CN107046529B - Vehicle-road cooperative secure communication method based on hash encryption - Google Patents

Vehicle-road cooperative secure communication method based on hash encryption Download PDF

Info

Publication number
CN107046529B
CN107046529B CN201710006667.6A CN201710006667A CN107046529B CN 107046529 B CN107046529 B CN 107046529B CN 201710006667 A CN201710006667 A CN 201710006667A CN 107046529 B CN107046529 B CN 107046529B
Authority
CN
China
Prior art keywords
information
hash
character string
encryption
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710006667.6A
Other languages
Chinese (zh)
Other versions
CN107046529A (en
Inventor
罗峰
胡强
谢凌风
常欣伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tongji University
Original Assignee
Tongji University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tongji University filed Critical Tongji University
Priority to CN201710006667.6A priority Critical patent/CN107046529B/en
Publication of CN107046529A publication Critical patent/CN107046529A/en
Application granted granted Critical
Publication of CN107046529B publication Critical patent/CN107046529B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Traffic Control Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a vehicle-road cooperative secure communication method based on hash encryption, which comprises the following steps: 1) the information sender mixes the connection request information and a PIN code into a primary and secondary character string, wherein the PIN code is a unique identification code corresponding to the information sender; 2) carrying out hash encryption on the secondary character string to generate a corresponding hash value; 3) the information receiver maintains a database storing a plurality of hash values, after receiving the hash values in the step 2), the information receiver searches the database in a traversing way, judges whether the received hash values are valid, if so, establishes a safe communication connection with the information sender, and if not, refuses the connection. Compared with the prior art, the method has the advantages of high safety, access control realization and the like.

Description

Vehicle-road cooperative secure communication method based on hash encryption
Technical Field
The invention relates to the field of vehicle-mounted network and vehicle safety communication, in particular to a vehicle-road cooperative safety communication method based on hash encryption.
Background
The development of the internet of vehicles in the future will depend on the development of its safety technology. In the vehicle networking based DSRC communication technology, a vehicle is connected through an on-board OBU and a drive test system RSU, but cannot always be connected, and the connection is in an intermittent state because the RSU is a single device and the communication range is short. And when the RSU carries out information exchange each time, identity authentication is required, and the communication quality is obviously reduced. In the authentication method, identity authentication is also performed by using a digital certificate method, but the current automobile holding amount in China is 1.4 hundred million, which undoubtedly increases the burden of key management and certificate management, and reduces the authentication efficiency.
The vehicular communication encryption mode is classified according to the algorithm of an encryption mechanism, and is mainly classified into a symmetric key algorithm, a public key algorithm and an encryption hash algorithm at present. The symmetric key algorithm uses the same key to carry out encryption operation and decryption operation; each pair of communicators within the public key algorithm has a set of different private and public keys; the encryption hash algorithm does not need a secret key, and converts a bit string with any length into a bit string with a fixed length. The encryption hash algorithm is characterized by having unidirectionality, is not suitable for encrypting the communication information, but is very convenient for verifying the information.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provide a vehicle-road cooperative secure communication method based on hash encryption, which is high in safety.
The purpose of the invention can be realized by the following technical scheme:
a vehicle-road cooperative secure communication method based on hash encryption comprises the following steps:
1) the information sender mixes the connection request information and a PIN code into a primary and secondary character string, wherein the PIN code is a unique identification code corresponding to the information sender;
2) carrying out hash encryption on the secondary character string to generate a corresponding hash value;
3) the information receiver maintains a database storing a plurality of hash values, after receiving the hash values in the step 2), the information receiver searches the database in a traversing way, judges whether the received hash values are valid, if so, establishes a safe communication connection with the information sender, and if not, refuses the connection.
The mixed mode of the connection request information and the PIN code is defined by the information sender and the information receiver.
The connection request information comprises a user name and a password of the information sender.
The mixing of the connection request information and the PIN code into the primary and secondary character strings specifically comprises: and converting the connection request information into a corresponding character string, and inserting the numerical value of each bit in the PIN code into the character string to generate a secondary character string.
The specific step of judging whether the received hash value is valid is as follows: and judging whether the database has a hash value matched with the received hash value, if so, judging that the received hash value is valid, and if not, judging that the received hash value is invalid.
And after the received hash value is judged to be valid, decrypting according to the hash value to obtain connection request information, and responding to the connection request information.
The information sender is a vehicle, and the information receiver is another vehicle or road facility.
A vehicle road cooperative security communication device based on hash encryption comprises:
the request information mixing module is used for mixing the connection request information of the information sender and a PIN code into a primary and secondary character string, wherein the PIN code is a unique identification code corresponding to the information sender;
the hash encryption module is used for carrying out hash encryption on the secondary character string to generate a corresponding hash value;
the database module is used for storing a database in which a plurality of hash values are stored;
and the validity judging module is used for calling the database module and judging whether the received hash value is valid, if so, establishing safe communication connection, and if not, refusing the connection.
The request information mixing module includes:
a character string converting unit for converting the connection request information into a corresponding character string;
and the character string mixing unit is used for mixing the character string and the PIN code according to a set mixing mode to generate a secondary character string, and the mixing mode is defined by the information sender and the information receiver.
The validity judging module comprises:
the database traversal query unit is used for traversing and querying the database and judging whether the database has a hash value matched with the received hash value;
the connection establishing unit is used for responding when the judgment result of the database traversal query unit is yes, establishing a safe communication connection with an information sender, decrypting according to the hash value to obtain connection request information, and responding to the connection request information;
and the reject information feedback unit responds when the judgment result of the database traversal query unit is negative, and is used for sending reject connection information to the information sender.
Compared with the prior art, the invention has the following advantages:
1) the invention firstly adopts PIN code to mix the connection request information, and then utilizes hash algorithm to encrypt, thereby realizing safe and reliable identity authentication. In the communication of vehicle-road coordination, the system needs to bear malicious access from a third-party attacker, and the transmitted information has the danger of being acquired by the attacker. The hash value in the transmission information is an important judgment basis for the receiver to verify the communication request vehicle. If an attacker breaks the original character string of the hash value through the rainbow table, the original character string is not the user name and the password of the vehicle of the information sender. The attacker cannot obtain the user name and password of the real vehicle. Meanwhile, the PIN code of the vehicle has uniqueness, and an information receiver can control and screen the accessed vehicle through the PIN code to realize access control.
2) The invention adopts the hash algorithm for encryption, the hash algorithm has the advantages of unidirectionality and collision resistance, and the confidentiality of data can be ensured through hash encryption verification.
3) The information receiver verifies the hash value by means of database query, if the information is lost, the hash value is abnormal, the query verification of the database cannot be passed, and the integrity of the data during information transmission can be ensured.
4) The method and the device are not only suitable for the access verification between the vehicles, but also suitable for the access verification between the vehicles and road facilities, and have good applicability.
Drawings
Fig. 1 is a schematic diagram of the principle of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and specific embodiments. The present embodiment is implemented on the premise of the technical solution of the present invention, and a detailed implementation manner and a specific operation process are given, but the scope of the present invention is not limited to the following embodiments.
The invention provides a vehicle-road cooperative safety communication method based on hash encryption, when a vehicle transmits information, the request information of an information sender needs to be added with a PIN (personal Identification number) code of the vehicle, after the request information is mixed according to a combination mode defined by two communication parties, the generated information generates a corresponding hash value through hash encryption, an information receiver inquires according to the received hash value, if the hash value exists in a database after inquiry, the vehicle is allowed to establish communication connection, otherwise, the connection request of the vehicle is rejected. Therefore, even if the information attacker intercepts the meaning corresponding to the hash value, the information attacker cannot further acquire the specific meaning of the information generated by the sender. The information sender is a vehicle, and the information receiver is another vehicle or road facility.
As shown in fig. 1, the vehicle-road cooperative secure communication method based on hash encryption includes the following steps:
in step s1, the two communicating parties define a PIN code mixing mode, wherein the PIN code is a unique identification code corresponding to the information sender. The hybrid mode refers to that the PIN code and the connection establishment request information of the vehicle of the information sender are mixed in an agreed form. The PIN code is unique information of the vehicle, and cannot be forged or is difficult to forge by a third-party attacker.
In step s2, the information sender generates connection request information including the user name and password of the information sender. To ensure information security, the username and password are kept secret from the third party and should not be intercepted by the third party.
In step s3, the information sender mixes the connection request information and the PIN code into a secondary character string, specifically: and converting the connection request information into a corresponding character string, and mixing the character string and the PIN code according to the mixing mode to generate a secondary character string. Even if a third-party attacker intercepts the user name and the password of the information sender vehicle, the form of the secondary character string cannot be determined.
The mixing mode is that according to the form agreed by the two communication parties, the numerical value of each bit in the PIN code is inserted into the character string, for example, ① PIN code is arranged before or after the character string, ② according to the numerical value of each bit of the PIN code, the numerical value is inserted into the character string and the position of the numerical value is sorted.
In step s4, the sender hash-encrypts the secondary string to generate a corresponding hash value. The types of the Hash encryption algorithm are various, such as a Hash function of SHA256, SHA512 and the like which is subjected to a safety test, so as to ensure the anti-collision requirement.
In step s5, after receiving the hash value, the information receiver traverses the lookup database, and determines whether the received hash value is valid, that is, determines whether the original transmission information is valid, where the database is maintained by the information receiver and stores multiple hash values.
In step s6, after determining that the received hash value is valid, decrypting according to the hash value to obtain connection request information, and responding to the connection request information;
in step s7, after determining that the received hash value is invalid, the access control is implemented by sending connection rejection information to the information sender.

Claims (10)

1. A vehicle-road cooperative secure communication method based on hash encryption is characterized by comprising the following steps:
1) the information sender mixes the connection request information and a PIN code into a primary and secondary character string, wherein the PIN code is a unique identification code corresponding to the information sender;
2) carrying out hash encryption on the secondary character string to generate a corresponding hash value;
3) the information receiver maintains a database storing a plurality of hash values, after receiving the hash values in the step 2), the information receiver searches the database in a traversing way, judges whether the received hash values are valid, if so, establishes a safe communication connection with the information sender, and if not, refuses the connection.
2. The hash-encryption-based vehicle-road cooperative secure communication method as claimed in claim 1, wherein a mixed manner of the connection request information and the PIN code is defined by the information sender and the information receiver.
3. The hash encryption-based vehicle-road cooperative secure communication method as claimed in claim 1, wherein the connection request information includes a user name and a password of an information sender.
4. The hash encryption-based vehicle-road cooperative secure communication method as claimed in claim 2, wherein the mixing of the connection request information and the PIN code into a secondary character string specifically comprises: and converting the connection request information into a corresponding character string, and inserting the numerical value of each bit in the PIN code into the character string to generate a secondary character string.
5. The hash-encryption-based vehicle-road cooperative secure communication method according to claim 1, wherein the determining whether the received hash value is valid specifically comprises: and judging whether the database has a hash value matched with the received hash value, if so, judging that the received hash value is valid, and if not, judging that the received hash value is invalid.
6. The vehicle-road cooperative security communication method based on hash encryption as claimed in claim 1 or 5, wherein after the received hash value is determined to be valid, connection request information is obtained by decryption according to the hash value, and the connection request information is responded.
7. The hash encryption-based vehicle-road cooperative secure communication method as claimed in claim 1, wherein the information sender is a vehicle, and the information receiver is another vehicle or a road facility.
8. The utility model provides a car road is safety communication device in coordination based on hash is encrypted which characterized in that includes:
the request information mixing module is used for mixing the connection request information of the information sender and a PIN code into a primary and secondary character string, wherein the PIN code is a unique identification code corresponding to the information sender;
the hash encryption module is used for carrying out hash encryption on the secondary character string to generate a corresponding hash value;
the database module is used for storing a database in which a plurality of hash values are stored;
and the validity judging module is used for calling the database module and judging whether the received hash value is valid, if so, establishing safe communication connection, and if not, refusing the connection.
9. The hash-encryption-based vehicular access cooperative security communication apparatus according to claim 8, wherein the request information mixing module comprises:
a character string converting unit for converting the connection request information into a corresponding character string;
and the character string mixing unit is used for mixing the character string and the PIN code according to a set mixing mode to generate a secondary character string, and the mixing mode is defined by the information sender and the information receiver.
10. The hash encryption-based vehicle-road cooperative security communication device according to claim 8, wherein the validity judgment module comprises:
the database traversal query unit is used for traversing and querying the database and judging whether the database has a hash value matched with the received hash value;
the connection establishing unit is used for responding when the judgment result of the database traversal query unit is yes, establishing a safe communication connection with an information sender, decrypting according to the hash value to obtain connection request information, and responding to the connection request information;
and the reject information feedback unit responds when the judgment result of the database traversal query unit is negative, and is used for sending reject connection information to the information sender.
CN201710006667.6A 2017-01-05 2017-01-05 Vehicle-road cooperative secure communication method based on hash encryption Active CN107046529B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710006667.6A CN107046529B (en) 2017-01-05 2017-01-05 Vehicle-road cooperative secure communication method based on hash encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710006667.6A CN107046529B (en) 2017-01-05 2017-01-05 Vehicle-road cooperative secure communication method based on hash encryption

Publications (2)

Publication Number Publication Date
CN107046529A CN107046529A (en) 2017-08-15
CN107046529B true CN107046529B (en) 2020-03-24

Family

ID=59542854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710006667.6A Active CN107046529B (en) 2017-01-05 2017-01-05 Vehicle-road cooperative secure communication method based on hash encryption

Country Status (1)

Country Link
CN (1) CN107046529B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110875797B (en) * 2018-08-31 2022-11-08 阿波罗智能技术(北京)有限公司 Data transmission method, device and equipment for intelligently driving automobile
CN111491273B (en) * 2020-03-27 2023-04-18 中科车港(深圳)实业股份有限公司 Communication method for road side unit and vehicle-mounted unit

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262333A (en) * 2008-04-21 2008-09-10 上海大学 A secure communication method between nodes in vehicular network
CN103581900A (en) * 2012-08-01 2014-02-12 中国移动通信集团公司 Communication safety control method and device, first mobile terminal and mobile health device
CN104202440A (en) * 2014-09-02 2014-12-10 腾讯科技(深圳)有限公司 Method for identifying terminal, server and system
CN104579694A (en) * 2015-02-09 2015-04-29 浙江大学 Identity authentication method and system
CN105681247A (en) * 2014-11-17 2016-06-15 中国移动通信集团广东有限公司 Safety authentication method and device, authentication server and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102012018540A1 (en) * 2012-09-19 2014-03-20 Giesecke & Devrient Gmbh Subscriber identity module for authenticating a subscriber to a communication network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262333A (en) * 2008-04-21 2008-09-10 上海大学 A secure communication method between nodes in vehicular network
CN103581900A (en) * 2012-08-01 2014-02-12 中国移动通信集团公司 Communication safety control method and device, first mobile terminal and mobile health device
CN104202440A (en) * 2014-09-02 2014-12-10 腾讯科技(深圳)有限公司 Method for identifying terminal, server and system
CN105681247A (en) * 2014-11-17 2016-06-15 中国移动通信集团广东有限公司 Safety authentication method and device, authentication server and system
CN104579694A (en) * 2015-02-09 2015-04-29 浙江大学 Identity authentication method and system

Also Published As

Publication number Publication date
CN107046529A (en) 2017-08-15

Similar Documents

Publication Publication Date Title
US9800413B2 (en) System and method for performing an asymmetric key exchange between a vehicle and a remote device
CN106161032B (en) A kind of identity authentication method and device
CN108683647B (en) Data transmission method based on multiple encryption
CN110324335B (en) Automobile software upgrading method and system based on electronic mobile certificate
CN111479244B (en) V2I Internet of vehicles identity authentication system and method
US9077542B2 (en) System and method for confirming that a user of an electronic device is an authorized user of a vehicle
Wang et al. NOTSA: Novel OBU with three-level security architecture for internet of vehicles
US20100191973A1 (en) System and method for establishing a secure connection with a mobile device
CN105635147A (en) Vehicle-mounted-special-equipment-system-based secure data transmission method and system
CN102457377A (en) Role-based web remote authentication and authorization method and system thereof
CN102868531B (en) Networked transaction certification system and method
CN113781678B (en) Vehicle Bluetooth key generation and authentication method and system in networking-free environment
CN107493165B (en) Internet of vehicles authentication and key agreement method with strong anonymity
CN112396735B (en) Internet automobile digital key safety authentication method and device
Babu et al. Robust authentication protocol for dynamic charging system of electric vehicles
CN115396121A (en) Security authentication method for security chip OTA data packet and security chip device
CN115550069B (en) Intelligent charging system of electric automobile and safety protection method thereof
CN111083696A (en) Communication verification method and system, mobile terminal and vehicle terminal
CN111539496A (en) Vehicle information two-dimensional code generation method, two-dimensional code license plate, authentication method and system
CN107046529B (en) Vehicle-road cooperative secure communication method based on hash encryption
CN115515127A (en) Vehicle networking communication privacy protection method based on block chain
CN115499119A (en) PUF-based vehicle authentication method with privacy protection function
CN1612522A (en) Challenge-based authentication without requiring knowledge of secret authentication data
CN113098833B (en) Information safety control method of vehicle, client device and server device
CN113115255A (en) Certificate issuing method, secret key authentication method, vehicle unlocking method, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant