CN107682149A - A kind of method of the vehicular ad hoc network secret protection close based on label - Google Patents
A kind of method of the vehicular ad hoc network secret protection close based on label Download PDFInfo
- Publication number
- CN107682149A CN107682149A CN201711009706.4A CN201711009706A CN107682149A CN 107682149 A CN107682149 A CN 107682149A CN 201711009706 A CN201711009706 A CN 201711009706A CN 107682149 A CN107682149 A CN 107682149A
- Authority
- CN
- China
- Prior art keywords
- message
- generation
- tra
- key
- vehicle node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A kind of method of the vehicular ad hoc network secret protection close based on label is claimed in the present invention, and this method is used for solving Privacy Protection when vehicle node (OBU) communicates with roadside unit (RSU) under car networking environment.On the basis of data signature mechanism and assumed name mechanism, the present invention proposes a kind of close mechanism of label, and the mechanism is an Integrated Solution of integration encryption and signature, in the method, passes through secret protection of the assumed name mechanism realization to vehicle node.Under vehicle net environment, vehicle node by the identity information of oneself by being sent to TRA (generation assumed names, key corresponding to the private key of key generation centre generation assumed name, vehicle node using the assumed name and key of generation message sign it is close after be sent to roadside unit, roadside unit is decrypted and verified to message with private key after receiving message, is verified then received message.
Description
Technical field
The invention belongs to cryptography and car networking security fields, the secret protection of user particularly under car networking environment.
Background technology
According to the statistics to car accident, etesian motor-vehicle accident is more than 6,000,000 on United States highways.It is probably more
It is dead because of such accident in 42000 people, meanwhile, therefore and injured personnel about 3,000,000, and so caused by pass through
Ji loss is more than 23,000,000,000.It is especially surprising that in the U.S., 5 people are about had per hour and are fled in these accidents, namely it is average
Just have within every 12 minutes 1 people death.To alleviate the threat that these potential crash events are brought, and improve driving for driver
Experience is sailed, car manufactures have made huge effort be equipped with wireless device to each automobile with telecommunications enterprise.So,
Between vehicle and the roadside infrastructure of vehicle and highway key node such as delivery or can be mutual between building a station
Communication, by being that car networking is also arisen at the historic moment., can be fully real between vehicle and between vehicle and road side facility in car networking
Show the exchange of information and share, beacon message real-time perception road like is passed through by car networking driver and traffic administration platform
Condition, help driver the traffic accident such as effectively avoid vehicle collision, knock into the back from improving road safety, while also improve traffic administration
Intelligence degree.Car networking has a wide range of applications, and is safety-relevant applications first, such as danger position alerts and collision avoids
Deng as far as possible the common feature of this kind of application is exactly closely bound up with the life security of people, and such service will be helpful to avoid endangering
The accident of evil life occurs.Therefore, in this type of application safety be must overriding concern, also must be compulsory execution.
The correctness of all operations must all be guaranteed in these applications, even if there is attacker, should also ensure its peace
Quan Xing.Next to that non-security class application, such as non-parking charge service, location Based service, access, remote diagnosis etc..It is aobvious
So, security is the indispensable attribute of this kind of service, particularly in chargeable service.In general, this kind of application is wanted to time delay
Ask not high.
In recent years, with the development and progress of technology, and active demand of the people to traffic safety and efficiency,
VANET shows the trend of fast development, and it is a huge promotion to safe driving and traffic administration that it, which creates and risen,.But
It is that VANET security and privacy protection problem is also increasingly prominent, and particularly people are to various leakage of private information in VANET
Worry, which even becomes, restricts the further bottleneck problems disposed with development of VANET.Only ensure the various necessary privacies of user
Information is effectively protected, and effectively contains the malice illegal activities stolen based on privacy, could really provide one
Good traffic environment so that vehicle driver and crew do not have trouble and worry when using VANET.
Car networking (Vehicular ad hoc network, abbreviation VANET) is that one kind emerging in recent years is mobile from group
Network is Internet of Things tide intelligent transportation field it is emerging one in important application form, relate generally to mobile ad hoc network
Network and sensor network, have become academia and the common study hotspot of industrial quarters in recent years.VANET is intended to lift road friendship
Logical traffic safety and driving efficiency, it can effectively strengthen traffic safety, take precautions against to administer congestion and improve and drive environment, have and compel
The functional need cut, wide application prospect, and the great strategic significance to improve People's livelihood.But meanwhile privacy information in VANET
Compare abundant and very sensitive, big plus scale, speed is fast, it is open the features such as so that VANET faces serious privacy leakage
Threaten.People are less likely to receive and participated in the case where its safety of worry and individual privacy cannot be ensured fully
VANET, this seriously constrains VANET further development and application.Therefore, design effective Privacy Preservation Mechanism just gradually into
In order to VANET studies with designing, using urgent, basic and challenge vital with one in deployment the problem of.
At present, increasing researcher puts into this hot fields, has excavated many problems, and have accumulated many achievements.
By the network analysis of security threat and privacy requirements to car networking, sum up that identity is there are in car networking is hidden
Private and two main privacy concerns of location privacy.The present invention is absorbed in the privacy of identities that demand is most urgent in VANET applications and protected
This main study subject is protected, system analyzes VANET secret protections field related notion, demand for security and present Research,
It has extensively studied based on the close VANET Privacy Preservation Mechanisms of label.
The existing safety communication technology based on VANET usually considers the confirmability and confidentiality of message respectively,
But in practical application, we often need the two properties simultaneously, therefore, how to design efficiently and have the two simultaneously
The Privacy Preservation Mechanism of property undoubtedly has realistic meaning very much.
The content of the invention
Present invention seek to address that above problem of the prior art.A kind of effectively prevention rogue attacks are proposed, ensure that logical
The security of letter, greatly improve system efficiency based on the method for signing close vehicular ad hoc network secret protection.This hair
Bright technical scheme is as follows:
A kind of method of the vehicular ad hoc network secret protection close based on label, it comprises the following steps:
S1, system initialization step:Key generation centre PKG and trusted party TRA generation system common parameters, and system
System common parameter is preloaded onto in the tamper resistant device of each vehicle node;
S2, assumed name generation and private key generation step:The true identity of oneself is sent to TRA generation assumed names by vehicle node,
And obtained assumed name is issued into PKG to generate private key;
It is S3, close to message label and the step of send:Vehicle node uses the assumed name that TRA is generated in step S2 to be generated with PKG
Private key message sign close handle and be sent to roadside unit;
S4, the step of message is decrypted and verified:Roadside unit is disappeared after receiving the message of encryption with the private key decryption of oneself
Cease and verify the validity of message, verification process can batch operation.
Further, step S1 key generation centres and trusted authority are centrally generated system common parameter, including as follows
Step:
S11:Key generation centre PKG is initialized, and PKG selects random number s to calculate P as main private keypub=sP is as master
Public key;
S12:Trusted party TRA is initialized, and TRA selects random number t to calculate P as private keytra=tP is as public key, generation
The cryptographic Hash function H of four safety1, H2, H3And H4, initialization system common parameter is { G1,G2,q,P,Ppub,Ptra,H1,H2,
H3,H4}。
Further, the generation of step S2 assumed names and private key generation step comprise the following steps:
S21:The true identity of oneself is sent to TRA generation assumed names by vehicle node, is comprised the following steps:
S211:Vehicle node chooses random number diCalculate PIDi,1=diP, then by (RIDi,PIDi,1) it is sent to TRA;
S212:TRA receives (RIDi,PIDi,1) after, calculateWherein tiIt is
The effective time limit of assumed name, PIDi=(PIDi,1,PIDi,2,ti) it is vehicle node assumed name;
S22:The vehicle node assumed name of generation is sent to key, wherein step S22 bags corresponding to PKG generation assumed names by TRA
Include following steps:
S221:PKG chooses random number kiCalculate Ki=kiP and si=ki+H2(PIDi,Ki) × smodq is as vehicle node
Private key.
Further, the step S3 vehicle nodes to message sign close including as follows using the assumed name and key of generation
Step:
S311:Choose random number riCalculateWherein Mi=PIDi||
Ki||sti||mi, wherein stiIt is to carry out signing close timestamp, miIt is origination message, YRIt is the public key of roadside unit;
S312:Sign it is close after the completion of by ci=(Ri,Vi,Zi) it is sent to roadside unit as signing close ciphertext.
Further, the step of step S4 is decrypted and verified to message includes as follows:
S41:Roadside unit calculates after receiving messageMessage is decrypted, wherein xR
It is the private key and Y of roadside unitR=xRP;
S42:First verify that stiWhether effectively, invalid then direct refuse information, effectively the message of decryption is carried out again
Checking, calculate cryptographic HashAnd the Formula V such as checkingiP=hi,2Ri+Ki+hi,1PpubWhether into
Stand, the received message if setting up, otherwise refuse information;
S43:To message batch validation, roadside unit first carries out polymerization processing to the message received, verifies equation (∑
Vi) P=(∑ hi,2Ri)+∑Ki+(∑hi,1)PpubWhether set up, then message is effective for establishment, otherwise abandons message.
Further, the vehicular ad hoc network model is made up of four entities, is trusted authority center TRA respectively, close
Key generation center PKG, vehicle node OBU and roadside unit RSU, TRA are responsible for system initialization generation common parameter and vehicle
The registration of node, registration generation assumed name are simultaneously sent to PKG;PKG is responsible for the generation of key, and it is close to choose random-number-generating system master
Key, the assumed name for receiving TRA transmissions generate the related key of assumed name and are sent to vehicle node afterwards;Vehicle node uses generation
Assumed name and roadside unit are communicated.
Further, the AES that the vehicular ad hoc network model uses is built upon on two-wire group, meets two-wire
Property mapping property, the definition of bilinear map is given below:If G1And G2It is the multiplicative cyclic group that two ranks are prime number p.G is
G1Generation member, bilinear map e:G1×G1→G2, this is mapped with following characteristic:
(1) bilinearity:For any u, v ∈ G1,a,b∈Zp,e(ua,vb)=e (u, v)ab;
(2) non degenerate:e(g,g)≠1;
(3) computability:For any u, v ∈ G1, can effectively calculate e (u, v).
Advantages of the present invention and have the beneficial effect that:
The present invention is based on signing close and assumed name mechanism, and proposition is a kind of to sign the close vehicular ad hoc network privacy guarantor being combined with assumed name
Protection mechanism, the mechanism are effectively protected the privacy of identities problem of vehicle node by assumed name mechanism;By signing close mechanism not only
Signature authentication during communication can be realized, and message is transmitted in a manner of ciphertext, only possesses user's ability of key
Message is decrypted, effectively prevents rogue attacks, ensure that the security of communication;Roadside unit is disappeared using batch validation plan-validation
Breath, greatly improve the efficiency of system.
Brief description of the drawings
Fig. 1 is the system model of the preferred embodiment of the present invention;
Fig. 2 is the FB(flow block) of the preferred embodiment of the present invention;
Fig. 3 is system initialization step;
Fig. 4 is generation assumed name and association key step;
Fig. 5 is that vehicle node carries out signing close and forwarding step to message;
Fig. 6 is that roadside unit receives message and verification step.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, detailed
Carefully describe.Described embodiment is only the part of the embodiment of the present invention.
The present invention solve above-mentioned technical problem technical scheme be:
The vehicular ad hoc network Privacy Preservation Mechanism close based on label provided by the invention, comprises the following steps, referring to Fig. 2:
1st, it is a kind of based on close vehicular ad hoc network method for secret protection is signed, comprise the following steps
S1:System initialization, key generation centre (Private Key Generator, PKG) and trusted authority center
(TrustedAuthority) generate system common parameter, wherein system common parameter include Bilinear Groups G that two ranks are p and
GT, generation member g and bilinear map e in G:G×G|GT, four hash functions, systematic parameter is preloaded onto each vehicle node
Anti-tamper center (Tamperproofdevice);Referring to Fig. 3
Further, step S1 comprises the following steps:
S11:PKG is initialized, and generates system common parameter, and PKG selects random number s to calculate P as main private keypub=sP makees
For main public key
S12:TRA is initialized, and TRA selects random number t to calculate P as private keytra=tP is as public key.Generate four Hash
Function, system common parameter are { G1,G2,q,P,Ppub,Ptra,H1,H2,H3,H4}
S2:Assumed name is generated and the true identity of oneself is sent to trusted authority center by private key generation, vehicle node
(TrustedAuthority) assumed name is generated, key generation centre (PrivateKey Generator, PKG) generates the private of assumed name
Key;Referring to Fig. 4;
Further, step S2 comprises the following steps:
S21:The true identity of oneself is sent to TRA generation assumed names by vehicle node;
Wherein step S21 comprises the following steps:
S211:Vehicle node chooses random number diCalculate PIDi,1=diP, then by (RIDi,PIDi,1) it is sent to TRA;
S212:TRA receives (RIDi,PIDi,1) after, calculatetiIt is assumed name
Effective time limit, PIDi=(PIDi,1,PIDi,2,ti) it is assumed name;
S22:The assumed name of generation is sent to key corresponding to PKG generation assumed names by TRA;
Wherein step S22 comprises the following steps:
S221:PKG chooses random number kiCalculate Ki=kiP and si=ki+H2(PIDi,Ki) × smodq is as vehicle node
Private key pair;
S3:Close to message label and send, vehicle node to message sign and close handle and be sent to using the assumed name of generation
Roadside unit (RSU);Referring to Fig. 5;
Further, step S3 comprises the following steps:
S31:Vehicle node to message sign close using the assumed name and key of generation;
Wherein, step S31 comprises the following steps:
S311:Choose random number riCalculateWherein Mi=PIDi|
|Ki||sti||mi, stiIt is to carry out signing close timestamp, miIt is origination message, YRIt is the public key of roadside unit.
S312:Sign it is close after the completion of by ci=(Ri,Vi,Zi) it is sent to roadside unit as signing close ciphertext.
S4:Message is decrypted and verified, roadside unit is decrypted message with the private key of oneself after receiving the message of encryption and tested
Demonstrate,prove the validity of message (step includes batch certificate scheme, and both roadside unit can be with one-time authentication multiple messages);Referring to figure
6;
Further, step S4 comprises the following steps:
S41:Roadside unit calculates after receiving messageMessage is decrypted, wherein xR
It is the private key and Y of roadside unitR=xRP;
S42:First verify that stiWhether effectively, invalid then direct refuse information, effectively the message of decryption is carried out again
Checking, calculateThe Formula V such as checkingiP=hi,2Ri+Ki+hi,1PpubWhether set up, if setting up
Then received message.
S43:To message batch validation, roadside unit first carries out polymerization processing to the message received, verifies equation (∑
Vi) P=(∑ hi,2Ri)+∑Ki+(∑hi,1)PpubWhether set up.It is effective to set up then message, otherwise abandons message.
The above embodiment is interpreted as being merely to illustrate the present invention rather than limited the scope of the invention.
After the content for having read the record of the present invention, technical staff can make various changes or modifications to the present invention, these equivalent changes
Change and modification equally falls into the scope of the claims in the present invention.
Claims (7)
- It is 1. a kind of based on the method for signing close vehicular ad hoc network secret protection, it is characterised in that to comprise the following steps:S1, system initialization step:Key generation centre and trusted authority are centrally generated system common parameter, and system is public Parameter is preloaded onto the tamper resistant device TPD of each vehicle node altogether;S2, assumed name generation and private key generation step:First, the true identity of oneself is sent to trusted party TRA by vehicle node Assumed name is generated, then, key generation centre PKG calculates private key and its safety is sent into vehicle node;It is S3, close to message label and the step of send:Vehicle node uses the private of the assumed name that TRA is generated in step S2 and PKG generations Key carries out signing close processing and is sent to roadside unit to message;S4, the step of message is decrypted and verified:Roadside unit receives and decrypts message simultaneously with the private key of oneself after the message of encryption Verify the validity of message.
- It is 2. according to claim 1 based on the method for signing close vehicular ad hoc network secret protection, it is characterised in that step S1 key generation centres and trusted authority are centrally generated system common parameter, comprise the following steps:S11:Trusted party TRA and key generation centre PKG is initialized, TRA generation multilinear pairing relevant parameters, including G1, G2,q,P,e:G1×G1→G2, wherein, G1And G2It is the cyclic group that two exponent numbers are q, P is group G1Generation member, e is bilinearity Mapping, PKG select random number s to calculate P as main private keypub=sP is as Your Majesty's key;S12:Trusted authority center TRA is initialized, and TRA selects random number t to calculate P as private keytra=tP is as public key, choosing Select the cryptographic Hash function H of four safety1,H2,H3And H4, system common parameter is { G1,G2,q,P,Ppub,Ptra,H1,H2,H3, H4}。
- It is 3. according to claim 2 based on the method for signing close vehicular ad hoc network secret protection, it is characterised in that described Step S2 assumed names generate and private key generation step comprises the following steps:S21:The true identity of oneself is sent to TRA generation assumed names by vehicle node, is comprised the following steps:S211:Vehicle node chooses random number diAnd calculate PIDi,1=diP, then by true identity information RIDiWith value PIDiOne Rise and be sent to TRA;S212:TRA receives (RIDi,PIDi,1) after, calculate PIDi,2=RIDi⊕H1(Ptra,tPIDi,1,ti), wherein tiIt is false The effective time limit of name, PIDi=(PIDi,1,PIDi,2,ti) be the vehicle assumed name;S22:TRA by the vehicle node assumed name of generation be sent to PKG generation assumed name corresponding to key, comprise the following steps:S221:PKG chooses random number kiCalculate Ki=kiP and si=ki+H2(PIDi,KiPrivate keys pair of the) × smodq as vehicle.
- It is 4. according to claim 3 based on the method for signing close vehicular ad hoc network secret protection, it is characterised in that described Step S3 vehicle nodes carry out signing close comprise the following steps using the assumed name and key of generation to message:S311:Choose random number riAnd calculateWherein Mi=PIDi||Ki| |sti||mi, stiIt is to carry out signing close timestamp, miIt is origination message, YRIt is the public key of roadside unit;S312:Sign it is close after the completion of by ci=(Ri,Vi,Zi) it is sent to roadside unit as signing close cipher-text message.
- It is 5. according to claim 4 based on the method for signing close vehicular ad hoc network secret protection, it is characterised in that described The step of step S4 is decrypted and verified to message includes as follows:S41:Roadside unit calculates M after receiving messagei=Zi⊕H4(YR,xRRi,Ri) message is decrypted, wherein xRIt is trackside The private key and Y of unitR=xRP;S42:First verify that stiWhether effectively, invalid then direct refuse information, effectively the message of decryption is verified again, Calculate cryptographic HashAnd the Formula V such as checkingiP=hi,2Ri+Ki+hi,1PpubWhether set up, if into Vertical then received message, otherwise refuse the message;S43:In addition, batch validation can also be carried out to message, roadside unit first carries out polymerization processing to the message received, verifies Equation (∑ Vi) P=(∑ hi,2Ri)+∑Ki+(∑hi,1)PpubWhether set up, then message is effective for establishment, otherwise abandons message.
- 6. being existed based on the method for signing close vehicular ad hoc network secret protection, its feature according to one of claim 1-5 In, the vehicular ad hoc network model is made up of four entities, be respectively trusted authority center TRA, key generation centre PKG, Vehicle node OBU and roadside unit RSU, TRA are responsible for the registration of system initialization generation common parameter and vehicle node, registration Generation assumed name is simultaneously sent to PKG;PKG is responsible for the generation of key, chooses random-number-generating system master key, receives TRA transmissions The related key of assumed name is generated after assumed name and is sent to vehicle node;Vehicle node is entered using the assumed name and roadside unit of generation Row communication.
- It is 7. according to claim 6 based on the method for signing close vehicular ad hoc network secret protection, it is characterised in that described The AES that vehicular ad hoc network model uses is built upon on two-wire group, is met the property of bilinear map, is given below The definition of bilinear map:If G1And G2It is the multiplicative cyclic group that two ranks are prime number p, g is G1Generation member, bilinear map e:G1×G1→G2, this is mapped with following characteristic:(1) bilinearity:For any u, v ∈ G1,a,b∈Zp,e(ua,vb)=e (u, v)ab;(2) non degenerate:e(g,g)≠1;(3) computability:For any u, v ∈ G1, can effectively calculate e (u, v).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711009706.4A CN107682149A (en) | 2017-10-25 | 2017-10-25 | A kind of method of the vehicular ad hoc network secret protection close based on label |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711009706.4A CN107682149A (en) | 2017-10-25 | 2017-10-25 | A kind of method of the vehicular ad hoc network secret protection close based on label |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107682149A true CN107682149A (en) | 2018-02-09 |
Family
ID=61142787
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711009706.4A Pending CN107682149A (en) | 2017-10-25 | 2017-10-25 | A kind of method of the vehicular ad hoc network secret protection close based on label |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107682149A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108322486A (en) * | 2018-05-07 | 2018-07-24 | 安徽大学 | Authentication protocol towards multiserver framework under a kind of car networking cloud environment |
CN108965313A (en) * | 2018-07-31 | 2018-12-07 | 安徽大学 | A kind of vehicle violation information issuing method, system and storage medium |
CN109145614A (en) * | 2018-07-12 | 2019-01-04 | 电子科技大学 | The aircraft method for secret protection of low-cost in a kind of General Aviation |
CN109391631A (en) * | 2018-11-28 | 2019-02-26 | 重庆邮电大学 | It is a kind of with the car networking anonymous authentication system and method controllably linked |
CN109996215A (en) * | 2019-03-31 | 2019-07-09 | 南京信息工程大学 | A kind of multi-path communications method based on privacy sharing under vehicular ad hoc network network environment |
CN110234093A (en) * | 2019-07-04 | 2019-09-13 | 南京邮电大学 | Internet of things equipment encryption method based on IBE under a kind of car networking environment |
CN110418342A (en) * | 2019-08-08 | 2019-11-05 | 深圳成谷科技有限公司 | Management method, device and the equipment of long term keys |
CN110493748A (en) * | 2019-09-12 | 2019-11-22 | 上海海事大学 | A kind of road conditions detection Verification System and method based on mist |
CN111429724A (en) * | 2020-04-23 | 2020-07-17 | 安徽大学 | Traffic data deduplication obtaining method |
CN111698650A (en) * | 2020-06-16 | 2020-09-22 | 郑州信大捷安信息技术股份有限公司 | Digital certificate state cooperation query method, communication method and system |
CN112702172A (en) * | 2020-12-24 | 2021-04-23 | 北方工业大学 | Parking service privacy protection system and method based on v2p |
CN112804646A (en) * | 2021-01-04 | 2021-05-14 | 湖州师范学院 | Location service algorithm based on re-encryption and pseudonym exchange |
CN113556730A (en) * | 2021-06-10 | 2021-10-26 | 长沙理工大学 | Method and system for protecting identity privacy of Internet of vehicles and storage medium |
CN114363858A (en) * | 2022-03-21 | 2022-04-15 | 苏州浪潮智能科技有限公司 | Conversation and registration method, system and related components of cellular internet of vehicles cooperative communication |
CN114826716A (en) * | 2022-04-18 | 2022-07-29 | 重庆邮电大学 | Internet of vehicles condition privacy protection method based on certificate-free group signcryption |
CN115297456A (en) * | 2022-08-02 | 2022-11-04 | 安徽大学 | Road evading method facing emergency rescue scene in VANET |
US11783697B2 (en) | 2019-06-13 | 2023-10-10 | Here Global B.V. | Method, apparatus, and system for ensuring privacy while maintaining floating car data accuracy |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101820626A (en) * | 2009-10-19 | 2010-09-01 | 兰州理工大学 | Wireless MESH network ID based partially blind signature method without credible PKG (Private Key Generator) |
KR101400275B1 (en) * | 2013-02-18 | 2014-05-28 | 부경대학교 산학협력단 | Message delivery method using identity-hidden message index in vehicular ad-hoc networks |
CN103986574A (en) * | 2014-05-16 | 2014-08-13 | 北京航空航天大学 | Hierarchical identity-based broadcast encryption method |
CN104038936A (en) * | 2014-06-04 | 2014-09-10 | 东南大学 | Secrete key management method for hierarchical wireless sensor network |
CN104683112A (en) * | 2015-03-20 | 2015-06-03 | 江苏大学 | Vehicle-vehicle security communication method based on RSU assisted authentication |
CN105763558A (en) * | 2016-01-20 | 2016-07-13 | 华东师范大学 | Distributed aggregation authentication method having privacy protection function for vehicle-mounted self-organizing network |
CN106027519A (en) * | 2016-05-18 | 2016-10-12 | 安徽大学 | Efficient condition privacy protection and security authentication method in internet of vehicles |
CN106059766A (en) * | 2016-08-04 | 2016-10-26 | 河海大学 | Method and system for protecting condition privacy of internet of vehicles based on certificateless batch verification |
CN106452762A (en) * | 2016-11-25 | 2017-02-22 | 东南大学 | Identity-based high-efficiency data transmission method in vehicular ad hoc network |
US9602290B2 (en) * | 2014-10-16 | 2017-03-21 | Infineon Technologies Ag | System and method for vehicle messaging using a public key infrastructure |
-
2017
- 2017-10-25 CN CN201711009706.4A patent/CN107682149A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101820626A (en) * | 2009-10-19 | 2010-09-01 | 兰州理工大学 | Wireless MESH network ID based partially blind signature method without credible PKG (Private Key Generator) |
KR101400275B1 (en) * | 2013-02-18 | 2014-05-28 | 부경대학교 산학협력단 | Message delivery method using identity-hidden message index in vehicular ad-hoc networks |
CN103986574A (en) * | 2014-05-16 | 2014-08-13 | 北京航空航天大学 | Hierarchical identity-based broadcast encryption method |
CN104038936A (en) * | 2014-06-04 | 2014-09-10 | 东南大学 | Secrete key management method for hierarchical wireless sensor network |
US9602290B2 (en) * | 2014-10-16 | 2017-03-21 | Infineon Technologies Ag | System and method for vehicle messaging using a public key infrastructure |
CN104683112A (en) * | 2015-03-20 | 2015-06-03 | 江苏大学 | Vehicle-vehicle security communication method based on RSU assisted authentication |
CN105763558A (en) * | 2016-01-20 | 2016-07-13 | 华东师范大学 | Distributed aggregation authentication method having privacy protection function for vehicle-mounted self-organizing network |
CN106027519A (en) * | 2016-05-18 | 2016-10-12 | 安徽大学 | Efficient condition privacy protection and security authentication method in internet of vehicles |
CN106059766A (en) * | 2016-08-04 | 2016-10-26 | 河海大学 | Method and system for protecting condition privacy of internet of vehicles based on certificateless batch verification |
CN106452762A (en) * | 2016-11-25 | 2017-02-22 | 东南大学 | Identity-based high-efficiency data transmission method in vehicular ad hoc network |
Non-Patent Citations (1)
Title |
---|
温靖宇: ""车联网中匿名认证方案与安全协议的研究"", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108322486B (en) * | 2018-05-07 | 2021-06-01 | 安徽大学 | Authentication method for multi-server architecture under Internet of vehicles cloud environment |
CN108322486A (en) * | 2018-05-07 | 2018-07-24 | 安徽大学 | Authentication protocol towards multiserver framework under a kind of car networking cloud environment |
CN109145614A (en) * | 2018-07-12 | 2019-01-04 | 电子科技大学 | The aircraft method for secret protection of low-cost in a kind of General Aviation |
CN108965313A (en) * | 2018-07-31 | 2018-12-07 | 安徽大学 | A kind of vehicle violation information issuing method, system and storage medium |
CN108965313B (en) * | 2018-07-31 | 2021-04-06 | 安徽大学 | Vehicle violation information publishing method, system and storage medium |
CN109391631A (en) * | 2018-11-28 | 2019-02-26 | 重庆邮电大学 | It is a kind of with the car networking anonymous authentication system and method controllably linked |
CN109391631B (en) * | 2018-11-28 | 2021-07-13 | 重庆邮电大学 | Internet of vehicles anonymous authentication system and method with controllable links |
CN109996215A (en) * | 2019-03-31 | 2019-07-09 | 南京信息工程大学 | A kind of multi-path communications method based on privacy sharing under vehicular ad hoc network network environment |
US11783697B2 (en) | 2019-06-13 | 2023-10-10 | Here Global B.V. | Method, apparatus, and system for ensuring privacy while maintaining floating car data accuracy |
CN110234093B (en) * | 2019-07-04 | 2021-11-26 | 南京邮电大学 | Internet of things equipment encryption method based on IBE (Internet of things) in Internet of vehicles environment |
CN110234093A (en) * | 2019-07-04 | 2019-09-13 | 南京邮电大学 | Internet of things equipment encryption method based on IBE under a kind of car networking environment |
CN110418342A (en) * | 2019-08-08 | 2019-11-05 | 深圳成谷科技有限公司 | Management method, device and the equipment of long term keys |
CN110418342B (en) * | 2019-08-08 | 2022-03-25 | 深圳成谷科技有限公司 | Long-term secret key management method, device and equipment |
CN110493748A (en) * | 2019-09-12 | 2019-11-22 | 上海海事大学 | A kind of road conditions detection Verification System and method based on mist |
CN110493748B (en) * | 2019-09-12 | 2022-09-30 | 上海海事大学 | Fog-based road condition detection and authentication method |
CN111429724A (en) * | 2020-04-23 | 2020-07-17 | 安徽大学 | Traffic data deduplication obtaining method |
CN111429724B (en) * | 2020-04-23 | 2022-02-15 | 安徽大学 | Traffic data deduplication obtaining method |
CN111698650A (en) * | 2020-06-16 | 2020-09-22 | 郑州信大捷安信息技术股份有限公司 | Digital certificate state cooperation query method, communication method and system |
CN111698650B (en) * | 2020-06-16 | 2022-02-11 | 郑州信大捷安信息技术股份有限公司 | Digital certificate state cooperation query method, communication method and system |
CN112702172B (en) * | 2020-12-24 | 2023-04-25 | 北方工业大学 | Parking service privacy protection system and method based on v2p |
CN112702172A (en) * | 2020-12-24 | 2021-04-23 | 北方工业大学 | Parking service privacy protection system and method based on v2p |
CN112804646B (en) * | 2021-01-04 | 2022-11-22 | 湖州师范学院 | Location service algorithm based on re-encryption and pseudonym exchange |
CN112804646A (en) * | 2021-01-04 | 2021-05-14 | 湖州师范学院 | Location service algorithm based on re-encryption and pseudonym exchange |
CN113556730B (en) * | 2021-06-10 | 2022-05-27 | 长沙理工大学 | Method and system for protecting identity privacy of Internet of vehicles and storage medium |
CN113556730A (en) * | 2021-06-10 | 2021-10-26 | 长沙理工大学 | Method and system for protecting identity privacy of Internet of vehicles and storage medium |
CN114363858A (en) * | 2022-03-21 | 2022-04-15 | 苏州浪潮智能科技有限公司 | Conversation and registration method, system and related components of cellular internet of vehicles cooperative communication |
CN114826716A (en) * | 2022-04-18 | 2022-07-29 | 重庆邮电大学 | Internet of vehicles condition privacy protection method based on certificate-free group signcryption |
CN114826716B (en) * | 2022-04-18 | 2024-02-27 | 西安华企众信科技发展有限公司 | Internet of vehicles condition privacy protection method based on certificate-free group signcryption |
CN115297456A (en) * | 2022-08-02 | 2022-11-04 | 安徽大学 | Road evading method facing emergency rescue scene in VANET |
CN115297456B (en) * | 2022-08-02 | 2024-03-26 | 安徽大学 | Road avoidance method facing emergency rescue scene in VANET |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107682149A (en) | A kind of method of the vehicular ad hoc network secret protection close based on label | |
Basudan et al. | A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing | |
Liu et al. | Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm | |
Zheng et al. | A traceable blockchain-based access authentication system with privacy preservation in VANETs | |
Li et al. | EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks | |
Dua et al. | Secure message communication protocol among vehicles in smart city | |
Tzeng et al. | Enhancing security and privacy for identity-based batch verification scheme in VANETs | |
CN106027519B (en) | High efficiency condition secret protection and safety certifying method in car networking | |
Huang et al. | PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs | |
CN106059766B (en) | A kind of car networking condition method for secret protection and system based on no certificate batch verifying | |
Ma et al. | Blockchain-driven trusted data sharing with privacy protection in IoT sensor network | |
CN101674304B (en) | Network identity authentication system and method | |
Kang et al. | Efficient authentication and access control of message dissemination over vehicular ad hoc network | |
CN106713326A (en) | Vehicle-mounted network message authentication protocol | |
Raya et al. | The security of VANETs | |
CN106131059A (en) | A kind of network condition method for secret protection and system based on the car without certificate aggregate signature | |
Qin et al. | Preserving security and privacy in large-scale VANETs | |
CN106302406A (en) | Close car networking condition method for secret protection and system is signed based on without certificate polymerization | |
Roman et al. | Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment | |
CN109362062A (en) | VANETs anonymous authentication system and method based on ID-based group ranking | |
CN108696493A (en) | Authentication and message distributing system and method in a kind of car networking | |
Kim et al. | Security issues in vehicular networks | |
Li et al. | Lattice-based conditional privacy-preserving authentication protocol for the vehicular ad hoc network | |
Baee et al. | ALI: Anonymous lightweight inter-vehicle broadcast authentication with encryption | |
Jia et al. | EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180209 |
|
RJ01 | Rejection of invention patent application after publication |