CN107046529A - A kind of bus or train route Cooperative Security communication means encrypted based on hash - Google Patents
A kind of bus or train route Cooperative Security communication means encrypted based on hash Download PDFInfo
- Publication number
- CN107046529A CN107046529A CN201710006667.6A CN201710006667A CN107046529A CN 107046529 A CN107046529 A CN 107046529A CN 201710006667 A CN201710006667 A CN 201710006667A CN 107046529 A CN107046529 A CN 107046529A
- Authority
- CN
- China
- Prior art keywords
- hash
- hash values
- database
- bus
- character string
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Traffic Control Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of bus or train route Cooperative Security communication means encrypted based on hash, comprise the following steps:1) connectivity request message and PIN code are mixed into one or two character strings by information sender, and the PIN code is exclusive identification code corresponding with information sender;2) hash encryptions are carried out to the secondary character string, generates corresponding hash values;3) receiving party safeguards a database for being stored with multiple hash values, receiving party's receiving step 2) in hash values after, traversal searches the database, judge whether the hash values received are effective, if, then set up and be connected with the secure communication of information sender, if it is not, then refusal connection.Compared with prior art, the present invention has the advantages that safe, achievable access control.
Description
Technical field
The present invention relates to In-vehicle networking and the vehicle safety communications field, more particularly, to a kind of bus or train route encrypted based on hash
Cooperative Security communication means.
Background technology
Following car networking development by depending on the development of its safe practice.The DSRC communication technologys are based in car networking
In, vehicle is attached by vehicle-mounted OBU and driver test system RSU, but can not remain connection, and its connection is in disconnected
Discontinuously continue state, because RSU is individual equipment, its communication range is shorter.And when carrying out information interchange with RSU each time,
It is required for carrying out authentication, hence it is evident that reduce communication quality.It is also to be carried out with the method for digital certificate in authentication method
Authentication, but the current car ownership of China is 1.4 hundred million, this will undoubtedly greatly increase key management and certificate management
Burden, while also reducing the efficiency of certification.
Automobile-used communication encryption mode is broadly divided into symmetric key algorithm, public at present according to the algorithm classification of encryption mechanism
Key algorithm and encryption hash algorithm.Operation and decryption oprerations is encrypted using same key in symmetric key algorithm;It is public
Every a pair of communication body inside key algorithm has a different set of private key and public keys;Encrypting hash algorithm need not
Key, the position character string of random length is converted to the position character string of regular length.Encryption hash algorithm feature is that have unidirectionally
Property, be not suitable for the encryption of exchange of information, but it is then very convenient for checking category information.
The content of the invention
It is an object of the present invention to overcome the above-mentioned drawbacks of the prior art and provide a kind of safe base
The bus or train route Cooperative Security communication means encrypted in hash.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of bus or train route Cooperative Security communication means encrypted based on hash, is comprised the following steps:
1) connectivity request message and PIN code are mixed into one or two character strings by information sender, and the PIN code is and information
The corresponding exclusive identification code of sender;
2) hash encryptions are carried out to the secondary character string, generates corresponding hash values;
3) receiving party safeguards a database for being stored with multiple hash values, receiving party's receiving step 2) in
After hash values, traversal searches the database, judges whether the hash values received are effective, is sent if so, then setting up with information
The secure communication connection of side, if it is not, then refusal connection.
The hybrid mode of the connectivity request message and PIN code is defined by described information sender and receiving party.
The connectivity request message includes the username and password of information sender.
It is described connectivity request message and PIN code are mixed into one or two character strings to be specially:Connectivity request message is changed
For corresponding character string, then the numerical value of every in PIN code is inserted in the character string, generates secondary character string.
Effectively specially whether the hash values for judging to receive:Judge that the database whether there is and receive
The hash values that hash values match, if so, the hash values received are then judged effectively, if it is not, then judging the hash values received
It is invalid.
After the hash values for judging to receive are effective, connectivity request message is obtained according to hash values decryption, response should
Connectivity request message.
Described information sender is vehicle, and described information recipient is another vehicle or road equipment.
A kind of bus or train route Cooperative Security communicator encrypted based on hash, including:
Solicited message mixing module, for the connectivity request message and PIN code of information sender to be mixed into a second word
Symbol string, the PIN code is exclusive identification code corresponding with information sender;
Hash encrypting modules, for carrying out hash encryptions to the secondary character string, generate corresponding hash values;
Database module, the database for multiple hash values that are stored with;
Effective judgement module, for calling the database module, judges whether the hash values received are effective, if
It is then to set up secure communication connection, if it is not, then refusal connection.
The solicited message mixing module includes:
Character string converting unit, for connectivity request message to be converted into corresponding character string;
Character string mixed cell, mixes the character string with PIN code for the hybrid mode according to setting, generates secondary
Character string, the hybrid mode is defined by described information sender and receiving party.
The Effective judgement module includes:
Database traversal queries unit, for database described in traversal queries, judges that database whether there is with receiving
The hash values that match of hash values;
Connection establishment unit, the database traversal queries unit judged result for be when respond, for set up with
The secure communication connection of information sender, connectivity request message is obtained according to hash values decryption, responds connection request letter
Breath;
Refuse information feedback unit, the database traversal queries unit judged result for it is no when respond, for
Information sender sends refusal link information.
Compared with prior art, the present invention has advantages below:
1) present invention is mixed using PIN code to connectivity request message first, then recycles hash algorithm to be added
It is close, realize safe and reliable authentication.In the communication that bus or train route is cooperateed with, system needs to bear from third party attack person's
There is the danger obtained by attacker in malicious access, the information of transmission.Transmit the hash values in information and verify communication for recipient
Ask the important basis for estimation of vehicle.Such as original character string of the attacker by rainbow table decoding hash values, original character string is
Through the username and password for not being information sender vehicle.Therefore attacker can not obtain the user name of real vehicle and close
Code.Meanwhile, vehicle PIN code has uniqueness, and receiving party can realize management and control and sieve by PIN code to the vehicle of access
Choosing, realizes access control.
2) present invention is encrypted using hash algorithm, and hash algorithm has one-way and anti-collision, and hash encryptions are tested
Card can ensure the confidentiality of data.
3) receiving party is verified by way of data base querying hash values, if occurring the situation that information is lost,
Then exception can occur for hash values, it is impossible to pass through the inquiring and authenticating of database, it can be ensured that the integrality of data during information transfer.
4) present invention is applicable not only to the access checking between vehicle and vehicle, is also applied for connecing between vehicle and road equipment
Enter checking, applicability is good.
Brief description of the drawings
Fig. 1 is principle schematic of the invention.
Embodiment
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.The present embodiment is with technical solution of the present invention
Premised on implemented, give detailed embodiment and specific operating process, but protection scope of the present invention is not limited to
Following embodiments.
The present invention provides a kind of bus or train route Cooperative Security communication means encrypted based on hash, when vehicle transmits information, letter
The solicited message of breath sender needs PIN (Personal Identification Number) code plus vehicle itself, presses
After the combination mixing that communicating pair is defined, the information generated produces corresponding hash values by hash encryptions, and information connects
Debit is inquired about according to the hash values received, if the hash values are present in database after inquiry, allows the vehicle to set up
Communication connection, otherwise, refuses the connection request of the vehicle.Accordingly even when information attack person has intercepted and captured the corresponding implication of hash values
The concrete meaning of the information produced by sender can not further be obtained.Described information sender is vehicle, and described information is received
Side is another vehicle or road equipment.
As shown in figure 1, above-mentioned comprised the following steps based on the hash bus or train route Cooperative Security communication means encrypted:
In step s1, communicating pair defines PIN code hybrid mode, the PIN code for it is corresponding with information sender only
One identification code.Hybrid mode refers to that the connectivity request message of setting up of PIN code and information sender vehicle is entered by the form of agreement
Row mixing.PIN code is the exclusive information of vehicle oneself, and third party attack person can not or be difficult to forge.
In step s2, information sender generation connectivity request message, the connectivity request message includes information sender
Username and password.In order to ensure information security, the username and password is secrecy for the third party, and should not be by the 3rd
Person intercepts and captures.
In step s3, connectivity request message and PIN code are mixed into one or two character strings by information sender, are specially:
Connectivity request message is converted into corresponding character string, mixed the character string with PIN code according to the hybrid mode, is generated
Secondary character string.Even if third party attack person has intercepted and captured the username and password of information sender vehicle, this can not be still determined
The form of secondary character string.
The hybrid mode is:The form arranged according to communicating pair, the word is inserted in by the numerical value of every in PIN code
In symbol string, such as:1. before or after PIN code comes the character string;2. according to the numerical value on PIN code every, the word is inserted
By the position for being ordered as the numerical value in symbol string.
In step s4, information sender carries out hash encryptions to the secondary character string, generates corresponding hash values.
The species of Hash AESs has many kinds, the hash functions of such as SHA256, SHA512 Jing Guo safety test, to ensure anti-touch
Hit requirement.
In step s5, receiving party is received after hash values, traversal searching data storehouse, judges the hash values received
Whether effectively, that is, judge whether original transmitted information is effective, the database is safeguarded by receiving party, be stored with multiple hash
Value.
In step s6, after the hash values for judging to receive are effective, connection request is obtained according to hash values decryption
Information, responds the connectivity request message;
In step s7, after the hash values for judging to receive are invalid, refusal link information is sent to information sender, it is real
Existing access control.
Claims (10)
1. a kind of bus or train route Cooperative Security communication means encrypted based on hash, it is characterised in that comprise the following steps:
1) connectivity request message and PIN code are mixed into one or two character strings by information sender, and the PIN code is to be sent with information
The corresponding exclusive identification code in side;
2) hash encryptions are carried out to the secondary character string, generates corresponding hash values;
3) receiving party safeguards a database for being stored with multiple hash values, receiving party's receiving step 2) in hash values
Afterwards, traversal searches the database, judges whether the hash values received are effective, if so, then setting up the peace with information sender
Full communication is connected, if it is not, then refusal connection.
2. the bus or train route Cooperative Security communication means according to claim 1 encrypted based on hash, it is characterised in that the company
The hybrid mode for connecing solicited message and PIN code is defined by described information sender and receiving party.
3. the bus or train route Cooperative Security communication means according to claim 1 encrypted based on hash, it is characterised in that the company
Connecing solicited message includes the username and password of information sender.
4. the bus or train route Cooperative Security communication means according to claim 2 encrypted based on hash, it is characterised in that described to incite somebody to action
Connectivity request message and PIN code are mixed into one or two character strings:Connectivity request message is converted into corresponding character string,
The numerical value of every in PIN code is inserted in the character string again, secondary character string is generated.
5. the bus or train route Cooperative Security communication means according to claim 1 encrypted based on hash, it is characterised in that described to sentence
Effectively specially whether the hash values that disconnecting is received:Judge what the database matched with the presence or absence of the hash values with receiving
Hash values, if so, the hash values received are then judged effectively, if it is not, then judging that the hash values received are invalid.
6. the bus or train route Cooperative Security communication means encrypted according to claim 1 or 5 based on hash, it is characterised in that
After judging the hash values that receive effectively, according to hash values decryption acquisition connectivity request message, respond the connection request and believe
Breath.
7. the bus or train route Cooperative Security communication means according to claim 1 encrypted based on hash, it is characterised in that the letter
Breath sender is vehicle, and described information recipient is another vehicle or road equipment.
8. a kind of bus or train route Cooperative Security communicator encrypted based on hash, it is characterised in that including:
Solicited message mixing module, for the connectivity request message and PIN code of information sender to be mixed into one or two character strings,
The PIN code is exclusive identification code corresponding with information sender;
Hash encrypting modules, for carrying out hash encryptions to the secondary character string, generate corresponding hash values;
Database module, the database for multiple hash values that are stored with;
Effective judgement module, for calling the database module, judges whether the hash values received are effective, if so, then
Secure communication connection is set up, if it is not, then refusal connection.
9. the bus or train route Cooperative Security communicator according to claim 8 encrypted based on hash, it is characterised in that described to ask
Information mixing module is asked to include:
Character string converting unit, for connectivity request message to be converted into corresponding character string;
Character string mixed cell, mixes the character string with PIN code for the hybrid mode according to setting, generates secondary character
String, the hybrid mode is defined by described information sender and receiving party.
10. the bus or train route Cooperative Security communicator according to claim 8 encrypted based on hash, it is characterised in that described
Effective judgement module includes:
Database traversal queries unit, for database described in traversal queries, judges that database whether there is and receive
The hash values that hash values match;
Connection establishment unit, is responded when the judged result of the database traversal queries unit is and is, for foundation and information
The secure communication connection of sender, obtains connectivity request message according to hash values decryption, responds the connectivity request message;
Refuse information feedback unit, the database traversal queries unit judged result for it is no when respond, for information
Sender sends refusal link information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710006667.6A CN107046529B (en) | 2017-01-05 | 2017-01-05 | Vehicle-road cooperative secure communication method based on hash encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710006667.6A CN107046529B (en) | 2017-01-05 | 2017-01-05 | Vehicle-road cooperative secure communication method based on hash encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107046529A true CN107046529A (en) | 2017-08-15 |
CN107046529B CN107046529B (en) | 2020-03-24 |
Family
ID=59542854
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710006667.6A Active CN107046529B (en) | 2017-01-05 | 2017-01-05 | Vehicle-road cooperative secure communication method based on hash encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107046529B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2020039115A (en) * | 2018-08-31 | 2020-03-12 | バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド | Method, equipment and device for transmitting data of intelligent driving car |
CN111491273A (en) * | 2020-03-27 | 2020-08-04 | 中科车港(深圳)实业股份有限公司 | Communication method for road side unit and vehicle-mounted unit |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101262333A (en) * | 2008-04-21 | 2008-09-10 | 上海大学 | A secure communication method between nodes in vehicular network |
CN103581900A (en) * | 2012-08-01 | 2014-02-12 | 中国移动通信集团公司 | Communication safety control method and device, first mobile terminal and mobile health device |
CN104202440A (en) * | 2014-09-02 | 2014-12-10 | 腾讯科技(深圳)有限公司 | Method for identifying terminal, server and system |
CN104579694A (en) * | 2015-02-09 | 2015-04-29 | 浙江大学 | Identity authentication method and system |
US20150281957A1 (en) * | 2012-09-19 | 2015-10-01 | Giesecke & Devrient Gmbh | Subscriber Identity Module for Authenticating a Subscriber on a Communication Network |
CN105681247A (en) * | 2014-11-17 | 2016-06-15 | 中国移动通信集团广东有限公司 | Safety authentication method and device, authentication server and system |
-
2017
- 2017-01-05 CN CN201710006667.6A patent/CN107046529B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101262333A (en) * | 2008-04-21 | 2008-09-10 | 上海大学 | A secure communication method between nodes in vehicular network |
CN103581900A (en) * | 2012-08-01 | 2014-02-12 | 中国移动通信集团公司 | Communication safety control method and device, first mobile terminal and mobile health device |
US20150281957A1 (en) * | 2012-09-19 | 2015-10-01 | Giesecke & Devrient Gmbh | Subscriber Identity Module for Authenticating a Subscriber on a Communication Network |
CN104202440A (en) * | 2014-09-02 | 2014-12-10 | 腾讯科技(深圳)有限公司 | Method for identifying terminal, server and system |
CN105681247A (en) * | 2014-11-17 | 2016-06-15 | 中国移动通信集团广东有限公司 | Safety authentication method and device, authentication server and system |
CN104579694A (en) * | 2015-02-09 | 2015-04-29 | 浙江大学 | Identity authentication method and system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2020039115A (en) * | 2018-08-31 | 2020-03-12 | バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド | Method, equipment and device for transmitting data of intelligent driving car |
US11374688B2 (en) | 2018-08-31 | 2022-06-28 | Apollo Intelligent Driving Technology (Beijing) Co., Ltd. | Data transmission method and device for intelligent driving vehicle, and device |
CN111491273A (en) * | 2020-03-27 | 2020-08-04 | 中科车港(深圳)实业股份有限公司 | Communication method for road side unit and vehicle-mounted unit |
CN111491273B (en) * | 2020-03-27 | 2023-04-18 | 中科车港(深圳)实业股份有限公司 | Communication method for road side unit and vehicle-mounted unit |
Also Published As
Publication number | Publication date |
---|---|
CN107046529B (en) | 2020-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106161032B (en) | A kind of identity authentication method and device | |
CN101340436B (en) | Method and apparatus implementing remote access control based on portable memory apparatus | |
CN101300808B (en) | Method and arrangement for secure autentication | |
CN101136748B (en) | Identification authentication method and system | |
CN100358282C (en) | Key agreement method in WAPI authentication mechanism | |
CN106411533A (en) | On-line fingerprint authentication system and method based on bidirectional privacy protection | |
CN105847235A (en) | Identity based efficient anonymous batch authentication method in IOV (Internet of Vehicles) environment | |
CN107454079A (en) | Lightweight device authentication and shared key machinery of consultation based on platform of internet of things | |
CN113905351B (en) | Internet of vehicles authentication method based on block chain and confidential calculation | |
CN102026180A (en) | M2M transmission control method, device and system | |
CN106850680A (en) | A kind of intelligent identity identification method and device for Transit Equipment | |
CN103427992A (en) | Method for establishing secure communication between nodes in a network, network node, key manager, installation device and computer program product | |
CN112613006B (en) | Power data sharing method and device, electronic equipment and storage medium | |
CN108737323A (en) | A kind of digital signature method, apparatus and system | |
CN106713279A (en) | Video terminal identity authentication system | |
CN106790064A (en) | The method that both sides are communicated in credible root server cloud computing server model | |
CN101814991A (en) | Mutual authentication method and system based on identity | |
CN106230813A (en) | Method for authenticating, authentication device and terminal | |
CN105281902A (en) | Web system safety login method based on mobile terminal | |
CN105490814B (en) | A kind of ticketing service real name identification method and system based on three-dimension code | |
CN107046529A (en) | A kind of bus or train route Cooperative Security communication means encrypted based on hash | |
CN107302535A (en) | A kind of access authentication method and device | |
CN112311553B (en) | Equipment authentication method based on challenge response | |
CN101471775B (en) | Authentication method for MS and BS of WiMAX system | |
CN102143488A (en) | Method for safe communication between reader and electronic tag, reader and electronic tag |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |