CN112422270A - BC-LHE-based vehicle networking data sharing method and system - Google Patents

BC-LHE-based vehicle networking data sharing method and system Download PDF

Info

Publication number
CN112422270A
CN112422270A CN202011416254.3A CN202011416254A CN112422270A CN 112422270 A CN112422270 A CN 112422270A CN 202011416254 A CN202011416254 A CN 202011416254A CN 112422270 A CN112422270 A CN 112422270A
Authority
CN
China
Prior art keywords
data
vehicle
server
encrypted
mounted equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011416254.3A
Other languages
Chinese (zh)
Other versions
CN112422270B (en
Inventor
程文志
欧嵬
刘志壮
尹向东
张文昭
刘健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Shiyi Network Technology Co ltd
Original Assignee
Hunan University of Science and Engineering
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan University of Science and Engineering filed Critical Hunan University of Science and Engineering
Priority to CN202011416254.3A priority Critical patent/CN112422270B/en
Publication of CN112422270A publication Critical patent/CN112422270A/en
Application granted granted Critical
Publication of CN112422270B publication Critical patent/CN112422270B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Traffic Control Systems (AREA)

Abstract

The invention discloses a BC-LHE (BC-LHE) -based vehicle networking data sharing method and system, and provides a data sharing model and system based on a block chain and lightweight homomorphic encryption. Because the personal information of the users in the Internet of vehicles contains more characteristic values, the privacy is very strong, and the data is directly exchanged and transmitted on the public server, so that the information of the users is easily leaked. Meanwhile, in the upgrading process of system files in the Internet of vehicles, the risk of information implantation also exists, and the privacy safety of users is threatened. Therefore, the invention provides a BC-LHE solution, which adopts homomorphic encryption authentication transmission when information is transmitted between a server and user equipment, and realizes the transmission of the information under the condition of ensuring that privacy is not leaked; in a communication channel, a block chain technology is adopted to establish a trusted transmission channel, and finally data sharing of the whole Internet of vehicles system is realized.

Description

BC-LHE-based vehicle networking data sharing method and system
Technical Field
The invention relates to a BC-LHE-based vehicle networking data sharing method and system.
Background
With the rapid development of the mobile Internet, the mobile communication technology is shifted from 4G to 5G, and the rapid development of the Internet of Vehicles (IoV) is greatly promoted due to the stronger communication means and processing capability. A user can use a client (such as a mobile phone, a tablet and a computer) to connect with the Internet through a Network (such as WiFi, GSM, 4G, 5G and Wired Network), access a cloud server in the Internet, acquire equipment state information in the Internet or control a vehicle, and achieve the purpose of data interconnection and intercommunication in the Internet.
Due to the increasing maturity of cloud computing and cloud storage technologies, user data sharing and interconnection of the internet of vehicles become a necessary trend. However, because the cloud server data of the car networking user is provided by a third party service provider or provided by a server which is deployed in a public network and can be accessed to the outside, the open server often becomes a target of hacking, various security threats such as Trojan, virus and data attack emerge endlessly, and the event of user data leakage happens occasionally, which brings a serious threat to high-level applications (such as automatic driving) of the car networking. The personal data stored in the cloud server by the user also faces a serious challenge, so that the data security problem of the internet of vehicles also becomes a key problem for limiting the development of the internet of vehicles.
Meanwhile, when a user in the internet of vehicles uses the vehicle, the user is bound to perform data interaction with the cloud server through the internet, such as system update service, road condition acquisition and the like, and if a hacker implants a trojan or provides a backdoor in the system-level service process, the hacker is bound to bring serious threats to the data security of the user, and even the vehicle is possibly out of control or damaged. Therefore, it is necessary to provide a safe and reliable data sharing method for the internet of vehicles.
Disclosure of Invention
Aiming at the problems of data transmission in the existing Internet of vehicles, the invention provides a BC-LHE-based Internet of vehicles data sharing method and system, when a user or vehicle-mounted equipment interacts with a server, a block chain technology is adopted to hide a server layer, and a safe and credible transmission path is established to ensure the safe transmission of data; on the encryption layer, a secondary composite encryption technology is adopted to ensure the security of data.
A BC-LHE based vehicle networking data sharing model is characterized by comprising the following steps.
Step 1: and a block chain trusted channel-based transmission cluster is established, the number n of available servers of the cloud server in the external hidden system, the geographic position GPS, the IP information and the like are concealed, and the leakage of key information is prevented.
Step 2: the cloud server is marked, and the mark of each sub-server is formed by random numbers or characters, so that n IDs are generated and recorded as:x 1 、x 2 、x 3 、……、x n
and step 3: in order to guarantee the safety of data, before data M is sent, the data is verified by using an MD5 algorithm to ensure the safety of original data; and the cloud server performs primary encryption by using the public key of the RSA to obtain encrypted data E.
And 4, step 4: the cloud server generates a random number r, and divides the encrypted data E into r sections to obtain r small data sections with different sizes or lengths:e 1 、e 2 、e 3 、……、e r
and 5: the cloud server randomly selects the equipment n according to the size of the equipment n in the whole serverkA server for storing the information of the server,kthe type of the code is an odd number, so that the authentication is convenient; segment datae 1 Selected at randomkServers simultaneously performing corresponding encryption operation by using homomorphic encryption to obtain new encrypted dataE 1
Step 6: the selected k servers start to transmit the encrypted dataE 1 And a current time stamptTo the car networking device.
And 7: after receiving the server data, the vehicle-mounted equipment in the vehicle network judges the timestamp, and if the time delay is too long, the data is abandoned.
And 8: if the time delay of the data is within a reasonable range, the data is subjected to a reverse process of homomorphic encryption, and a plurality of groups of encrypted data are obtained by removing the data discarded in the step 7.
And step 9: the vehicle-mounted equipment compares multiple groups of equipment, selects the data with the same quantity and the maximum quantity according to the preferential calculation principle of the block chain, and the data is the data segmente 1
Step 10: repeating the process of the step 5 until the whole data segment is transmitted, and obtaining the vehicle-mounted equipmente 1 、e 2 e 3 、……、e n And arranging the data according to the sequence of the time stamps, combining to obtain encrypted data E, and simultaneously restoring the encrypted data by utilizing an RSA algorithm built in the vehicle-mounted equipment to obtain original data M so as to finish the whole data transmission process.
The BC-LHE-based vehicle networking data sharing method is characterized by comprising the following steps.
Initializing a system; number of available servers in cloud servernRandom ID of the child server isx i ASCII code value of a file or dataMAnd MD5 valuedPublic and private keys of the RSA algorithm.
In order to ensure the security of data, the system adopts 1024-bit RSA for encryption.
Meanwhile, the RSA private key is sealed in the vehicle-mounted equipment, and different public keys and private keys are correspondingly generated according to different mark IDs of the vehicle equipment.
The central server in the cloud server compares the files or data with the MD5 and calls a functionMD5(M)Check if its value is d.
If the value compared by the function is d, the file data is normal and is not tampered.
If the value of the function is not d, the file or the data is unqualified, the file is abandoned, and the request is carried out again.
Encrypting the qualified data by using RSA public key to obtain encrypted data E, wherein the encryption process is disclosed as followsE = RSA(M)Encryption is performed.
The encrypted data E is segmented by using a random number algorithm, and the specific process is disclosed as followse i = Random(E, r, i)Where r is divided into r segments.
For n available servers, obtaining random k servers according to a random number algorithm,k = Random(n)
will be provided withe i Is sent to the selected k-servers using the time stampt i Performing homomorphic encryption operation to obtain secondary encrypted dataE i = HE(e i , t i )
At the same time, k servers will encrypt the data twiceE i And time stampt i And transmitting the encrypted information to the vehicle-mounted equipment by using the channel of the block chain.
After the vehicle-mounted equipment receives the k data sent by the server, whether the time delay of the transmitted time stamp is within a controllable range or not is compared.
If the delay requirement is not met, discarding the data; and if the delay requirement is met, performing the next operation.
The vehicle-mounted equipment compares the data meeting the delay condition, and selects the data E with the most identical value according to the principle of the block chain maximization algorithmiAccording to the time stamp t deliverediAnd performing decryption operation to obtain small-section data ei = Dec (E)i, ti)。
And repeating the whole cycle until the transmission of the last encrypted data is finished to obtain all encrypted segment data, and integrating the encrypted segment data according to the time stamp to obtain the original E. And then, a private key sealed in the vehicle-mounted equipment is used for completing a decryption process, so that data secret transmission is realized.
A BC-LHE based vehicle networking data sharing system comprises the following contents.
The central server is in charge of the allocation work of the whole system, and meanwhile, in order to guarantee the safety of the system, the central server can change along with the change of time, so that the information leakage of the central server is prevented.
And the central server performs MD5 verification on the initial data, obtains encrypted data E by using RSA encryption on the successfully verified data, and simultaneously segments the encrypted data to obtain segmented data of different segments.
The central server performs task allocation on the available sub-servers in the cloud server, and calls different sub-servers to perform encryption and data transmission work each time according to actual conditions.
The secret key in the vehicle-mounted device is packaged according to the vehicle ID, and the secret key is prevented from being leaked by adopting a strategy that only the vehicle-mounted device is read from the inside and cannot be read from the outside.
The homomorphic encryption process of the whole system is completed according to the time stamp, so that the encrypted data can be restored only according to a fixed sequence in the reverse decryption process of the vehicle-mounted equipment, and the secret transmission of the whole data or the file is realized.
Has the beneficial effects.
The invention provides a BC-LHE (BC-LHE) -based vehicle networking data sharing method and a BC-LHE-based vehicle networking data sharing system, which can realize the sharing of resource data or files under the condition of ensuring that user data is not leaked. Because the personal information of the users in the Internet of vehicles contains more characteristic values, the privacy is very strong, and the data is directly exchanged and transmitted on the public server, so that the information of the users is easily leaked. Meanwhile, in the upgrading process of system files in the Internet of vehicles, the risk of information implantation also exists, and the privacy safety of users is threatened. Therefore, the invention provides a BC-LHE solution, which adopts homomorphic encryption authentication transmission when information is transmitted between a server and user equipment, and realizes the transmission of the information under the condition of ensuring that privacy is not leaked; in a communication channel, a block chain technology is adopted to establish a trusted transmission channel, and finally data sharing of the whole Internet of vehicles system is realized.
Drawings
FIG. 1 is a diagram of a model of the method and system of the present invention;
fig. 2 is a schematic diagram of data sharing according to the present invention.
Detailed Description
The invention is further explained below with reference to the drawings and the embodiments.
As shown in FIG. 1, a BC-LHE-based vehicle networking data sharing method and system comprises the following steps:
step 1: and a block chain trusted channel-based transmission cluster is established, the number n of available servers of the cloud server in the external hidden system, the geographic position GPS, the IP information and the like are concealed, and the leakage of key information is prevented.
And (5) initializing the system.
Number of available servers in cloud servernRandom ID of the child server isx i
ASCII code value of file or dataMAnd MD5 valuedPublic and private keys of the RSA algorithm.
In order to ensure the security of data, the system adopts 1024-bit RSA for encryption.
Meanwhile, the RSA private key is sealed in the vehicle-mounted equipment, and different public keys and private keys are correspondingly generated according to different mark IDs of the vehicle equipment.
The central server is in charge of the allocation work of the whole system, and meanwhile, in order to guarantee the safety of the system, the central server can change along with the change of time, so that the information leakage of the central server is prevented.
Step 2: and the central server performs MD5 verification on the initial data, obtains encrypted data E by using RSA encryption on the successfully verified data, and simultaneously segments the encrypted data to obtain segmented data of different segments.
The cloud server is marked, and the mark of each sub-server is formed by random numbers or characters, so that n IDs are generated and recorded as:x 1 、x 2 、x 3 、……、x n
in order to guarantee the safety of the data, before the data M is sent, the data is checked by using an MD5 algorithm.
The checking process comprises the following steps: the central server in the cloud server compares the files or data with the MD5 and calls a functionMD5(M)Check if its value is d.
If the value compared by the function is d, the file data is normal and is not tampered.
If the value of the function is not d, the file or the data is unqualified, the file is abandoned, and the request is carried out again.
After the comparison process of the MD5, the server can ensure the security of the original data.
And the cloud server performs primary encryption by using the public key of the RSA to obtain encrypted data E.
The specific process is as follows: encrypting the qualified data by using RSA public key to obtain encrypted data E, wherein the encryption process is disclosed as followsE = RSA(M)Encryption is performed.
The cloud server generates a random number r, and divides the encrypted data E into r sections to obtain r small data sections with different sizes or lengths:e 1 、e 2 、e 3 、……、e r
the specific process is as follows: the encrypted data E is segmented by using a random number algorithm, and the specific process is disclosed as followse i = Random(E, r, i)Where r is divided into r segments.
And step 3: the central server performs task allocation on the available sub-servers in the cloud server, and calls different sub-servers to perform encryption and data transmission work each time according to actual conditions.
The cloud server randomly selects k servers according to the size of the device n in the whole server, wherein the type of k must be an odd number, and authentication is facilitated.
Authentication server selection of cloud serverThe selection method comprises the following steps: for n available servers, obtaining random k servers according to a random number algorithm,k = Random(n)
segment e of dataiRandomly selecting k servers, and simultaneously performing corresponding encryption operation by using homomorphic encryption to obtain new encrypted data EiThe selected k servers start to deliver the encrypted data EiAnd the current timestamp t to the internet of vehicles device.
Namely: will be provided withe i Is sent to the selected k-servers using the time stampt i Performing homomorphic encryption operation to obtain secondary encrypted dataE i = HE(e i , t i )(ii) a At the same time, k servers will encrypt the data twiceE i And time stampt i And transmitting the encrypted information to the vehicle-mounted equipment by using the channel of the block chain.
And 4, step 4: in the reverse decryption process, the vehicle-mounted equipment can restore the encrypted data only according to the fixed time stamp sequence, so that the secret transmission of the whole data or file is realized.
After receiving the server data, the vehicle-mounted equipment in the vehicle network judges the timestamp, and if the time delay is too long, the data is abandoned.
The whole data judgment process is as follows: after the vehicle-mounted equipment receives the k data sent by the server, whether the time delay of the transmitted time stamp is within a controllable range or not is compared; if the delay requirement is not met, discarding the data; and if the delay requirement is met, performing the next operation.
If the time delay of the data is within a reasonable range, the data is subjected to a reverse process of homomorphic encryption, and a plurality of groups of encrypted data are obtained by removing the data discarded in the step 7.
The vehicle-mounted equipment compares multiple groups of equipment, selects the data with the same quantity and the maximum quantity according to the preferential calculation principle of the block chain, and the data is the data segmente 1 The whole process is as follows: vehicle-mounted equipment meetingComparing the data meeting the delay condition, and selecting the data E with the most identical value according to the principle of the block chain maximization algorithmiAccording to the time stamp t deliverediPerforming decryption operation to obtain small segment datae i = Dec(E i , t i )
Repeating the whole cycle until the transmission of the last encrypted data is finished to obtain all encrypted segment data, and integrating the encrypted segment data according to the time stamp to obtain the original E; the vehicle-mounted equipment can obtain the data until the whole data segment is transmittede 1 、e 2 、e 3 、……、 e n
The data are arranged according to the sequence of the time stamps and are combined to obtain encrypted data E, meanwhile, the encrypted data are restored by utilizing an RSA algorithm built in the vehicle-mounted equipment to obtain original data M, the decryption process is completed, the transmission process of the whole data is completed, and therefore data secret transmission is achieved.
As shown in fig. 2, a data sharing principle based on internet of vehicles includes the following processes:
the central server in the cloud server compares the files or data with the MD5 and calls a functionMD5(M)Check if its value is d.
If the value of the function comparison is d, the file data is normal and is not tampered; if the value of the function is not d, the file or the data is unqualified, the file is abandoned, and the request is carried out again.
Encrypting the qualified data by using RSA public key to obtain encrypted data E, wherein the encryption process is disclosed as followsE = RSA(M)Encryption is performed.
The encrypted data E is segmented by using a random number algorithm, and the specific process is disclosed as followse i = Random(E, r, i)Where r is divided into r segments.
For n available servers, obtaining random k servers according to a random number algorithm,k = Random(n)
will be provided withe i Is sent to the selected k-servers using the time stampt i Performing homomorphic encryption operation to obtain secondary encrypted dataE i = HE(e i , t i )
At the same time, k servers will encrypt the data twiceE i And time stampt i And transmitting the encrypted information to the vehicle-mounted equipment by using the channel of the block chain.
After the vehicle-mounted equipment receives the k data sent by the server, whether the time delay of the transmitted time stamp is within a controllable range or not is compared.
If the delay requirement is not met, discarding the data; and if the delay requirement is met, performing the next operation.
The vehicle-mounted equipment compares the data meeting the delay condition, and selects the data E with the most identical value according to the principle of the block chain maximization algorithmiAccording to the time stamp t deliverediAnd performing decryption operation to obtain small-section data ei = Dec (E)i, ti)。
Repeating the whole cycle until the transmission of the last encrypted data is finished to obtain all encrypted segment data, and integrating the encrypted segment data according to the time stamp to obtain the original E; and then, a private key sealed in the vehicle-mounted equipment is used for completing a decryption process, so that data secret transmission is realized.
In summary, the invention provides a vehicle networking data sharing method and system based on BC-LHE, and the method realizes sharing of resource data or files under the condition of ensuring that user data is not leaked. Because the personal information of the users in the Internet of vehicles contains more characteristic values, the privacy is very strong, and the data is directly exchanged and transmitted on the public server, so that the information of the users is easily leaked. Meanwhile, in the upgrading process of system files in the Internet of vehicles, the risk of information implantation also exists, and the privacy safety of users is threatened. Therefore, the invention provides a BC-LHE solution, which adopts homomorphic encryption authentication transmission when information is transmitted between a server and user equipment, and realizes the transmission of the information under the condition of ensuring that privacy is not leaked; in a communication channel, a block chain technology is adopted to establish a trusted transmission channel, and finally data sharing of the whole Internet of vehicles system is realized.
The embodiments described herein are merely illustrative of the present invention, and those skilled in the art can make modifications, additions or substitutions to the embodiments according to the actual situation without departing from the spirit of the invention or exceeding the scope of the claims.

Claims (3)

1. A BC-LHE based vehicle networking data sharing model, comprising the steps of:
step 1: establishing a transmission cluster based on a block chain trusted channel, and externally hiding the number n of available servers of a cloud server in a system, geographic position GPS (global positioning system), IP (Internet protocol) information and the like to prevent the leakage of key information;
step 2: the cloud server is marked, and the mark of each sub-server is formed by random numbers or characters, so that n IDs are generated and recorded as:x 1 、x 2 、x 3 、… …、x n
and step 3: in order to guarantee the safety of data, before data M is sent, the data is verified by using an MD5 algorithm to ensure the safety of original data; the cloud server carries out primary encryption by using a public key of RSA to obtain encrypted data E;
and 4, step 4: the cloud server generates a random number r, and divides the encrypted data E into r sections to obtain r small data sections with different sizes or lengths:e 1 、e 2 、e 3 、… …、e r
and 5: the cloud server randomly selects the equipment n according to the size of the equipment n in the whole serverkA server for storing the information of the server,kthe type of the code is an odd number, so that the authentication is convenient; segment datae 1 Selected at randomkServers simultaneously performing corresponding encryption operation by using homomorphic encryption to obtain new encrypted dataE 1 ;
Step 6: the selected k servers start to transmit the encrypted dataE 1 And a current time stamptTo a vehicle networking device;
and 7: after receiving the server data, the vehicle-mounted equipment in the vehicle network judges the timestamp, and if the time delay is too long, the data is abandoned;
and 8: if the time delay of the data is within a reasonable range, a reverse process of homomorphic encryption is carried out on the data, and a plurality of groups of encrypted data are obtained by removing the data discarded in the step 7;
and step 9: the vehicle-mounted equipment compares multiple groups of equipment, selects the data with the same quantity and the maximum quantity according to the preferential calculation principle of the block chain, and the data is the data segmente 1
Step 10: repeating the process of the step 5 until the whole data segment is transmitted, and obtaining the vehicle-mounted equipmente 1 、e 2 、e 3 、… …、e n And arranging the data according to the sequence of the time stamps, combining to obtain encrypted data E, and simultaneously restoring the encrypted data by utilizing an RSA algorithm built in the vehicle-mounted equipment to obtain original data M so as to finish the whole data transmission process.
2. The model of claim 1, BC-LHE based vehicle networking data sharing method, comprising the steps of:
1) initializing a system; number of available servers in cloud servernRandom ID of the child server isx i ASCII code value of a file or dataMAnd MD5 valuedPublic key and private key of RSA algorithm, in order to guarantee the security of the data, this system adopts RSA of 1024 bits to encrypt; meanwhile, the RSA private key is sealed in the vehicle-mounted equipment and correspondingly generated according to different mark IDs of the vehicle equipmentThe same public key and private key;
2) the central server in the cloud server compares the files or data with the MD5 and calls a functionMD5(M)Checking whether the value is d;
3) if the value of the function comparison is d, the file data is normal and is not tampered; if the value of the function is not d, the file or the data is unqualified in comparison, the file is abandoned, and the request is repeated;
4) encrypting the qualified data by using RSA public key to obtain encrypted data E, wherein the encryption process is disclosed as followsE = RSA(M)Carrying out encryption;
5) the encrypted data E is segmented by using a random number algorithm, and the specific process is disclosed as followse i = Random (E, r, i)Wherein r represents division into r segments;
6) for n available servers, obtaining random k servers according to a random number algorithm,k = Random(n)
7) will be provided withe i Is sent to the selected k-servers using the time stampt i Performing homomorphic encryption operation to obtain secondary encrypted dataE i = HE(e i , t i )(ii) a At the same time, k servers will encrypt the data twiceE i And time stampt i Transmitting the encrypted information to the vehicle-mounted equipment by using a channel of the block chain;
8) after the vehicle-mounted equipment receives the k data sent by the server, whether the time delay of the transmitted time stamp is within a controllable range or not is compared; if the delay requirement is not met, discarding the data; if the delay requirement is met, performing the next operation;
9) the vehicle-mounted equipment compares the data meeting the delay condition, and selects the data E with the most identical value according to the principle of the block chain maximization algorithmiAccording to the time stamp t deliverediAnd performing decryption operation to obtain small-section data ei = Dec (E)i, ti);
10) Repeating the whole cycle until the transmission of the last encrypted data is finished to obtain all encrypted segment data, and integrating the encrypted segment data according to the time stamp to obtain the original E; and then, a private key sealed in the vehicle-mounted equipment is used for completing a decryption process, so that data secret transmission is realized.
3. According to the claim of claim 1 or 2, a BC-LHE based vehicle networking data sharing system is characterized by comprising:
the central server is responsible for the allocation work of the whole system, and meanwhile, in order to ensure the safety of the system, the central server can change along with the change of time, so that the information leakage of the central server is prevented;
the central server carries out MD5 verification on the initial data, obtains encrypted data E by using RSA encryption on the successfully verified data, and simultaneously segments the encrypted data to obtain segmented data of different segments;
the central server performs task allocation on the available sub-servers in the cloud server, and calls different sub-servers to perform encryption and data transmission work each time according to actual conditions;
the secret key in the vehicle-mounted equipment is packaged according to the vehicle ID, and a strategy that only the inside of the vehicle-mounted equipment is read and the outside cannot be read is adopted, so that the secret key is prevented from being leaked;
the homomorphic encryption process of the whole system is completed according to the time stamp, so that the encrypted data can be restored only according to a fixed sequence in the reverse decryption process of the vehicle-mounted equipment, and the secret transmission of the whole data or the file is realized.
CN202011416254.3A 2020-12-07 2020-12-07 BC-LHE-based vehicle networking data sharing method and system Active CN112422270B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011416254.3A CN112422270B (en) 2020-12-07 2020-12-07 BC-LHE-based vehicle networking data sharing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011416254.3A CN112422270B (en) 2020-12-07 2020-12-07 BC-LHE-based vehicle networking data sharing method and system

Publications (2)

Publication Number Publication Date
CN112422270A true CN112422270A (en) 2021-02-26
CN112422270B CN112422270B (en) 2022-05-17

Family

ID=74775316

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011416254.3A Active CN112422270B (en) 2020-12-07 2020-12-07 BC-LHE-based vehicle networking data sharing method and system

Country Status (1)

Country Link
CN (1) CN112422270B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883407A (en) * 2021-04-04 2021-06-01 湖南科技学院 Privacy data full life cycle protection method and system based on Internet of vehicles
CN116226911A (en) * 2023-01-06 2023-06-06 中电车联信安科技有限公司 Information processing method for preventing track leakage based on vehicle cloud communication
CN116684095A (en) * 2023-08-02 2023-09-01 杭州希智电子有限公司 Sensor data encryption method and system based on Internet of things
CN116866865A (en) * 2023-09-04 2023-10-10 江西五十铃汽车有限公司 Whole vehicle controller data sharing method and system
CN116980890A (en) * 2023-09-20 2023-10-31 北京集度科技有限公司 Information security communication device, method, vehicle and computer program product

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608155A (en) * 2015-12-17 2016-05-25 北京华油信通科技有限公司 Massive data distributed storage system
CN109743177A (en) * 2018-12-29 2019-05-10 湖南大学 A kind of internet of things data management system based on block chain and shared environment
CN110300155A (en) * 2019-05-31 2019-10-01 中国人民解放军国防科技大学 Cognitive Internet of Things spectrum data sharing method based on block chain
US20200029209A1 (en) * 2018-07-23 2020-01-23 Henrik Ferdinand Nölscher Systems and methods for managing wireless communications by a vehicle

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608155A (en) * 2015-12-17 2016-05-25 北京华油信通科技有限公司 Massive data distributed storage system
US20200029209A1 (en) * 2018-07-23 2020-01-23 Henrik Ferdinand Nölscher Systems and methods for managing wireless communications by a vehicle
CN109743177A (en) * 2018-12-29 2019-05-10 湖南大学 A kind of internet of things data management system based on block chain and shared environment
CN110300155A (en) * 2019-05-31 2019-10-01 中国人民解放军国防科技大学 Cognitive Internet of Things spectrum data sharing method based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
KIHO LIM ETAL: "《Nonnegative Matrix Factorization Based Privacy Preservation in Vehicular Communication》", 《IEEE》 *
李萌等: "基于区块链的安全车联网数字取证系统", 《物联网学报》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883407A (en) * 2021-04-04 2021-06-01 湖南科技学院 Privacy data full life cycle protection method and system based on Internet of vehicles
CN112883407B (en) * 2021-04-04 2022-05-24 湖南科技学院 Privacy data full life cycle protection method and system based on Internet of vehicles
CN116226911A (en) * 2023-01-06 2023-06-06 中电车联信安科技有限公司 Information processing method for preventing track leakage based on vehicle cloud communication
CN116226911B (en) * 2023-01-06 2023-10-27 中电车联信安科技有限公司 Information processing method for preventing track leakage based on vehicle cloud communication
CN116684095A (en) * 2023-08-02 2023-09-01 杭州希智电子有限公司 Sensor data encryption method and system based on Internet of things
CN116684095B (en) * 2023-08-02 2023-09-29 杭州希智电子有限公司 Sensor data encryption method and system based on Internet of Things
CN116866865A (en) * 2023-09-04 2023-10-10 江西五十铃汽车有限公司 Whole vehicle controller data sharing method and system
CN116866865B (en) * 2023-09-04 2024-01-26 江西五十铃汽车有限公司 Whole vehicle controller data sharing method and system
CN116980890A (en) * 2023-09-20 2023-10-31 北京集度科技有限公司 Information security communication device, method, vehicle and computer program product
CN116980890B (en) * 2023-09-20 2023-12-22 北京集度科技有限公司 Information security communication device, method, vehicle and computer program product

Also Published As

Publication number Publication date
CN112422270B (en) 2022-05-17

Similar Documents

Publication Publication Date Title
CN112422270B (en) BC-LHE-based vehicle networking data sharing method and system
US11018854B2 (en) Data conversion systems and methods
US11271727B2 (en) End-to-end communication security
Jolfaei et al. Privacy and security of connected vehicles in intelligent transportation system
CN102378170B (en) Method, device and system of authentication and service calling
CN113691502B (en) Communication method, device, gateway server, client and storage medium
CN111095963A (en) Method and architecture for secure ranging
CN107846395A (en) Vehicle-mounted networking
EP2803165B1 (en) System and method of lawful access to secure communications
Singh et al. Introduce reward-based intelligent vehicles communication using blockchain
US10664439B2 (en) Security via dynamic data movement in a cloud-based environment
US11425547B2 (en) Master-slave system for communication over a Bluetooth Low Energy connection
CN110855667B (en) Block chain encryption method, device and system
CN114157415A (en) Data processing method, computing node, system, computer device and storage medium
CN106452770A (en) Data encryption method and apparatus, data decryption method and apparatus, and system
Al‐Balasmeh et al. Framework of data privacy preservation and location obfuscation in vehicular cloud networks
CN114826702A (en) Database access password encryption method and device and computer equipment
CN103138923A (en) Method, device and system for internodal authentication
Keleman et al. Secure firmware update in embedded systems
CN105743859B (en) A kind of method, apparatus and system of light application certification
CN111245611A (en) Anti-quantum computing identity authentication method and system based on secret sharing and wearable equipment
CN108183802B (en) Digital signature generation method and device
CN112069487B (en) Intelligent equipment network communication safety implementation method based on Internet of things
Gharib et al. SCC5G: A PQC-based Architecture for Highly Secure Critical Communication over Cellular Network in Zero-Trust Environment
CN115426195B (en) Data transmission method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230803

Address after: 230000 floor 1, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province

Patentee after: Dragon totem Technology (Hefei) Co.,Ltd.

Address before: 425199 130 Yang Zi Tang Road, Lingling District, Yongzhou, Hunan.

Patentee before: HUNAN University OF SCIENCE AND ENGINEERING

Effective date of registration: 20230803

Address after: 230000 b-1018, Woye Garden commercial office building, 81 Ganquan Road, Shushan District, Hefei City, Anhui Province

Patentee after: HEFEI WISDOM DRAGON MACHINERY DESIGN Co.,Ltd.

Address before: 230000 floor 1, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province

Patentee before: Dragon totem Technology (Hefei) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231107

Address after: Room 538, Yuesheng International Finance Building, No. 972 Science and Technology Museum Street, Xixing Street, Binjiang District, Hangzhou City, Zhejiang Province, 310052

Patentee after: Hangzhou Shiyi Network Technology Co.,Ltd.

Address before: 230000 b-1018, Woye Garden commercial office building, 81 Ganquan Road, Shushan District, Hefei City, Anhui Province

Patentee before: HEFEI WISDOM DRAGON MACHINERY DESIGN Co.,Ltd.

TR01 Transfer of patent right