CN108366371A - A kind of information communicating method of In-vehicle networking - Google Patents
A kind of information communicating method of In-vehicle networking Download PDFInfo
- Publication number
- CN108366371A CN108366371A CN201810100664.3A CN201810100664A CN108366371A CN 108366371 A CN108366371 A CN 108366371A CN 201810100664 A CN201810100664 A CN 201810100664A CN 108366371 A CN108366371 A CN 108366371A
- Authority
- CN
- China
- Prior art keywords
- center
- key
- lower region
- information
- cloud computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of information communicating methods of In-vehicle networking comprising the step of establishing vehicle-mounted cloud network, the step of management of computing is carried out to vehicle-mounted cloud network and the step of be transmitted to vehicle-mounted data, wherein the step of establishing vehicle-mounted cloud network is:Cloud network computer center is established, the cloud network computer center is used for the data management and certification of lower region cloud computing center, and the lower region cloud computing center is responsible for mobile unit end on the move and handles the data of these equipment ends;Wherein include to the step of vehicle-mounted cloud network progress management of computing:One private cipher key generator of setting provides master key for cloud network computer center;Cloud network computer center first verifies that the first key that lower region cloud computing center is sent, the data of lower region cloud computing center are obtained after being verified to initial key, the key generator of lower region cloud computing center generates second key and is sent to mobile unit.The present invention improves the safety of the information communication of In-vehicle networking.
Description
Technical field
The present invention relates to car information Web security fields, and in particular to the information security field of In-vehicle networking.
Background technology
Currently, with the development of society, the ownership of Chinese automobile is in explosive growth, and with the hair of information technology
Exhibition, for a large amount of high-tech Technology application on automobile, the safety problem of intelligent automobile is increasingly becoming a severe problem.Vehicle
Message spoofing on data/address bus is related to by disguising as being intended to that vehicle is caused to operate in such a way that vehicle operators are undesirable
The module of disparate modules and message is placed into bus.This invasion module can be transmitted in message to bus, and receiving module
These message are handled in the case where not knowing the true source of these message.The consequence that vehicle handles spoofed message can
It can be very serious.
Accordingly, it is desired to provide a kind of for detecting the spoofed message in In-vehicle networking and preventing the non-of these spoofed messages
It is expected that the device of consequence.
Invention content
In view of the drawbacks described above of the prior art, technical problem to be solved by the invention is to provide a kind of the degree of automation
High, the high medical image recognition method based on convolutional neural networks method of accuracy.
Technical solution of the present invention is as follows:
A kind of information communicating method of In-vehicle networking comprising the step of establishing vehicle-mounted cloud network, to vehicle-mounted cloud network into
The step of row management of computing and the step of be transmitted to vehicle-mounted data, wherein the step of establishing vehicle-mounted cloud network is:It establishes
Cloud network computer center, the cloud network computer center are used for lower region cloud computing center, the lower region cloud meter
It is responsible for mobile unit end on the move and handles the data of these equipment ends in calculation center;Wherein vehicle-mounted cloud network is counted
Calculating the step of managing includes:One private cipher key generator of setting provides master key for cloud network computer center;Cloud network meter
Calculation machine center first verifies that the first key that lower region cloud computing center is sent, and lower layer is obtained after being verified to initial key
The data of region cloud computing center, the key generator of lower region cloud computing center generate second key be sent to it is vehicle-mounted
Equipment;The step of being transmitted to vehicle-mounted data end include:The Cryptography Principles of mobile unit end identity-based, it is close in conjunction with second
Key generates a third key, and the vehicle-mounted data of oneself and roadside data are transmitted back to area of lower layer by the third key
Domain cloud computing center, mobile unit end include board units, roadside communication unit, wireless security module and Wireless MESH network,
It is connected between the board units and by the Wireless MESH network between board units and roadside communication unit;It is described
Board units obtain other board units and roadside communication in preset first distance range by the Wireless MESH network
The road safety information that unit is sent, the wireless security module is for analyzing simultaneously the attack information from MESH network
It intercepts, has the database of storage attack information in the wireless security module, for being deposited in the information and date library to sending
The information field of storage is matched, and attack information is shown to be if successful match, is started blocking module and is intercepted, if matching is not
It is successful then store into the storage database of board units, and these data compress, third key is then added, pass through
Channel is sent to lower region cloud center;The board units also analyze acquired road safety information;Work as determination
There are when road safety risk, security alarm information is sent to corresponding board units, and notify in first distance range
Other board units;The roadside communication unit is obtained vehicle-mounted within the scope of default second distance by Wireless MESH network
The road safety information that unit is sent, and acquired road safety information is analyzed;When by analyzing determination, there are roads
When the security risk of road, security alarm information is sent to corresponding board units, and notify other within the scope of the second distance
Board units.
Further, the generating process of the first key is as follows:A security parameter is given, private cipher key generates
Device generates a master key mk and one group of parameter params, and private cipher key generator is distributed to all systems and terminal user
params;In the mark TC for receiving cloud network computer center, using TC as input, by running private key extraction algorithm,
Generate a private cipher key K associated with TCTC;In the mark IS of information storage in receiving region cloud, using IS as defeated
Enter, by running private key extraction algorithm, PKG generates a private cipher key K related to ISIS;Receiving lower region cloud computing
When the service identifiers A at center, using SerA as input, by run private key extraction algorithm, PKG will generate one it is related to SerA
Private cipher key KSerA;In the mark EU for receiving vehicle-mounted user, using EU as input, by running private key extraction algorithm,
PKG will generate one and the relevant private cipher key K of EUEU。
Further, the cloud network computer center includes cloud computing service below:(1) infrastructure services:For
All application programs and service provision requirements disposed in system, the main task of the information management in intelligent grid, including letter
Breath is collected, the task including information processing and information storage is performed in this layer of service;(2) software service SaaS:It is being
The deployment of system top;(3) platform service PaaS:PaaS provides tool and the library of exploitation cloud computing application program and service;(4) number
According to service DaaS.
Further, the cloud network computer center further includes being recognized for the information of lower region cloud computing center
The security authentication center of card, the security authentication center include authenticating user identification module M1, user behavior detecting module M2, close
It is mapping block M3, data safety forwarding module M4 and token generation module M5;The authenticating user identification module M1 for pair
The safety certification request that lower region cloud computing center is sent out is verified, and generates identity spy for lower region cloud computing center
Code is levied, according to the role of lower region cloud computing center, power when wherein identity feature code is the registration of lower region cloud computing center
Limit generates;The user behavior detecting module M2 be used for lower region cloud computing center is proved to be successful after operation behavior into
Line number is according to statistics;The relationship map module M3 is used to store the behavior property pass corresponding with attribute for the user for having passed through certification
System;The data safety forwarding module M4 is used to forward the safety certification request of lower region cloud computing center to the cloud network
Computer center;The token generation module M5 is used to generate token to the user after being verified, and user accesses according to token
The cloud network computer center.
Advantageous effect:The present invention provides a kind of information communicating methods of In-vehicle networking comprising establishes vehicle-mounted cloud network
The step of, the step of management of computing is carried out to vehicle-mounted cloud network and the step of be transmitted to vehicle-mounted data, wherein establishing vehicle
Carry cloud network the step of be:Cloud network computer center is established, the cloud network computer center is used for lower region cloud computing
The data management and certification at center, the lower region cloud computing center are responsible for mobile unit end on the move and handle this
The data of a little equipment ends;By multi-zone supervision and certification, one, which is that of avoiding data volume in mobile unit high-speed mobile, makes greatly very much
It at the collapse of single layer of service device, second is that calculating center is arranged by subregion, is managed respectively, realizes efficiently management, avoid
The problem of causing periods of network disruption is attacked at one;Wherein include to the step of vehicle-mounted cloud network progress management of computing:Setting one
A private cipher key generator provides master key for cloud network computer center;Cloud network computer center first verifies that lower region
The first key that cloud computing center is sent obtains the data of lower region cloud computing center after being verified to initial key, under
The key generator of layer region cloud computing center generates second key and is sent to mobile unit;Vehicle-mounted data end is passed
Defeated step includes:The Cryptography Principles of mobile unit end identity-based generate a third key in conjunction with the second key, pass through
The vehicle-mounted data of oneself and roadside data are transmitted back to lower region cloud computing center by the third key, be exactly based on
These three upper keys, the safety realized between mobile unit and lower region cloud computing center, cloud network computer center are tested
Card avoids hacker from decoding the case where password just attacks whole network at one and occurs, carried out bidirectional safe guarantee;Through the invention
Wireless security module, realize to be easiest to attack board units end equipment safety protection,.It authenticated through the invention
Client provides random number and private key by E-token dynamic password card dynamic in journey, and encryption and signature use symmetric key, mitigate client
End calculates pressure, and improves the safety of certification.In terms of improving authentication efficiency, wherein using the cipher mode of elliptic curve,
Both efficiency is improved, guaranteed safety.Another advantage is that hierarchical identity certification is realized, for mainly facing down
Layer region cloud computing center, mobile unit end realize safety certification, prevent the decoding of one-sided password by password authentification back and forth
With regard to having invaded In-vehicle networking and upper layer network cloud center.The present invention just because of the effect between the above indivisible step,
So that the present invention substantially increases the safety of safety certification.
Description of the drawings
Fig. 1 is the method flow schematic diagram that the present invention provides preferred embodiment.
Specific implementation mode
The invention will be further described with reference to the accompanying drawings and examples:
As shown in Figure 1, a kind of information communicating method of In-vehicle networking comprising the step of establishing vehicle-mounted cloud network, to vehicle
The step of carrying the step of cloud network carries out management of computing and vehicle-mounted data be transmitted, wherein establishing the step of vehicle-mounted cloud network
Suddenly it is:Cloud network computer center is established, the cloud network computer center is used for the data pipe of lower region cloud computing center
Reason and certification, the lower region cloud computing center are responsible for mobile unit end on the move and handle the number of these equipment ends
According to;Wherein include to the step of vehicle-mounted cloud network progress management of computing:A private cipher key generator is arranged to calculate for cloud network
Machine center provides master key;Cloud network computer center first verifies that the first key that lower region cloud computing center is sent, right
Initial key obtains the data of lower region cloud computing center, the key generator of lower region cloud computing center after being verified
It generates second key and is sent to mobile unit;The step of being transmitted to vehicle-mounted data end include:Mobile unit end group in
The Cryptography Principles of identity generate a third key, by the third key by the Vehicular data of oneself in conjunction with the second key
Be transmitted back to lower region cloud computing center according to roadside data, mobile unit end include board units, roadside communication unit,
Wireless security module and Wireless MESH network lead between the board units and between board units and roadside communication unit
Cross the Wireless MESH network connection;The board units obtain preset first apart from model by the Wireless MESH network
The road safety information that other board units and roadside communication unit in enclosing are sent, the wireless security module are used for coming from
The attack information of MESH network is analyzed and is intercepted, and is had the database of storage attack information in the wireless security module, is used
The information field stored in the information and date library to sending matches, and attack information is shown to be if successful match,
Start blocking module to be intercepted, if match it is unsuccessful if store into the storage database of board units, and by these data
Compress and third key is then added, lower region cloud center is sent to by channel;The board units are also to acquired
Road safety information analyzed;When determining there are when road safety risk, security alarm is sent to corresponding board units
Information, and notify other board units in first distance range;The roadside communication unit, passes through Wireless MESH network
Obtain preset second distance within the scope of board units send road safety information, and to acquired road safety information into
Row analysis;It is determined there are when road safety risk when by analyzing, sends security alarm information to corresponding board units, and lead to
Know other board units within the scope of the second distance.
Preferably, the generating process of the first key is as follows:Give a security parameter, private cipher key generator
A master key mk and one group of parameter params is generated, private cipher key generator is distributed to all systems and terminal user
params;In the mark TC for receiving cloud network computer center, using TC as input, by running private key extraction algorithm,
Generate a private cipher key K associated with TCTC;In the mark IS of information storage in receiving region cloud, using IS as defeated
Enter, by running private key extraction algorithm, PKG generates a private cipher key K related to ISIS;Receiving lower region cloud computing
When the service identifiers A at center, using SerA as input, by run private key extraction algorithm, PKG will generate one it is related to SerA
Private cipher key KSerA;In the mark EU for receiving vehicle-mounted user, using EU as input, by running private key extraction algorithm,
PKG will generate one and the relevant private cipher key K of EUEU。
Preferably, the cloud network computer center includes cloud computing service below:(1) infrastructure services:To be
All application programs and service provision requirements disposed in system, the main task of the information management in intelligent grid, including information
It collects, the task including information processing and information storage is performed in this layer of service;(2) software service SaaS:In system
Top is disposed;(3) platform service PaaS:PaaS provides tool and the library of exploitation cloud computing application program and service;(4) data
Service DaaS.
Preferably, the cloud network computer center further includes being authenticated for the information of lower region cloud computing center
Security authentication center, the security authentication center includes authenticating user identification module M1, user behavior detecting module M2, relationship
Mapping block M3, data safety forwarding module M4 and token generation module M5;The authenticating user identification module M1 is used under
The safety certification request that layer region cloud computing center is sent out is verified, and generates identity characteristic for lower region cloud computing center
Role, permission when code, wherein identity feature code are the registrations of lower region cloud computing center according to lower region cloud computing center
It generates;The user behavior detecting module M2 be used for lower region cloud computing center is proved to be successful after operation behavior carry out
Data statistics;The relationship map module M3 is used to store the behavior property pass corresponding with attribute for the user for having passed through certification
System;The data safety forwarding module M4 is used to forward the safety certification request of lower region cloud computing center to the cloud network
Computer center;The token generation module M5 is used to generate token to the user after being verified, and user accesses according to token
The cloud network computer center.Invention uses Encryption Algorithm and signature based on elliptic curve, based on oval bent
The symmetric cryptography mode of line has computation burden small, and the speed of service is fast, safe feature.The safety certification process of the present invention
In due to be frequently encrypted, decryption oprerations enable the encryption system of elliptic curve adequately to embody its encryption
Efficient feature.
Advantage:The present invention provides a kind of information communicating methods of In-vehicle networking comprising establishes the step of vehicle-mounted cloud network
Suddenly the step of management of computing, is carried out to vehicle-mounted cloud network and the step of be transmitted to vehicle-mounted data, wherein establishing vehicle-mounted cloud
The step of network is:Cloud network computer center is established, the cloud network computer center is used for lower region cloud computing center
Data management and certification, the lower region cloud computing center be responsible for mobile unit end on the move and handle these set
The data at standby end;By multi-zone supervision and certification, one is that of avoiding data volume in mobile unit high-speed mobile causes list very much greatly
The collapse of stratum server is managed respectively second is that calculating center is arranged by subregion, is realized efficiently management, is avoided at one
The problem of periods of network disruption is caused by attack;Wherein include to the step of vehicle-mounted cloud network progress management of computing:One private is set
There is key generator to provide master key for cloud network computer center;Cloud network computer center first verifies that lower region cloud meter
The first key that calculation center is sent obtains the data of lower region cloud computing center, area of lower layer after being verified to initial key
The key generator of domain cloud computing center generates second key and is sent to mobile unit;Vehicle-mounted data end is transmitted
Step includes:The Cryptography Principles of mobile unit end identity-based generate a third key, by described in conjunction with the second key
The vehicle-mounted data of oneself and roadside data are transmitted back to lower region cloud computing center by third key, be exactly based on it is above this
Three keys, realize the safety verification between mobile unit and lower region cloud computing center, cloud network computer center, keep away
Exempt from the case where password just attacks whole network at hacker's decoding one to occur, carries out bidirectional safe guarantee;Nothing through the invention
Line security module realizes the equipment safety protection at the board units end to being easiest to attack,.Through the invention in verification process
Client provides random number and private key by E-token dynamic password card dynamic, and encryption and signature use symmetric key, mitigate client meter
Pressure is calculated, and improves the safety of certification.In terms of improving authentication efficiency, wherein using the cipher mode of elliptic curve, both carried
High efficiency, guaranteed safety.Another advantage is that hierarchical identity certification is realized, for mainly facing area of lower layer
Domain cloud computing center, mobile unit end realize safety certification, prevent the decoding of one-sided password from just invading by password authentification back and forth
In-vehicle networking and upper layer network cloud center are entered.The present invention is just because of the effect between the above indivisible step so that
The present invention substantially increases the safety of safety certification.
The preferred embodiment of the present invention has been described in detail above.It should be appreciated that those skilled in the art without
It needs creative work according to the present invention can conceive and makes many modifications and variations.Therefore, all technologies in the art
Personnel are available by logical analysis, reasoning, or a limited experiment on the basis of existing technology under this invention's idea
Technical solution, all should be in the protection domain being defined in the patent claims.
Claims (4)
1. a kind of information communicating method of In-vehicle networking, which is characterized in that include the steps that establishing vehicle-mounted cloud network, to vehicle-mounted cloud
The step of network carries out the step of management of computing and is transmitted to vehicle-mounted data, wherein the step of establishing vehicle-mounted cloud network
For:Cloud network computer center is established, the cloud network computer center is used for the data management of lower region cloud computing center
And certification, the lower region cloud computing center are responsible for mobile unit end on the move and handle the number of these equipment ends
According to;Wherein include to the step of vehicle-mounted cloud network progress management of computing:A private cipher key generator is arranged to calculate for cloud network
Machine center provides master key;Cloud network computer center first verifies that the first key that lower region cloud computing center is sent, right
Initial key obtains the data of lower region cloud computing center, the key generator of lower region cloud computing center after being verified
It generates second key and is sent to mobile unit;The step of being transmitted to vehicle-mounted data end include:Mobile unit end group in
The Cryptography Principles of identity generate a third key, by the third key by the Vehicular data of oneself in conjunction with the second key
Be transmitted back to lower region cloud computing center according to roadside data, mobile unit end include board units, roadside communication unit,
Wireless security module and Wireless MESH network lead between the board units and between board units and roadside communication unit
Cross the Wireless MESH network connection;The board units obtain preset first apart from model by the Wireless MESH network
The road safety information that other board units and roadside communication unit in enclosing are sent, the wireless security module are used for coming from
The attack information of MESH network is analyzed and is intercepted, and is had the database of storage attack information in the wireless security module, is used
The information field stored in the information and date library to sending matches, and attack information is shown to be if successful match,
Start blocking module to be intercepted, if match it is unsuccessful if store into the storage database of board units, and by these data
Compress and third key is then added, lower region cloud center is sent to by channel;The board units are also to acquired
Road safety information analyzed;When determining there are when road safety risk, security alarm is sent to corresponding board units
Information, and notify other board units in first distance range;The roadside communication unit, passes through Wireless MESH network
Obtain preset second distance within the scope of board units send road safety information, and to acquired road safety information into
Row analysis;It is determined there are when road safety risk when by analyzing, sends security alarm information to corresponding board units, and lead to
Know other board units within the scope of the second distance.
2. the information communicating method of In-vehicle networking according to claim 1, which is characterized in that the first key
Generating process is as follows:A security parameter is given, private cipher key generator generates a master key mk and one group of parameter params,
Private cipher key generator distributes params to all systems and terminal user;In the mark for receiving cloud network computer center
When TC, a private cipher key K associated with TC is generated by running private key extraction algorithm using TC as inputTC;It is receiving
To in the cloud of region when the mark IS of information storage, using IS as input, by running private key extraction algorithm, PKG generate one with
IS correlation private cipher keys KIS;In the service identifiers A for receiving lower region cloud computing center, using SerA as input, pass through
Private key extraction algorithm is run, PKG will generate one and the relevant private cipher key K of SerASerA;In the mark for receiving vehicle-mounted user
When EU, using EU as input, by running private key extraction algorithm, PKG will generate one and the relevant private cipher key K of EUEU。
3. the information communicating method of In-vehicle networking according to claim 1, which is characterized in that in the cloud network computer
Pericardium includes cloud computing service below:(1) infrastructure services:Being there is provided for all application programs disposed in system and service needs
It asks, the main task of the information management in intelligent grid, including information is collected, the task including information processing and information storage exists
It is performed in this layer of service;(2) software service SaaS:It is disposed in system head;(3) platform service PaaS:PaaS is provided
Develop tool and the library of cloud computing application program and service;(4) data service DaaS.
4. the information communicating method of In-vehicle networking according to claim 3, which is characterized in that in the cloud network computer
The heart further includes the security authentication center being authenticated for the information of lower region cloud computing center, the security authentication center packet
Include authenticating user identification module M1, user behavior detecting module M2, relationship map module M3, data safety forwarding module M4 and order
Board generation module M5;The safety certification request that the authenticating user identification module M1 is used to send out lower region cloud computing center
It is verified, and identity feature code is generated for lower region cloud computing center, wherein identity feature code is lower region cloud computing
Role, permission build when center is registered according to lower region cloud computing center;The user behavior detecting module M2 for pair
Lower region cloud computing center be proved to be successful after operation behavior carry out data statistics;The relationship map module M3 is for depositing
Storage has passed through the correspondence of the behavior property and attribute of the user of certification;Under the data safety forwarding module M4 is for forwarding
The safety certification request of layer region cloud computing center gives the cloud network computer center;The token generation module M5 for pair
User after being verified generates token, and user accesses the cloud network computer center according to token.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810100664.3A CN108366371A (en) | 2018-02-01 | 2018-02-01 | A kind of information communicating method of In-vehicle networking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810100664.3A CN108366371A (en) | 2018-02-01 | 2018-02-01 | A kind of information communicating method of In-vehicle networking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108366371A true CN108366371A (en) | 2018-08-03 |
Family
ID=63004212
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810100664.3A Pending CN108366371A (en) | 2018-02-01 | 2018-02-01 | A kind of information communicating method of In-vehicle networking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108366371A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109636948A (en) * | 2019-01-31 | 2019-04-16 | 上海易点时空网络有限公司 | Data processing method and device based on onboard system |
CN111464570A (en) * | 2020-06-23 | 2020-07-28 | 广州赛瑞科技股份有限公司 | New energy automobile detection data encryption method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103780393A (en) * | 2014-01-15 | 2014-05-07 | 重庆邮电大学 | Virtual-desktop security certification system and method facing multiple security levels |
CN106101253A (en) * | 2016-07-04 | 2016-11-09 | 宁波芯路通讯科技有限公司 | In-vehicle networking communication system |
-
2018
- 2018-02-01 CN CN201810100664.3A patent/CN108366371A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103780393A (en) * | 2014-01-15 | 2014-05-07 | 重庆邮电大学 | Virtual-desktop security certification system and method facing multiple security levels |
CN106101253A (en) * | 2016-07-04 | 2016-11-09 | 宁波芯路通讯科技有限公司 | In-vehicle networking communication system |
Non-Patent Citations (1)
Title |
---|
JOONSANG BAEK: "A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid", 《IEEE TRANSACTIONS ON CLOUD COMPUTING》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109636948A (en) * | 2019-01-31 | 2019-04-16 | 上海易点时空网络有限公司 | Data processing method and device based on onboard system |
CN111464570A (en) * | 2020-06-23 | 2020-07-28 | 广州赛瑞科技股份有限公司 | New energy automobile detection data encryption method and device |
CN111464570B (en) * | 2020-06-23 | 2020-10-09 | 广州赛瑞科技股份有限公司 | New energy automobile detection data encryption method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Javaid et al. | A scalable protocol for driving trust management in internet of vehicles with blockchain | |
CN112218294B (en) | 5G-based access method and system for Internet of things equipment and storage medium | |
CN114154135B (en) | Internet of vehicles communication security authentication method, system and equipment based on state cryptographic algorithm | |
CN110069918B (en) | Efficient double-factor cross-domain authentication method based on block chain technology | |
CN108964919B (en) | Lightweight anonymous authentication method with privacy protection based on Internet of vehicles | |
Yu et al. | Lightweight three-factor-based privacy-preserving authentication scheme for iot-enabled smart homes | |
CN102201915B (en) | Terminal authentication method and device based on single sign-on | |
Wang et al. | A novel lightweight authentication protocol for emergency vehicle avoidance in VANETs | |
CN105553666B (en) | Intelligent power terminal safety authentication system and method | |
CN113301022B (en) | Internet of things equipment identity security authentication method based on block chain and fog calculation | |
CN111435913A (en) | Identity authentication method and device for terminal of Internet of things and storage medium | |
CN109005538A (en) | Towards the message authentication method between automatic driving vehicle and more mobile edge calculations servers | |
Jaidhar | Enhanced mutual authentication scheme for cloud architecture | |
CN113395166B (en) | Edge computing-based power terminal cloud edge terminal collaborative security access authentication method | |
CN113971274B (en) | Identity recognition method and device | |
CN113595985A (en) | Internet of things security cloud platform implementation method based on state cryptographic algorithm security chip | |
CN106454825B (en) | A kind of vehicle assistant authentification method under car networking environment | |
Mahmood et al. | A provably secure mobile user authentication scheme for big data collection in IoT-enabled maritime intelligent transportation system | |
CN114125773A (en) | Vehicle networking identity management system and management method based on block chain and identification password | |
CN108337119A (en) | A kind of information exchange and security authentication systems of In-vehicle networking | |
CN115515127A (en) | Vehicle networking communication privacy protection method based on block chain | |
CN108366371A (en) | A kind of information communicating method of In-vehicle networking | |
CN110572392A (en) | Identity authentication method based on HyperLegger network | |
CN113612616A (en) | Vehicle communication method and device based on block chain | |
CN111682936B (en) | Kerberos authentication method based on physical unclonable function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180803 |