BDA00027106189900000414
And bilinear mapping to generate a session key, wherein the generation formula is as follows:
Figure BDA00027106189900000415
radar i +1 calculation generation
Figure BDA0002710618990000051
And
Figure BDA0002710618990000052
finally utilize
Figure BDA0002710618990000053
And bilinear mapping calculation to generate a session key, wherein the generation formula is as follows:
Figure BDA0002710618990000054
wherein, ai+1A private key for radar i + 1;
s4.8: validating a session key generated by an aircraft j
Figure BDA0002710618990000055
And radar i +1 generated session key
Figure BDA0002710618990000056
Whether the two are consistent;
if the two are consistent, the aircraft j and the radar i +1 generate a common session key, and normal communication can be performed;
otherwise, it means that the aircraft j and the radar i +1 cannot communicate.
Has the advantages that: the invention realizes the real-time recording of the attribute information of the aircraft credibility by utilizing the Mercker hash tree and stores the attribute information by using the block chain, thereby greatly improving the confidentiality and the expandability; the certificate and the token are used as parameters in the authentication process for transmission, so that the calculation and communication overhead in the multiple authentication processes of the aircraft and the radar is reduced, and the method is suitable for running in equipment with limited resources; in the negotiation process of the session key, a third-party trusted authority is not required to participate, and only information exchange between the radar and the aircraft is performed, so that a common session key is negotiated, and the confidentiality and the safety are higher; meanwhile, the protocol has certain fault-tolerant attribute, and normal execution of authentication and key agreement between the aircraft and the radar is guaranteed.
Drawings
FIG. 1 is a diagram of a generation model of trust levels in a wireless broadcast system;
FIG. 2 is a diagram of a re-certification model of an aircraft.
Detailed Description
The technical solution of the present invention is further described below with reference to the accompanying drawings and examples. The invention relates to an authentication method based on block chain credibility evaluation in a wireless broadcast system, which specifically comprises the following steps:
s1: the aircraft utilizes a sensor to collect self-credibility attribute information;
the credibility attribute information comprises the flight speed of the aircraft, the times of malicious behaviors, the credibility level verification passing times and the communication authentication passing times;
s2: when the aircraft enters the range covered by the radar, the identity card number and the credibility attribute information of the aircraft are uploaded to the radar in a wireless transmission mode;
s3: the radar calculates the corresponding credibility grade according to the credibility attribute information of the aircraft and verifies the credibility grade, and the specific operation steps are as follows:
s3.1: after the radar receives the credibility attribute information of the aircraft at the time t, firstly, the instantaneous credibility level of the aircraft at the time t is calculated, and the calculation formula is as follows:
Figure BDA0002710618990000061
wherein the content of the first and second substances,
Figure BDA0002710618990000062
representing the instant credibility grade of credibility attribute information containing m attributes at the time t; beta is anA weight representing the nth confidence attribute information; alpha is alphanRepresenting an nth confidence attribute information value; m represents the number of the credibility attribute information values, and the value is 4 in the example;
s3.2: after the instant credibility grade of the t moment is obtained through calculation, the credibility grade of the aircraft at the t moment is calculated according to the credibility grade of the aircraft obtained through calculation at the previous moment, and the calculation formula is as follows:
Figure BDA0002710618990000063
wherein the content of the first and second substances,
Figure BDA0002710618990000064
representing the confidence level of the aircraft at time t; Δ t representst and t-The interval time of (c); lambda and eta represent the reliability change condition coefficient;
Figure BDA0002710618990000065
representing the level of confidence of the aircraft at the previous moment;
s3.3: verifying the calculated credibility level of the aircraft by the radar;
if the calculated credibility level of the aircraft is lower than the standard set by the radar, the radar considers that the aircraft is a malicious person and refuses to provide service for the aircraft;
otherwise, the radar adds the identity card number, the credibility attribute information and the credibility grade information of the aircraft into the block chain and simultaneously transmits the identity card number, the credibility attribute information and the credibility grade information to other radars in the system, and the other radars in the system store the identity card number, the credibility attribute information and the credibility grade information of the aircraft in the own block chain.
S4: the aircraft negotiates with the radar to generate a common session key for communication;
the radar and the aircraft can negotiate to generate a session key for communication in two modes, namely initial communication authentication and re-communication authentication;
when an aircraft never communicates with any radar or the initial communication authentication fails, the aircraft communicates with the radar and performs the initial communication authentication;
otherwise, the aircraft directly communicates with the radar to re-authenticate by using the certificate and the token as transmission parameters;
in the re-authentication, the certificate and the token are used as parameters in the authentication process for transmission, so that the calculation and communication overhead in the authentication process of the aircraft and the radar is greatly reduced compared with the initial authentication mode, and the method is more suitable for running in equipment with limited resources. It is of significant advantage when the aircraft passes initial authentication with any radar and then chooses to pass re-authentication instead of initial authentication when communicating with other radars.
The initial certification process of the aircraft and the radar specifically comprises the following steps:
setting M radars with numbers i, i belonging to [1, M ]; n aircrafts are provided, and the number of the aircrafts is j, and j belongs to [1, N ];
s4.1: initializing a system:
the secret key generation center generates a public key PKI and a private key a for the radar iiThe public key PKI is divided into two parts, namely PKI (i,1) and PKI (i,2), and the public key and the private key are stored in the radar i;
the key generation center generates a public key PK and a private key u for the aircraft jjThe public key PK is divided into two parts, namely PK (j,1) and PK (j,2), and the public key and the private key are stored in the aircraft j;
parameters of the key generation center during system operation: a bilinear map
Figure BDA0002710618990000071
Three hash functions H1,H2And H3
Wherein G and GTIs a p-order cyclic group satisfying bilinear mapping; two different generators in the cyclic group G are G and h; a isiAnd ujPrivate keys of the radar i and the aircraft j are respectively non-zero integers randomly selected in a p-order integer domain; the three hash functions are: h1:G→{0,1}*
Figure BDA0002710618990000072
S4.2: the aircraft j and the radar i respectively generate keys for themselves:
aircraft j utilizes its own private key ujAnd the public key PKI of the radar i generates a secret key for itself as follows:
Figure BDA0002710618990000073
wherein PKIi,1Is a first part of the public key of radar i;
the radar i utilizes the private key a held by the radar iiAnd the public key PK of the aircraft j generates a secret key for itself as follows:
Figure BDA0002710618990000074
and sent to aircraft j; wherein, PKj,1Is a first part of the aircraft j public key;
radar i from the integer domain
Figure BDA0002710618990000075
In which a random number r is selectediCalculation generation
Figure BDA0002710618990000076
At the same time to Ri,1And Ri,2Storing, and adding Ri,2And current time node TaSending to the aircraft j;
s4.3: the aircraft j and the radar i generate a common session key according to respective key negotiation, and the method specifically comprises the following steps:
s4.31: aircraft j generates a session key:
after receiving the information sent by the radar i, the aircraft j firstly verifies S4.2 the time node TaThe effectiveness of (a); if not, terminating the process;
otherwise, the aircraft j is based on the parameter SK S4.21rAnd Ri,2Computationally generated key
Figure BDA0002710618990000077
Wherein ID represents the identity number of the aircraft j;
Figure BDA0002710618990000078
indicating aircraft at TaA confidence level of the time; PKIi,2Is a second part of the public key of radar i;
finally, the aircraft j calculates the session key through bilinear mapping
Figure BDA0002710618990000081
S4.32: radar i generates a session key:
radar i is based on S4.2 parameter SK1rAnd Ri,1Calculating a secret key
Figure BDA0002710618990000082
Radar i can be based on secret key SK3Calculating session keys
Figure BDA0002710618990000083
S4.4: validating a session key generated by an aircraft j
Figure BDA0002710618990000084
And radar i generated session key
Figure BDA0002710618990000085
Whether the two are consistent;
if the two are consistent, the aircraft j and the radar i generate a common session key, normal communication can be performed, and the initial authentication is passed;
otherwise, the aircraft j and the radar i cannot communicate, and the initial authentication is not passed.
The radar and aircraft communication re-certification specifically comprises the following steps:
s4.5: and (3) generating a certificate:
radar i from p order integer domain
Figure BDA0002710618990000086
In the method, an integer v is randomly selectediThen calculates and generates a certificate OC1And OC2,OC1Is sent to the next radar i +1, OC2Is sent to the aircraft j;
wherein, OC1Is calculated by the formula
Figure BDA0002710618990000087
OC2Is calculated by the formula
Figure BDA0002710618990000088
PKIi+1,2Holding a second part of the public key for the next radar i + 1;
s4.6: generation of the token:
the radar i +1 receives the certificate OC1Then, from the p-order integer field
Figure BDA0002710618990000089
In the random selection of an integer vi+1Computationally generating token Ri+1,1And Ri+1,2Wherein R isi+1,1Stored by radar i +1 and not published externally, Ri+1,2As a token to aircraft j;
s4.7: the generation of the aircraft j and radar i +1 session key specifically comprises the following steps:
aircraft j receives token Ri+1,2And certificate OC2Calculation generation
Figure BDA00027106189900000810
And
Figure BDA00027106189900000811
then use
Figure BDA00027106189900000812
And bilinear mapping to generate a session key, wherein the generation formula is as follows:
Figure BDA00027106189900000813
radar i +1 calculation generation
Figure BDA00027106189900000814
And
Figure BDA00027106189900000815
finally utilize
Figure BDA00027106189900000816
And bilinear mapping calculation to generate a session key, wherein the generation formula is as follows:
Figure BDA00027106189900000817
wherein, ai+1Is a mineA private key up to i + 1;
s4.8: validating a session key generated by an aircraft j
Figure BDA0002710618990000091
And radar i +1 generated session key
Figure BDA0002710618990000092
Whether the two are consistent;
if the two are consistent, the aircraft j and the radar i +1 generate a common session key, and normal communication can be performed;
otherwise, it means that the aircraft j and the radar i +1 cannot communicate.

Claims (6)

1. An authentication method based on block chain reliability evaluation in a wireless broadcast system is characterized by comprising the following steps:
s1: the aircraft utilizes a sensor to collect self-credibility attribute information;
s2: when the aircraft enters the range covered by the radar, the aircraft uploads the identity card number and the credibility attribute information to the radar;
s3: the radar calculates the corresponding credibility grade according to the credibility attribute information of the aircraft and verifies the credibility grade;
s4: and the credibility grade verifies that the aircraft and the radar which pass through the verification are subjected to communication authentication, and whether the authentication can be negotiated to generate a common session key is judged.
2. The method of claim 1, wherein the method comprises: s3, calculating the credibility level of the aircraft by the radar, wherein the specific operation steps are as follows:
after receiving the credibility attribute information of the aircraft at the current moment t, the radar firstly calculates the instantaneous credibility level of the aircraft at the moment t, and the calculation formula is as follows:
Figure FDA0002710618980000011
wherein the content of the first and second substances,
Figure FDA0002710618980000012
representing the instant credibility grade of credibility attribute information containing m attributes at the time t; beta is anA weight representing the nth confidence attribute information; alpha is alphanRepresenting an nth confidence attribute information value; m represents the number of credibility attribute information values;
after the instant credibility grade of the t moment is obtained through calculation, the credibility grade of the aircraft at the t moment is calculated according to the credibility grade of the aircraft obtained through calculation at the previous moment, and the calculation formula is as follows:
Figure FDA0002710618980000013
wherein the content of the first and second substances,
Figure FDA0002710618980000014
representing the confidence level of the aircraft at time t; Δ t represents t and t-The interval time of (c); lambda and eta represent the reliability change condition coefficient;
Figure FDA0002710618980000015
the level of confidence of the aircraft at the previous moment is indicated.
3. The method of claim 2, wherein the method comprises: s3, verifying the calculated credibility level of the aircraft by the radar, specifically comprising:
if the calculated credibility level of the aircraft is lower than the standard set by the radar, the radar considers that the aircraft is a malicious person and refuses to provide service for the aircraft;
otherwise, the radar adds the identity card number, the credibility attribute information and the credibility grade information of the aircraft into the block chain and simultaneously transmits the identity card number, the credibility attribute information and the credibility grade information to other radars in the system; other radars in the system add the identification number, credibility attribute information and credibility level of the aircraft in their block chain.
4. The method of claim 3, wherein the method comprises: s4 communication authentication between the aircraft and the radar comprises two modes: the communication initial authentication and the communication re-authentication specifically include:
when an aircraft never communicates with any radar or the initial communication authentication fails, the aircraft and the radar perform initial communication authentication;
otherwise, the aircraft directly communicates with the radar to re-authenticate by using the certificate and the token as transfer parameters.
5. The method of claim 4, wherein the method comprises: s4, the communication initial authentication process specifically includes the following steps:
setting M radars with numbers i, i belonging to [1, M ]; n aircrafts are provided, and the number of the aircrafts is j, and j belongs to [1, N ];
s4.1: initializing a system:
the secret key generation center generates a public key PKI and a private key a for the radar iiThe public key PKI is divided into two parts, namely PKI (i,1) and PKI (i,2), and the public key and the private key are stored in the radar i;
the key generation center generates a public key PK and a private key u for the aircraft jjThe public key PK is divided into two parts, namely PK (j,1) and PK (j,2), and the public key and the private key are stored in the aircraft j;
parameters of the key generation center during system operation: a bilinear map
Figure FDA0002710618980000021
Three hash functions H1,H2And H3
Wherein G and GTIs to satisfy twoA linear mapped cyclic group of order p; two different generators in the cyclic group G are G and h; a isiAnd ujPrivate keys of the radar i and the aircraft j are respectively non-zero integers randomly selected in a p-order integer domain; the three hash functions are: h1:G→{0,1}*,H2,
Figure FDA0002710618980000024
S4.2: the aircraft j and the radar i respectively generate keys for themselves:
aircraft j utilizes its own private key ujAnd the public key PKI of the radar i generates a secret key for itself as follows:
Figure FDA0002710618980000022
wherein PKIi,1Is a first part of the public key of radar i;
the radar i utilizes the private key a held by the radar iiAnd the public key PK of the aircraft j generates a secret key for itself as follows:
Figure FDA0002710618980000023
and sent to aircraft j; wherein, PKj,1Is a first part of the aircraft j public key;
radar i from the integer domain
Figure FDA0002710618980000031
In which a random number r is selectediCalculation generation
Figure FDA0002710618980000032
At the same time to Ri,1And Ri,2Storing, and adding Ri,2And current time node TaSending to the aircraft j;
s4.3: the aircraft j and the radar i generate a common session key according to respective key negotiation, and the method specifically comprises the following steps:
s4.31: aircraft j generates a session key:
after receiving the information sent by the radar i, the aircraft j first verifies S42 the time node TaThe effectiveness of (a); if not, terminating the process;
otherwise, the aircraft j is based on the parameter SK S4.21rAnd Ri,2Computationally generated key
Figure FDA0002710618980000033
Wherein ID represents the identity number of the aircraft j;
Figure FDA0002710618980000034
indicating aircraft at TaA confidence level of the time; PKIi,2Is a second part of the public key of radar i;
finally, the aircraft j calculates the session key through bilinear mapping
Figure FDA0002710618980000035
S4.32: radar i generates a session key:
radar i is based on S4.2 parameter SK1rAnd Ri,1Calculating a secret key
Figure FDA0002710618980000036
Radar i can be based on secret key SK3Calculating session keys
Figure FDA0002710618980000037
S4.4: validating a session key generated by an aircraft j
Figure FDA0002710618980000038
And radar i generated session key
Figure FDA0002710618980000039
Whether the two are consistent;
if the two are consistent, the aircraft j and the radar i generate a common session key, normal communication can be performed, and the initial authentication is passed;
otherwise, the aircraft j and the radar i cannot communicate, and the initial authentication is not passed.
6. The method of claim 5, wherein the method comprises: s4 the radar and aircraft communication re-certification specifically comprises the following steps:
s4.5: and (3) generating a certificate:
radar i from p order integer domain
Figure FDA00027106189800000310
In the method, an integer v is randomly selectediThen calculates and generates a certificate OC1And OC2,OC1Is sent to the next radar i +1, OC2Is sent to the aircraft j;
wherein, OC1Is calculated by the formula
Figure FDA00027106189800000311
OC2Is calculated by the formula
Figure FDA00027106189800000312
PKIi+1,2Holding a second part of the public key for the next radar i + 1;
s4.6: generation of the token:
the radar i +1 receives the certificate OC1Then, from the p-order integer field
Figure FDA00027106189800000313
In the random selection of an integer vi+1Computationally generating token Ri+1,1And Ri+1,2Wherein R isi+1,1Stored by radar i +1 and not published externally, Ri+1,2As a token to aircraft j;
s4.7: the generation of the aircraft j and radar i +1 session key specifically comprises the following steps:
aircraft j receives token Ri+1,2And certificate OC2Calculation generation
Figure FDA0002710618980000041
And
Figure FDA0002710618980000042
then use
Figure FDA0002710618980000043
And bilinear mapping to generate a session key, wherein the generation formula is as follows:
Figure FDA0002710618980000044
radar i +1 calculation generation
Figure FDA0002710618980000045
And
Figure FDA0002710618980000046
finally utilize
Figure FDA0002710618980000047
And bilinear mapping calculation to generate a session key, wherein the generation formula is as follows:
Figure FDA0002710618980000048
wherein, ai+1A private key for radar i + 1;
s4.8: validating a session key generated by an aircraft j
Figure FDA0002710618980000049
And radar i +1 generated session key
Figure FDA00027106189800000410
Whether the two are consistent;
if the two are consistent, the aircraft j and the radar i +1 generate a common session key, and normal communication can be performed;
otherwise, it means that the aircraft j and the radar i +1 cannot communicate.
CN202011055103.XA 2020-09-30 2020-09-30 Authentication method for block chain-based reliability evaluation in wireless broadcast system Pending CN112235801A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011055103.XA CN112235801A (en) 2020-09-30 2020-09-30 Authentication method for block chain-based reliability evaluation in wireless broadcast system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011055103.XA CN112235801A (en) 2020-09-30 2020-09-30 Authentication method for block chain-based reliability evaluation in wireless broadcast system

Publications (1)

Publication Number Publication Date
CN112235801A true CN112235801A (en) 2021-01-15

Family

ID=74119701

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011055103.XA Pending CN112235801A (en) 2020-09-30 2020-09-30 Authentication method for block chain-based reliability evaluation in wireless broadcast system

Country Status (1)

Country Link
CN (1) CN112235801A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959269A (en) * 2016-04-25 2016-09-21 北京理工大学 ID-based authenticated dynamic group key agreement method
WO2017202161A1 (en) * 2016-05-26 2017-11-30 中兴通讯股份有限公司 Certificateless two-party authenticated key agreement method, device, and data storage medium
CN110505058A (en) * 2019-08-20 2019-11-26 西安电子科技大学 The identity identifying method of isomery block chain under across chain scene

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959269A (en) * 2016-04-25 2016-09-21 北京理工大学 ID-based authenticated dynamic group key agreement method
WO2017202161A1 (en) * 2016-05-26 2017-11-30 中兴通讯股份有限公司 Certificateless two-party authenticated key agreement method, device, and data storage medium
CN110505058A (en) * 2019-08-20 2019-11-26 西安电子科技大学 The identity identifying method of isomery block chain under across chain scene

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHEN WANG等: "B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs", 《IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING》 *

Similar Documents

Publication Publication Date Title
CN105847235B (en) The efficient anonymous batch of authentication method of identity-based under a kind of car networking environment
Ma et al. An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks
CN106330910B (en) Strong secret protection double authentication method in car networking based on node identities and prestige
US20210367753A1 (en) Trusted measurement and control network authentication method based on double cryptographic values and chaotic encryption
CN1902853B (en) Method and apparatus for verifiable generation of public keys
GB2623015A (en) Internet-of-vehicles communication security authentication method, system and device based on national cryptographic algorithm
CN109412790A (en) A kind of user authentication of internet of things oriented and key agreement system and method
CN106059766A (en) Method and system for protecting condition privacy of internet of vehicles based on certificateless batch verification
CN109547213A (en) Suitable for networking Verification System and method between the star of low-track satellite network
CN113905351B (en) Internet of vehicles authentication method based on block chain and confidential calculation
CN101902476A (en) Method for authenticating identity of mobile peer-to-peer user
Dewanta et al. A mutual authentication scheme for secure fog computing service handover in vehicular network environment
CN110166445A (en) A kind of the secret protection anonymous authentication and cryptographic key negotiation method of identity-based
Babu et al. EV-PUF: Lightweight security protocol for dynamic charging system of electric vehicles using physical unclonable functions
CN109640325A (en) The method for managing security towards fleet based on expandable type contribution group cipher key negotiation
CN115499119A (en) PUF-based vehicle authentication method with privacy protection function
Xu et al. An efficient three-factor privacy-preserving authentication and key agreement protocol for vehicular ad-hoc network
CN115442048A (en) VANET-oriented block chain-based anonymous authentication method
Parameswarath et al. A privacy-preserving authenticated key exchange protocol for V2G communications using SSI
Wang et al. Secure long-range autonomous valet parking: A reservation scheme with three-factor authentication and key agreement
CN109766716A (en) A kind of anonymous bidirectional authentication method based on trust computing
Ogundoyin An Efficient, Secure and Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad-hoc Networks.
CN116760614A (en) Zero-knowledge proof identity authentication scheme for Internet of vehicles based on blockchain and PUF technology
CN112235801A (en) Authentication method for block chain-based reliability evaluation in wireless broadcast system
CN108833445A (en) A kind of authentication method and device suitable for Internet of things system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210115

RJ01 Rejection of invention patent application after publication