CN109362062B - ID-based group signature-based VANETs anonymous authentication system and method - Google Patents

ID-based group signature-based VANETs anonymous authentication system and method Download PDF

Info

Publication number
CN109362062B
CN109362062B CN201811391465.9A CN201811391465A CN109362062B CN 109362062 B CN109362062 B CN 109362062B CN 201811391465 A CN201811391465 A CN 201811391465A CN 109362062 B CN109362062 B CN 109362062B
Authority
CN
China
Prior art keywords
obu
unit
vehicle
roadside
vehicle unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811391465.9A
Other languages
Chinese (zh)
Other versions
CN109362062A (en
Inventor
高天寒
齐珈玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN201811391465.9A priority Critical patent/CN109362062B/en
Publication of CN109362062A publication Critical patent/CN109362062A/en
Application granted granted Critical
Publication of CN109362062B publication Critical patent/CN109362062B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/46Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of wireless network security, and provides a VANETs anonymous authentication system based on an ID-based group signature. The invention also provides a method for anonymous authentication by using the system, wherein a third-party trust mechanism generates an initial pseudonym, an initial trust value and a signature private key for a vehicle unit, the vehicle unit and the roadside unit execute a V2I authentication protocol after generating the signature private key, a group private key and a group public key for the roadside unit, the vehicle unit executes a V2V authentication protocol among the vehicle units and generates a shared key when the vehicle units are legal, and finally the roadside unit assists the third-party trust mechanism to track the real identity of the vehicle unit which sends the malicious message and further process the real identity. The invention can ensure the anonymity of the identity of the vehicle node, avoid the expense of certificate storage and management, and improve the privacy protection strength and the authentication efficiency.

Description

ID-based group signature-based VANETs anonymous authentication system and method
Technical Field
The invention relates to the technical field of wireless network security, in particular to a VANETs anonymous authentication system and method based on ID-based group signature.
Background
In recent years, with the rapid development of ad hoc networks and Internet of things (IoT), intelligent transportation systems have become a research hotspot in academic and industrial circles. As an important component in the field of intelligent transportation, Vehicle Ad hoc Networks (VANETs) are an effective technology that can provide wide safety applications for Vehicle users, and are special mobile Ad hoc Networks that connect road entities such as vehicles and roadside infrastructures with a traffic network to form an intelligent network by using vehicles as basic information units and using technologies such as wireless access. It relies On a Trusted Authority (TAs), vehicle units (RSUs) and roadside units (OBUs), where RSUs are widely distributed at the Road edge to meet specific services, while OBUs are installed in VANETs's vehicles. By means of dedicated short-range communication technology (DSRC), nodes in the network are able to communicate with roadside Infrastructure unit nodes (V2I) or with other Vehicle unit nodes (V2V) during free-driving. By broadcasting information such as position, direction, speed, traffic incident and the like at regular time, a user can obtain real-time road condition information and information of neighbor vehicle nodes to avoid traffic risks. The VANETs can effectively prevent potential traffic hidden dangers, provide a new solution for collecting and releasing traffic safety information, accident early warning, accident investigation, vehicle-mounted office entertainment and the like, and also provide point-to-point (P2P) service for users and value-added services for accessing Internet and the like so as to realize functions of collaborative safe driving, intelligent scheduling, charging service and the like among vehicles. Therefore, the VANETs can enhance the driving experience of vehicle users, improve the life quality of people and have great significance for the development of intelligent cities.
However, VANETs also have a number of security issues. The VANETs are an open access environment and have high privacy sensitivity, and if an illegal attacker accesses a network, a plurality of privacy information of a legal node, such as user identity, driving track and the like, can be easily stolen. If the security sensitive network cannot consider and solve the security problem, threats, risks and loopholes exist, and economic loss and even life security are extremely easy to bring to users. The security protocols of VANETs must guarantee basic security requirements (authentication and non-repudiation) and privacy (identity and location privacy) of the vehicle user from being accessed, tracked or analyzed by unauthorized entities.
In the current VANETs access authentication method, an anonymous authentication technology is mostly adopted, so that privacy protection is realized while authentication reliability is achieved, and meanwhile, the method can well cope with flow analysis attacks. In the current VANETs anonymous access authentication method, the most used are the certificate-based anonymous access authentication method and the group signature-based anonymous access authentication method, wherein the group signature-based anonymous access authentication method can provide anonymity which a general digital signature does not have due to the group signature technology, so that group members can sign on behalf of the whole group and only a group owner can reveal the true identity of the group members. In these methods, although identity privacy protection can be achieved to a certain extent, a large number of anonymous certificates or anonymous identities need to be maintained, resulting in large costs for managing and storing certificates and keys. With the rise of identity-based cryptography, since the key management problem can be better solved, a plurality of identity-based VANETs anonymous access authentication methods are proposed in succession, but these methods still do not form a complete and mature scheme to realize identity authentication, privacy protection and malicious node identification and revocation in VANETs under the condition of safety and high efficiency.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides the VANETs anonymous authentication system and method based on the ID-based group signature, which can ensure the anonymity of the identity of the vehicle node and avoid the expense of certificate storage and management, thereby improving the privacy protection strength and the authentication efficiency of the vehicle node and simultaneously reducing the calculation expense and the communication expense of an authentication scheme.
The technical scheme of the invention is as follows:
a VANETs anonymous authentication system based on ID-based group signature is characterized in that: the system comprises a third-party trust authority, a plurality of roadside units and a plurality of vehicle units;
the third-party trust mechanism is connected with the roadside unit through a network, the vehicle unit is connected with the roadside unit through the network, and the third-party trust mechanism is communicated with the vehicle unit through the roadside unit; the third-party trust mechanism and the roadside units trust each other, the third-party trust mechanism is completely trusted by the vehicle units, the vehicle units and the roadside units do not trust each other, the vehicle units do not trust each other, and the roadside units do not trust each other;
the third-party trust mechanism registers for a roadside unit and a vehicle unit entering VANETs, generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
the roadside unit is an infrastructure established at the roadside and generates a new pseudonym, a group signature key and the validity period of the group signature key for a legally accessed vehicle unit;
the vehicle unit is a communication unit loaded on a vehicle node, the vehicle unit is switched among different roadside units along with the movement process of the vehicle node, the vehicle unit is responsible for communication between the corresponding vehicle node and the roadside units and between the corresponding vehicle node and other vehicle nodes, and different vehicle units can directly communicate in a neighbor range and communicate outside the neighbor range in an opportunistic routing manner; the vehicle unit can issue safety information periodically, wherein the safety information comprises the pseudonym, the current speed, the position and the road condition of a vehicle node corresponding to the vehicle unit; the vehicle unit registers to a third-party trust authority after a corresponding vehicle node enters a VANETs, and the vehicle unit obtains a new pseudonym, a group signature key and the validity period of the group signature key which are generated for the vehicle unit by a roadside unit serving as a group manager through bidirectional authentication with the roadside unit;
only the third-party trust authority can obtain the real identity of the vehicle unit, and only the third-party trust authority can cancel the vehicle unit; the roadside unit can assist a third party trust authority in tracking the true identity of the vehicle unit.
A method for anonymous authentication by using the VANETs anonymous authentication system based on ID-based group signature is characterized by comprising the following steps:
step 1: the roadside unit and the vehicle unit register with a third-party trust authority at an initial stage, the third-party trust authority generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and the third-party trust authority generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
step 2: during the moving process of the vehicle unit, when the vehicle unit moves to the wireless communication range of the accessible roadside unit, a V2I authentication protocol is executed between the vehicle unit and the roadside unit to authenticate whether the vehicle unit and the roadside unit are legal or not, and if the vehicle unit and the roadside unit are legal, the roadside unit generates the validity period of a new pseudonym, a group signature key and a group signature key for the legally accessed vehicle unit;
and step 3: legal two vehicle unit OBU completing V2I authenticationaAnd OBUbPerforms a V2V authentication protocol to accomplish mutual authentication, i.e., OBUaAnd OBUbIf the mutual authentication is legal, if the OBU is not legalaAnd OBUbIf both are legal, the OBU is startedaAnd OBUbObtaining a second shared secret key for subsequent secure communication;
and 4, step 4: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m is verified, if the message m fails to pass the verification, the message m is judged to be a malicious message, and a warning message is sent to an adjacent roadside unit; the adjacent roadside unit further sends the warning message to a third-party trust mechanism; the third party trust mechanism is used for aiming at the OBU according to the warning messageaTracking the true identity of the user;
and 5: and the third-party trust mechanism reduces the trust value of the vehicle unit which sends the malicious message, checks the trust value of the vehicle unit, judges the vehicle unit as a malicious node if the trust value of the vehicle unit is less than a critical value N, broadcasts the initial pseudonym of the vehicle unit to all roadside units, enables all the roadside units to stop providing access service for the vehicle unit, and simultaneously carries out further processing under the roadside and cancels the vehicle unit.
The step 1 comprises the following steps:
step 1.1: the vehicle unit registers to a third party trust authority at an initial stage, and specifically comprises:
step 1.1.1: the vehicle unit submits the real identity ID of the vehicle unit to a third-party trust authority through a secure channel;
and 1.1.2: third party trust authority random selection
Figure BDA0001874158950000041
As the private key of the third party trust authority, and then selecting a symmetric encryption algorithm E with a key of KK() To calculate an initial pseudonym V for the vehicle unitID=EK(ID) followed by setting an initial trust value for the vehicle unit to N0And calculating the private signature key of the vehicle unit as
Figure BDA0001874158950000042
Wherein H0For the hash function, P ∈ G1,G1An addition group selected for a third party trust authority, P being G1The number of the generator in the inner layer,
Figure BDA0001874158950000043
is a finite field;
step 1.1.3: third party trust authority will { s over secure channelv,VID,N0Sending the data to a vehicle unit;
step 1.1.4: vehicle unit pair received sv,VID,N0Storing;
step 1.2: the roadside unit registers to a third party trust authority at an initial stage, and the method specifically comprises the following steps:
step 1.2.1: the roadside unit submits the real identity R of the roadside unit to a third-party trust authority through a secure channelID
Step 1.2.2: the third party trust organization calculates the signature private key of the roadside unit as
Figure BDA0001874158950000044
Third party trust authority random selection
Figure BDA0001874158950000045
As the group private key of the roadside unit, and calculating the group public key of the roadside unit as PKg=sgP;
Step 1.2.3: the third party trust mechanism will make a great deal through a secure channelsR,sg,PKgSending the data to a roadside unit;
step 1.2.4: roadside unit pair received sR,sg,PKgAnd storing.
In the step 2, the V2I authentication protocol is executed between the vehicle unit and the roadside unit, which specifically includes the following steps:
step 2.1: the roadside unit periodically broadcasts a first message { R } to the surroundingsID,PKg1,TS1};
Wherein σ1Is a first signature and is generated by the roadside unit,
Figure BDA0001874158950000048
Figure BDA0001874158950000049
signature private key s representing the use of roadside unitsRPairing information { PK through identity-based signature scheme BLMQg,TS1Sign, TS1Is a time stamp, hRSU=H1(PKg||TS1,x1),H1In order to be a function of the hash function,
Figure BDA0001874158950000046
g is an addition group G1A point of (1), rRSUIs a random number, and is a random number,
Figure BDA0001874158950000047
VRSU=(rRSU+hRSU)sR
step 2.2: when a vehicle unit comes within communication range of a roadside unit, a first message { R is receivedID,PKg1,TS1Checking the time stamp TS first1If it is valid, if the time stamp TS1If it is valid, the first signature σ is verified1Determine equation one
Figure BDA0001874158950000051
Whether the result is true or not;
where e is a bilinear map, PpubSystem public key, P, generated for a third party trust authoritypub=sP;
If the equation is established, the roadside unit is legal, and the vehicle unit selects the random number rOBUUsing the private signature key s of the vehicle unitVPairing information { r ] through an identity-based signature scheme BLMQOBU,TS2Signing to generate a second signature
Figure BDA0001874158950000052
A first shared key K is then calculated for the vehicle unit and the roadside unitV-R=PKgrOBU=sgPrOBUThen using the secret key as KV-RSymmetric encryption algorithm of
Figure BDA0001874158950000053
For initial pseudonym VIDAnd a random number rOBUEncrypting to generate ciphertext
Figure BDA0001874158950000054
Finally, a second message { c, r is sent to the roadside unitOBUP,σ2,TS2And go to step 2.3;
wherein the content of the first and second substances,
Figure BDA0001874158950000055
TS2is a time stamp, hOBU=H1(rOBU||TS2,x2),
Figure BDA0001874158950000056
VOBU=(rOBU+hOBU)sV
If the equation is not established, the vehicle unit refuses to access the roadside unit and moves to the next roadside unit;
step 2.3: the roadside unit receives the second message { c, r) from the vehicle unitOBUP,σ2,TS2After that time, the device is started to be operated,checking the time stamp TS first2If it is valid, if the time stamp TS2If valid, the first shared secret key K is calculatedV-R=rOBUPsg=rOBUPKgAnd using the first shared key KV-RDecrypting the ciphertext c to obtain V of the vehicle unitIDAnd rOBUAnd then verify the second signature σ of the vehicle unit2Judging equation two
Figure BDA0001874158950000057
Whether or not:
if the second equation is established, the vehicle unit is legal, and the step 2.4 is entered;
if the second equation is not satisfied, the roadside unit refuses to provide the access service for the vehicle unit;
step 2.4: vehicle unit selection random number xOBUThen using the secret key as KV-RSymmetric encryption algorithm of
Figure BDA0001874158950000058
For xOBUP-cipher generation of third message
Figure BDA0001874158950000059
And sends a third message c to the roadside unit1(ii) a Wherein the content of the first and second substances,
Figure BDA00018741589500000510
step 2.5: the roadside unit receives the third message c from the vehicle unit1Thereafter, first the first shared key K is usedV-RThe third message c1Decrypting to obtain x of the vehicle unitOBUP, then select the ith random number
Figure BDA00018741589500000511
Generating the ith new pseudonym V for the vehicle uniti={Vi,1,Vi,2And generating an ith group signing key sk for the vehicle uniti=sgH3(Vi,2,rOBUxOBUP) and selects T as the validity period of the group signing key, followed by the use of the key KV-RSymmetric encryption algorithm of
Figure BDA0001874158950000061
For the ith new pseudonym ViThe ith group signing key skiAnd generating ith fourth message by encrypting the validity period T of the group signing key
Figure BDA0001874158950000062
And sends an ith fourth message c to the vehicle unit2i(ii) a Wherein, Vi,1=uiP,
Figure BDA0001874158950000063
H2、H3Are all hash functions;
step 2.6: the vehicle unit receives the ith fourth message c2iThereafter, the first shared key K is usedV-RThe ith fourth message c2iDecipher to obtain < ski,ViT >, then will be < ski,ViAnd T is stored in TPD of the vehicle unit, and a group signature key list { < sk is finally obtained1,V1,T>,<sk2,V2,T>,...,<ski,Vi,T>,...,<skn,Vn,T>}。
In step 3, two vehicle units OBUaAnd OBUbThe method executes a V2V authentication protocol, and specifically comprises the following steps:
step 3.1: OBUaRandomly selecting a new pseudonym Vj={Vj,1,Vj,2V and new pseudonymsjCorresponding group signing key skjGenerating an OBUaGroup signature public key
Figure BDA0001874158950000064
Then an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUaGroup signature public key
Figure BDA0001874158950000065
Signing to generate a third signature
Figure BDA0001874158950000066
And to the OBUbSending a fifth message
Figure BDA0001874158950000067
Wherein, TSaIs a time stamp;
step 3.2: OBUbReceiving the fifth message
Figure BDA0001874158950000068
Then, the timestamp TS is checked firstaIf it is valid, if the time stamp TSaIf it is valid, the third signature σ is verified3(ii) a If the third signature σ3Successful verification, OBUbRandomly selecting a new pseudonym Vk={Vk,1,Vk,2V and new pseudonymskCorresponding group signing key skkGenerating an OBUbGroup signature public key
Figure BDA0001874158950000069
Then an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUbGroup signature public key
Figure BDA00018741589500000610
Signing to generate a fourth signature
Figure BDA00018741589500000611
Then selecting random number
Figure BDA00018741589500000612
Is an OBUbAnd OBUaCalculates a second shared secret key K therebetweenV-V=nbRa=nbnaP, and the second shared secret key KV-VStored in OBUbIn the TPD of (2), then to the OBUaSending a sixth message
Figure BDA00018741589500000613
Wherein, TSbIs a time stamp;
step 3.3: OBUaReceiving the sixth message
Figure BDA0001874158950000071
Then, the timestamp TS is checked firstbIf it is valid, if the time stamp TSbIf it is valid, the fourth signature σ is verified4(ii) a If the fourth signature σ4If the verification is successful, calculating a second shared secret key KV-V=naRb=nanbP, and the second shared secret key KV-VStored in OBUaIn the TPD of (1).
The step 4 comprises the following steps:
step 4.1: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m will be verified if the OBUbUsing a second shared secret key KV-VIf the message m cannot be decrypted, the message m is not verified, the message m is judged to be a malicious message, and a warning message alert is generated, wherein the warning message alert comprises an OBU (on-board unit)aMessage m and OBU sentaNew pseudonym V usedjThen sending a warning message alert to the adjacent roadside unit;
step 4.2: after receiving the warning message alert, the adjacent roadside unit sends the warning message alert to a third-party trust mechanism through a safety channel;
step 4.3: after the third party trust machine receives the warning message alert, according to the OBUaNew pseudonym V usedj={Vj,1,Vj,2Calculate OBUaInitial pseudonym of
Figure BDA0001874158950000072
Finally, for the initial pseudonym VIDDecrypting to obtain the OBUaThe true identity ID of; wherein, Vj,1=ujP,
Figure BDA0001874158950000073
The invention has the beneficial effects that:
firstly, the anonymous identity authentication scheme based on the ID-based group signature is applied to the identity privacy protection of the vehicle nodes in the VANETs, the pseudonyms and the group signature are used, the vehicle nodes are guaranteed to finish access authentication and safe communication under the condition that the real identities of the vehicle nodes are not exposed, the anonymity of the identities of the vehicle nodes can be guaranteed, and therefore the privacy protection strength of the vehicle nodes is improved;
secondly, the invention adopts an identity-based mechanism system, and does not need to store a large number of public key certificates, thereby avoiding the expense of certificate storage and management, improving the authentication efficiency, reducing the calculation expense and the communication expense of the authentication scheme, and greatly improving the performance of the authentication system.
Drawings
Fig. 1 is a structural diagram of the anonymous authentication system of VANETs based on ID-based group signature according to the present invention.
Detailed Description
The invention will be further described with reference to the following figures and examples.
The invention aims to provide a VANETs anonymous authentication system and method based on ID-based group signature, which are used for ensuring the anonymity of the identity of a vehicle node and avoiding the expense of certificate storage and management, thereby improving the privacy protection strength and the authentication efficiency of the vehicle node and simultaneously reducing the calculation expense and the communication expense of an authentication scheme.
Fig. 1 shows a structure diagram of the VANETs anonymous authentication system based on ID-based group signature according to the present invention. In fig. 1, TA (trustedauthority) represents a third party trust authority of the present invention, TA being generally controlled by a government regulatory authority; rsu (road Side unit) represents a roadside unit of the present invention, and obu (onboard unit) represents a vehicle unit of the present invention.
The invention discloses a VANETs anonymous authentication system based on ID-based group signature, which is characterized in that: the system comprises a third-party trust authority, a plurality of roadside units and a plurality of vehicle units;
the third-party trust mechanism is connected with the roadside unit through a network, the vehicle unit is connected with the roadside unit through the network, and the third-party trust mechanism is communicated with the vehicle unit through the roadside unit; the third-party trust mechanism and the roadside units trust each other, the third-party trust mechanism is completely trusted by the vehicle units, the vehicle units and the roadside units do not trust each other, the vehicle units do not trust each other, and the roadside units do not trust each other;
the third-party trust mechanism registers for a roadside unit and a vehicle unit entering VANETs, generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
the roadside unit is an infrastructure established at the roadside and generates a new pseudonym, a group signature key and the validity period of the group signature key for a legally accessed vehicle unit;
the vehicle unit is a communication unit loaded on a vehicle node, the vehicle unit is switched among different roadside units along with the movement process of the vehicle node, the vehicle unit is responsible for communication between the corresponding vehicle node and the roadside units and between the corresponding vehicle node and other vehicle nodes, and different vehicle units can directly communicate in a neighbor range and communicate outside the neighbor range in an opportunistic routing manner; the vehicle unit can issue safety information periodically, wherein the safety information comprises the pseudonym, the current speed, the position and the road condition of a vehicle node corresponding to the vehicle unit; the vehicle unit registers to a third-party trust authority after a corresponding vehicle node enters a VANETs, and the vehicle unit obtains a new pseudonym, a group signature key and the validity period of the group signature key which are generated for the vehicle unit by a roadside unit serving as a group manager through bidirectional authentication with the roadside unit;
only the third-party trust authority can obtain the real identity of the vehicle unit, and only the third-party trust authority can cancel the vehicle unit; the roadside unit can assist a third party trust authority in tracking the true identity of the vehicle unit.
A method for anonymous authentication by using the VANETs anonymous authentication system based on ID-based group signature is characterized by comprising the following steps:
step 1: the roadside unit and the vehicle unit register with a third-party trust authority at an initial stage, the third-party trust authority generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and the third-party trust authority generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
step 2: during the moving process of the vehicle unit, when the vehicle unit moves to the wireless communication range of the accessible roadside unit, a V2I authentication protocol is executed between the vehicle unit and the roadside unit to authenticate whether the vehicle unit and the roadside unit are legal or not, and if the vehicle unit and the roadside unit are legal, the roadside unit generates the validity period of a new pseudonym, a group signature key and a group signature key for the legally accessed vehicle unit;
and step 3: legal two vehicle unit OBU completing V2I authenticationaAnd OBUbPerforms a V2V authentication protocol to accomplish mutual authentication, i.e., OBUaAnd OBUbIf the mutual authentication is legal, if the OBU is not legalaAnd OBUbIf both are legal, the OBU is startedaAnd OBUbObtaining a second shared secret key for subsequent secure communication;
the V2I (Vehicle to Infrastructure) authentication protocol refers to an authentication protocol for communication between a Vehicle unit and a roadside unit, and is one of t communications in VANETs; the V2V (Vehicle to Vehicle) authentication protocol is a two-way authentication protocol for communication between Vehicle units.
And 4, step 4: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m is verified, if the message m fails to pass the verification, the message m is judged to be a malicious message, and a warning message is sent to an adjacent roadside unit; the adjacent roadside unit further sends the warning message to a third-party trust mechanism; third party trust authority rootAccording to the warning message pair OBUaTracking the true identity of the user;
and 5: and the third-party trust mechanism reduces the trust value of the vehicle unit which sends the malicious message, checks the trust value of the vehicle unit, judges the vehicle unit as a malicious node if the trust value of the vehicle unit is less than a critical value N, broadcasts the initial pseudonym of the vehicle unit to all roadside units, enables all the roadside units to stop providing access service for the vehicle unit, and simultaneously carries out further processing under the roadside and cancels the vehicle unit.
The step 1 comprises the following steps:
step 1.1: the vehicle unit registers to a third party trust authority at an initial stage, and specifically comprises:
step 1.1.1: the vehicle unit submits the real identity ID of the vehicle unit to a third-party trust authority through a secure channel;
step 1.1.2: third party trust authority random selection
Figure BDA0001874158950000101
As the private key of the third party trust authority, and then selecting a symmetric encryption algorithm E with a key of KK() To calculate an initial pseudonym V for the vehicle unitID=EK(ID) followed by setting an initial trust value for the vehicle unit to N0And calculating the private signature key of the vehicle unit as
Figure BDA0001874158950000102
Wherein H0For the hash function, P ∈ G1,G1An addition group selected for a third party trust authority, P being G1The number of the generator in the inner layer,
Figure BDA0001874158950000103
is a finite field;
step 1.1.3: third party trust authority will { s over secure channelv,VID,N0Sending the data to a vehicle unit;
step 1.1.4: vehicle unit pair receivingS ofv,VID,N0Storing;
step 1.2: the roadside unit registers to a third party trust authority at an initial stage, and the method specifically comprises the following steps:
step 1.2.1: the roadside unit submits the real identity R of the roadside unit to a third-party trust authority through a secure channelID
Step 1.2.2: the third party trust organization calculates the signature private key of the roadside unit as
Figure BDA0001874158950000104
Third party trust authority random selection
Figure BDA0001874158950000105
As the group private key of the roadside unit, and calculating the group public key of the roadside unit as PKg=sgP;
Step 1.2.3: third party trust authority will { s over secure channelR,sg,PKgSending the data to a roadside unit;
step 1.2.4: roadside unit pair received sR,sg,PKgAnd storing.
In the step 2, the V2I authentication protocol is executed between the vehicle unit and the roadside unit, which specifically includes the following steps:
step 2.1: the roadside unit periodically broadcasts a first message { R } to the surroundingsID,PKg1,TS1};
Wherein σ1Is a first signature and is generated by the roadside unit,
Figure BDA0001874158950000106
Figure BDA0001874158950000107
signature private key s representing the use of roadside unitsRPairing information { PK through identity-based signature scheme BLMQg,TS1Sign, TS1Is a time stamp, hRSU=H1(PKg||TS1,x1),H1In order to be a function of the hash function,
Figure BDA0001874158950000108
g is an addition group G1A point of (1), rRSUIs a random number, and is a random number,
Figure BDA0001874158950000109
VRSU=(rRSU+hRSU)sR
step 2.2: when a vehicle unit comes within communication range of a roadside unit, a first message { R is receivedID,PKg1,TS1Checking the time stamp TS first1If it is valid, if the time stamp TS1If it is valid, the first signature σ is verified1Determine equation one
Figure BDA00018741589500001010
Whether the result is true or not;
where e is a bilinear map, PpubSystem public key, P, generated for a third party trust authoritypub=sP;
If the equation is established, the roadside unit is legal, and the vehicle unit selects the random number rOBUUsing the private signature key s of the vehicle unitVPairing information { r ] through an identity-based signature scheme BLMQOBU,TS2Signing to generate a second signature
Figure BDA0001874158950000111
A first shared key K is then calculated for the vehicle unit and the roadside unitV-R=PKgrOBU=sgPrOBUThen using the secret key as KV-RSymmetric encryption algorithm of
Figure BDA0001874158950000112
For initial pseudonym VIDAnd a random number rOBUEncrypting to generate ciphertext
Figure BDA0001874158950000113
Finally, a second message { c, r is sent to the roadside unitOBUP,σ2,TS2And go to step 2.3;
wherein the content of the first and second substances,
Figure BDA0001874158950000114
TS2is a time stamp, hOBU=H1(rOBU||TS2,x2),
Figure BDA0001874158950000115
VOBU=(rOBU+hOBU)sV
If the equation is not established, the vehicle unit refuses to access the roadside unit and moves to the next roadside unit;
step 2.3: the roadside unit receives the second message { c, r) from the vehicle unitOBUP,σ2,TS2After that, check the timestamp TS first2If it is valid, if the time stamp TS2If valid, the first shared secret key K is calculatedV-R=rOBUPsg=rOBUPKgAnd using the first shared key KV-RDecrypting the ciphertext c to obtain V of the vehicle unitIDAnd rOBUAnd then verify the second signature σ of the vehicle unit2Judging equation two
Figure BDA0001874158950000116
Whether or not:
if the second equation is established, the vehicle unit is legal, and the step 2.4 is entered;
if the second equation is not satisfied, the roadside unit refuses to provide the access service for the vehicle unit;
step 2.4: vehicle unit selection random number xOBUThen using the secret key as KV-RSymmetric encryption algorithm of
Figure BDA0001874158950000117
For xOBUP-cipher generation of third message
Figure BDA0001874158950000118
And sends a third message c to the roadside unit1(ii) a Wherein the content of the first and second substances,
Figure BDA0001874158950000119
step 2.5: the roadside unit receives the third message c from the vehicle unit1Thereafter, first the first shared key K is usedV-RThe third message c1Decrypting to obtain x of the vehicle unitOBUP, then select the ith random number
Figure BDA00018741589500001110
Generating the ith new pseudonym V for the vehicle uniti={Vi,1,Vi,2And generating an ith group signing key sk for the vehicle uniti=sgH3(Vi,2,rOBUxOBUP) and selects T as the validity period of the group signing key, followed by the use of the key KV-RSymmetric encryption algorithm of
Figure BDA0001874158950000121
For the ith new pseudonym ViThe ith group signing key skiAnd generating ith fourth message by encrypting the validity period T of the group signing key
Figure BDA0001874158950000122
And sends an ith fourth message c to the vehicle unit2i(ii) a Wherein, Vi,1=uiP,
Figure BDA0001874158950000123
H2、H3Are all hash functions;
step 2.6: the vehicle unit receives the ith fourth message c2iThereafter, the first shared key K is usedV-RThe ith fourth message c2iDecipher to obtain < ski,ViT >, then will be < ski,Vi,T>The key list is stored in the TPD of the vehicle unit, and the group signature key list { < sk is finally obtained1,V1,T>,<sk2,V2,T>,...,<ski,Vi,T>,...,<skn,Vn,T>}。
Among them, tpd (tamperprofvice) is a tamper resistant device used to perform security operations such as signature and credit updates. BLMQ is an identity-based signature scheme proposed by paulos.l.m.barreto, benoitlilbert, noelmccullagagh, and Jean-JacquesQuisquater, in which a user can verify whether the signature of the other party is legitimate only by providing the identity to the other party without the public key of the other party. When the group signing key is generated, the third-party trust mechanism and the related parameters of the roadside unit are needed at the same time, and an attacker cannot forge the key, so that only legal group members can sign the message and cannot sign on behalf of other group members, and the signature can be opened and the real identity of the signer can be restored only by the third-party trust mechanism, so that the anonymity of the user identity is protected, and the identity privacy protection of the system is realized.
In step 3, two vehicle units OBUaAnd OBUbThe method executes a V2V authentication protocol, and specifically comprises the following steps:
step 3.1: OBUaRandomly selecting a new pseudonym Vj={Vj,1,Vj,2V and new pseudonymsjCorresponding group signing key skjGenerating an OBUaGroup signature public key
Figure BDA0001874158950000124
Then an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUaGroup signature public key
Figure BDA0001874158950000125
Signing to generate a third signature
Figure BDA0001874158950000126
And to the OBUbSending a fifth message
Figure BDA0001874158950000127
Wherein, TSaIs a time stamp;
step 3.2: OBUbReceiving the fifth message
Figure BDA0001874158950000128
Then, the timestamp TS is checked firstaIf it is valid, if the time stamp TSaIf it is valid, the third signature σ is verified3(ii) a If the third signature σ3Successful verification, OBUbRandomly selecting a new pseudonym Vk={Vk,1,Vk,2V and new pseudonymskCorresponding group signing key skkGenerating an OBUbGroup signature public key
Figure BDA0001874158950000131
Then an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUbGroup signature public key
Figure BDA0001874158950000132
Signing to generate a fourth signature
Figure BDA0001874158950000133
Then selecting random number
Figure BDA0001874158950000134
Is an OBUbAnd OBUaCalculates a second shared secret key K therebetweenV-V=nbRa=nbnaP, and the second shared secret key KV-VStored in OBUbIn the TPD of (2), then to the OBUaSending a sixth message
Figure BDA0001874158950000135
Wherein, TSbIs a time stamp;
step 3.3: OBUaReceiving the sixth message
Figure BDA0001874158950000136
Then, the timestamp TS is checked firstbIf valid, if the timestamp isTSbIf it is valid, the fourth signature σ is verified4(ii) a If the fourth signature σ4If the verification is successful, calculating a second shared secret key KV-V=naRb=nanbP, and the second shared secret key KV-VStored in OBUaIn the TPD of (1).
The ID-based group Signature scheme proposed by Pankaj Sarde, Amitabh Banerjee is an ID-based group Signature, which is an IGS (ID-based group Signature), in which a user can generate a Signature on behalf of the whole group as a group member. In the invention, the identity-based group signature scheme IGS is applied to the anonymous access authentication process of the vehicle nodes entering the VANETs, so that the legality of the vehicle node identities and the safety of subsequent communication can be ensured, and the identity privacy of the vehicle nodes is effectively protected.
The step 4 comprises the following steps:
step 4.1: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m will be verified if the OBUbUsing a second shared secret key KV-VIf the message m cannot be decrypted, the message m is not verified, the message m is judged to be a malicious message, and a warning message alert is generated, wherein the warning message alert comprises an OBU (on-board unit)aMessage m and OBU sentaNew pseudonym V usedjThen sending a warning message alert to the adjacent roadside unit;
step 4.2: after receiving the warning message alert, the adjacent roadside unit sends the warning message alert to a third-party trust mechanism through a safety channel;
step 4.3: after the third party trust machine receives the warning message alert, according to the OBUaNew pseudonym V usedj={Vj,1,Vj,2Calculate OBUaInitial pseudonym of
Figure BDA0001874158950000137
Finally, for the initial pseudonym VIDDecrypting to obtain the OBUaThe true identity ID of; wherein, Vj,1=ujP,
Figure BDA0001874158950000138
The above description details one embodiment of the present invention. It is to be understood that the above-described embodiments are only some embodiments of the present invention, and not all embodiments; the above examples are only for explaining the present invention and do not constitute a limitation to the scope of protection of the present invention. All other embodiments, which can be derived by those skilled in the art from the above-described embodiments without any creative effort, namely all modifications, equivalents, improvements and the like made within the spirit and principle of the present application, fall within the protection scope of the present invention claimed.

Claims (4)

1. A method for anonymous authentication of a VANETs anonymous authentication system based on ID-based group signature comprises a third party trust mechanism, a plurality of roadside units and a plurality of vehicle units;
the third-party trust mechanism is connected with the roadside unit through a network, the vehicle unit is connected with the roadside unit through the network, and the third-party trust mechanism is communicated with the vehicle unit through the roadside unit; the third-party trust mechanism and the roadside units trust each other, the third-party trust mechanism is completely trusted by the vehicle units, the vehicle units and the roadside units do not trust each other, the vehicle units do not trust each other, and the roadside units do not trust each other;
the third-party trust mechanism registers for a roadside unit and a vehicle unit entering VANETs, generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
the roadside unit is an infrastructure established at the roadside and generates a new pseudonym, a group signature key and the validity period of the group signature key for a legally accessed vehicle unit;
the vehicle unit is a communication unit loaded on a vehicle node, the vehicle unit is switched among different roadside units along with the movement process of the vehicle node, the vehicle unit is responsible for communication between the corresponding vehicle node and the roadside units and between the corresponding vehicle node and other vehicle nodes, and different vehicle units can directly communicate in a neighbor range and communicate outside the neighbor range in an opportunistic routing manner; the vehicle unit can issue safety information periodically, wherein the safety information comprises the pseudonym, the current speed, the position and the road condition of a vehicle node corresponding to the vehicle unit; the vehicle unit registers to a third-party trust authority after a corresponding vehicle node enters a VANETs, and the vehicle unit obtains a new pseudonym, a group signature key and the validity period of the group signature key which are generated for the vehicle unit by a roadside unit serving as a group manager through bidirectional authentication with the roadside unit;
only the third-party trust authority can obtain the real identity of the vehicle unit, and only the third-party trust authority can cancel the vehicle unit; the roadside unit can assist a third-party trust authority in tracking the real identity of the vehicle unit;
the method is characterized by comprising the following steps:
step 1: the roadside unit and the vehicle unit register with a third-party trust authority at an initial stage, the third-party trust authority generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and the third-party trust authority generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
step 2: during the moving process of the vehicle unit, when the vehicle unit moves to the wireless communication range of the accessible roadside unit, a V2I authentication protocol is executed between the vehicle unit and the roadside unit to authenticate whether the vehicle unit and the roadside unit are legal or not, and if the vehicle unit and the roadside unit are legal, the roadside unit generates the validity period of a new pseudonym, a group signature key and a group signature key for the legally accessed vehicle unit;
and step 3: legal two vehicle unit OBU completing V2I authenticationaAnd OBUbBetweenPerforming the V2V authentication protocol to accomplish mutual authentication, i.e. OBUaAnd OBUbIf the mutual authentication is legal, if the OBU is not legalaAnd OBUbIf both are legal, the OBU is startedaAnd OBUbObtaining a second shared secret key for subsequent secure communication;
and 4, step 4: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m is verified, if the message m fails to pass the verification, the message m is judged to be a malicious message, and a warning message is sent to an adjacent roadside unit; the adjacent roadside unit further sends the warning message to a third-party trust mechanism; the third party trust mechanism is used for aiming at the OBU according to the warning messageaTracking the true identity of the user;
and 5: the third-party trust mechanism reduces the trust value of the vehicle unit which sends the malicious message, checks the trust value of the vehicle unit, if the trust value of the vehicle unit is less than the critical value N, the vehicle unit is judged as a malicious node, the third-party trust mechanism broadcasts the initial pseudonym of the vehicle unit to all roadside units, all the roadside units stop providing access service for the vehicle unit, and meanwhile, the third-party trust mechanism carries out further processing under the roadside and cancels the vehicle unit;
the step 1 comprises the following steps:
step 1.1: the vehicle unit registers to a third party trust authority at an initial stage, and specifically comprises:
step 1.1.1: the vehicle unit submits the real identity ID of the vehicle unit to a third-party trust authority through a secure channel;
step 1.1.2: third party trust authority random selection
Figure FDA0002948543730000021
As the private key of the third party trust authority, and then selecting a symmetric encryption algorithm E with a key of KK() To calculate an initial pseudonym V for the vehicle unitID=EK(ID) followed by setting an initial trust value for the vehicle unit to N0And calculateThe private signature key of the vehicle unit is
Figure FDA0002948543730000022
Wherein H0For the hash function, P ∈ G1,G1An addition group selected for a third party trust authority, P being G1The number of the generator in the inner layer,
Figure FDA0002948543730000023
is a finite field;
step 1.1.3: third party trust authority will { s over secure channelv,VID,N0Sending the data to a vehicle unit;
step 1.1.4: vehicle unit pair received sv,VID,N0Storing;
step 1.2: the roadside unit registers to a third party trust authority at an initial stage, and the method specifically comprises the following steps:
step 1.2.1: the roadside unit submits the real identity R of the roadside unit to a third-party trust authority through a secure channelID
Step 1.2.2: the third party trust organization calculates the signature private key of the roadside unit as
Figure FDA0002948543730000024
Third party trust authority random selection
Figure FDA0002948543730000031
As the group private key of the roadside unit, and calculating the group public key of the roadside unit as PKg=sgP;
Step 1.2.3: third party trust authority will { s over secure channelR,sg,PKgSending the data to a roadside unit;
step 1.2.4: roadside unit pair received sR,sg,PKgAnd storing.
2. The ID-based group signature VANETs anonymous authentication method as claimed in claim 1, wherein in step 2, a V2I authentication protocol is performed between the vehicle unit and the roadside unit, specifically comprising the steps of:
step 2.1: the roadside unit periodically broadcasts a first message { R } to the surroundingsID,PKg1,TS1};
Wherein σ1Is a first signature and is generated by the roadside unit,
Figure FDA00029485437300000310
Figure FDA00029485437300000311
signature private key s representing the use of roadside unitsRPairing information { PK through identity-based signature scheme BLMQg,TS1Sign, TS1Is a time stamp, hRSU=H1(PKg||TS1,x1),H1In order to be a function of the hash function,
Figure FDA0002948543730000032
g is an addition group G1A point of (1), rRSUIs a random number, and is a random number,
Figure FDA0002948543730000033
VRSU=(rRSU+hRSU)sR
step 2.2: when a vehicle unit comes within communication range of a roadside unit, a first message { R is receivedID,PKg1,TS1Checking the time stamp TS first1If it is valid, if the time stamp TS1If it is valid, the first signature σ is verified1Determine equation one
Figure FDA0002948543730000034
Whether the result is true or not;
where e is a bilinear map, PpubSystem public key, P, generated for a third party trust authoritypub=sP;
If the equation is established, the roadside unit is legal, and the vehicle unit selects the random number rOBUUsing the private signature key s of the vehicle unitVPairing information { r ] through an identity-based signature scheme BLMQOBU,TS2Signing to generate a second signature
Figure FDA00029485437300000312
A first shared key is then calculated for use between the vehicle unit and the roadside unit
Figure FDA0002948543730000035
Then using the secret key as KV-RSymmetric encryption algorithm of
Figure FDA0002948543730000036
For initial pseudonym VIDAnd a random number rOBUEncrypting to generate ciphertext
Figure FDA0002948543730000037
Finally, a second message { c, r is sent to the roadside unitOBUP,σ2,TS2And go to step 2.3;
wherein the content of the first and second substances,
Figure FDA0002948543730000038
TS2is a time stamp, hOBU=H1(rOBU||TS2,x2),
Figure FDA0002948543730000039
VOBU=(rOBU+hOBU)sV
If the equation is not established, the vehicle unit refuses to access the roadside unit and moves to the next roadside unit;
step 2.3: the roadside unit receives the second message { c, r) from the vehicle unitOBUP,σ2,TS2After that, check the timestamp TS first2Whether or not it is effectiveIf the time stamp TS2If valid, the first shared secret key K is calculatedV-R=rOBUPsg=rOBUPKgAnd using the first shared key KV-RDecrypting the ciphertext c to obtain V of the vehicle unitIDAnd rOBUAnd then verify the second signature σ of the vehicle unit2Judging equation two
Figure FDA0002948543730000041
Whether or not:
if the second equation is established, the vehicle unit is legal, and the step 2.4 is entered;
if the second equation is not satisfied, the roadside unit refuses to provide the access service for the vehicle unit;
step 2.4: vehicle unit selection random number xOBUThen using the secret key as KV-RSymmetric encryption algorithm of
Figure FDA0002948543730000042
For xOBUP-cipher generation of third message
Figure FDA0002948543730000043
And sends a third message c to the roadside unit1(ii) a Wherein the content of the first and second substances,
Figure FDA0002948543730000044
step 2.5: the roadside unit receives the third message c from the vehicle unit1Thereafter, first the first shared key K is usedV-RThe third message c1Decrypting to obtain x of the vehicle unitOBUP, then select the ith random number
Figure FDA0002948543730000045
Generating the ith new pseudonym V for the vehicle uniti={Vi,1,Vi,2And generating an ith group signing key sk for the vehicle uniti=sgH3(Vi,2,rOBUxOBUP) and selects T as the validity period of the group signing key, followed by the use of the key KV-RSymmetric encryption algorithm of
Figure FDA0002948543730000046
For the ith new pseudonym ViThe ith group signing key skiAnd generating ith fourth message by encrypting the validity period T of the group signing key
Figure FDA0002948543730000047
And sends an ith fourth message c to the vehicle unit2i(ii) a Wherein, Vi,1=uiP,
Figure FDA0002948543730000048
H2、H3Are all hash functions;
step 2.6: the vehicle unit receives the ith fourth message c2iThereafter, the first shared key K is usedV-RThe ith fourth message c2iDecipher to obtain < ski,ViT >, then will be < ski,ViAnd T is stored in TPD of the vehicle unit, and a group signature key list { < sk is finally obtained1,V1,T>,<sk2,V2,T>,…,<ski,Vi,T>,...,<skn,Vn,T>}。
3. The method for anonymous authentication of VANETs based on ID-based group signatures as claimed in claim 2, wherein in step 3, two vehicle units OBUsaAnd OBUbThe method executes a V2V authentication protocol, and specifically comprises the following steps:
step 3.1: OBUaRandomly selecting a new pseudonym Vj={Vj,1,Vj,2V and new pseudonymsjCorresponding group signing key skjGenerating an OBUaGroup signature public key
Figure FDA0002948543730000051
Then an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUaGroup signature public key
Figure FDA0002948543730000052
Signing to generate a third signature
Figure FDA0002948543730000053
And to the OBUbSending a fifth message
Figure FDA0002948543730000054
Wherein, TSaIs a time stamp;
step 3.2: OBUbReceiving the fifth message
Figure FDA0002948543730000055
Then, the timestamp TS is checked firstaIf it is valid, if the time stamp TSaIf it is valid, the third signature σ is verified3(ii) a If the third signature σ3Successful verification, OBUbRandomly selecting a new pseudonym Vk={Vk,1,Vk,2V and new pseudonymskCorresponding group signing key skkGenerating an OBUbGroup signature public key
Figure FDA0002948543730000056
Then an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUbGroup signature public key
Figure FDA0002948543730000057
Signing to generate a fourth signature
Figure FDA0002948543730000058
Then selecting random number
Figure FDA0002948543730000059
Is an OBUbAnd OBUaTo calculate a second share therebetweenSecret key KV-V=nbRa=nbnaP, and the second shared secret key KV-VStored in OBUbIn the TPD of (2), then to the OBUaSending a sixth message
Figure FDA00029485437300000510
Wherein, TSbIs a time stamp;
step 3.3: OBUaReceiving the sixth message
Figure FDA00029485437300000511
Then, the timestamp TS is checked firstbIf it is valid, if the time stamp TSbIf it is valid, the fourth signature σ is verified4(ii) a If the fourth signature σ4If the verification is successful, calculating a second shared secret key KV-V=naRb=nanbP, and the second shared secret key KV-VStored in OBUaIn the TPD of (1).
4. The method for anonymously authenticating VANETs based on ID-based group signatures as claimed in claim 3, wherein said step 4 comprises the steps of:
step 4.1: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m will be verified if the OBUbUsing a second shared secret key KV-VIf the message m cannot be decrypted, the message m is not verified, the message m is judged to be a malicious message, and a warning message alert is generated, wherein the warning message alert comprises an OBU (on-board unit)aMessage m and OBU sentaNew pseudonym V usedjThen sending a warning message alert to the adjacent roadside unit;
step 4.2: after receiving the warning message alert, the adjacent roadside unit sends the warning message alert to a third-party trust mechanism through a safety channel;
step 4.3: after the third party trust machine receives the warning message alert, according to the OBUaNew fake of useName Vj={Vj,1,Vj,2Calculate OBUaInitial pseudonym of
Figure FDA0002948543730000061
Finally, for the initial pseudonym VIDDecrypting to obtain the OBUaThe true identity ID of; wherein, Vj,1=ujP,
Figure FDA0002948543730000062
CN201811391465.9A 2018-11-21 2018-11-21 ID-based group signature-based VANETs anonymous authentication system and method Active CN109362062B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811391465.9A CN109362062B (en) 2018-11-21 2018-11-21 ID-based group signature-based VANETs anonymous authentication system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811391465.9A CN109362062B (en) 2018-11-21 2018-11-21 ID-based group signature-based VANETs anonymous authentication system and method

Publications (2)

Publication Number Publication Date
CN109362062A CN109362062A (en) 2019-02-19
CN109362062B true CN109362062B (en) 2021-07-13

Family

ID=65338316

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811391465.9A Active CN109362062B (en) 2018-11-21 2018-11-21 ID-based group signature-based VANETs anonymous authentication system and method

Country Status (1)

Country Link
CN (1) CN109362062B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109788456B (en) * 2019-02-26 2021-09-03 武汉大学 Group-based lightweight low-overhead secure communication method in Internet of vehicles environment
CN110234093B (en) * 2019-07-04 2021-11-26 南京邮电大学 Internet of things equipment encryption method based on IBE (Internet of things) in Internet of vehicles environment
CN110677256B (en) * 2019-09-24 2022-08-16 东北大学 VPKI-based VANETs pseudonym revocation system and method
CN112351408B (en) * 2021-01-08 2021-04-06 北京电信易通信息技术股份有限公司 Data safety transmission method and system for intelligent network-connected electric vehicle
CN115001722B (en) * 2021-02-20 2024-06-11 南京如般量子科技有限公司 Anti-quantum computing Internet of vehicles communication method and system based on CA and national encryption algorithm
CN114257374B (en) * 2021-12-20 2023-08-15 山东大学 Verifiable secure outsourcing calculation method and system for identifying cryptosystem
CN116033414B (en) * 2023-02-16 2023-06-13 北京金睛云华科技有限公司 VANETs privacy protection method and equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107071774A (en) * 2017-03-23 2017-08-18 郭明 A kind of VANET access authentication methods of the short group ranking of identity-based
CN107580006A (en) * 2017-11-01 2018-01-12 安徽大学 Vehicular ad hoc network conditionity method for secret protection based on register list
KR101837338B1 (en) * 2017-02-16 2018-03-09 한양대학교 에리카산학협력단 Cloud-Assisted Conditional Privacy Preserving Authentication Method for VANET and System Therefor
CN108632820A (en) * 2018-04-11 2018-10-09 上海电机学院 The anonymous authentication method of identity-based in a kind of vehicular ad hoc network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101837338B1 (en) * 2017-02-16 2018-03-09 한양대학교 에리카산학협력단 Cloud-Assisted Conditional Privacy Preserving Authentication Method for VANET and System Therefor
CN107071774A (en) * 2017-03-23 2017-08-18 郭明 A kind of VANET access authentication methods of the short group ranking of identity-based
CN107580006A (en) * 2017-11-01 2018-01-12 安徽大学 Vehicular ad hoc network conditionity method for secret protection based on register list
CN108632820A (en) * 2018-04-11 2018-10-09 上海电机学院 The anonymous authentication method of identity-based in a kind of vehicular ad hoc network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Improvement of a Convertible Undeniable Partially Blind Signature Scheme;20th International Conference on Advanced Information Networking;《IEEE-20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA"06)》;20061231;全文 *

Also Published As

Publication number Publication date
CN109362062A (en) 2019-02-19

Similar Documents

Publication Publication Date Title
Sheikh et al. A comprehensive survey on VANET security services in traffic management system
CN109362062B (en) ID-based group signature-based VANETs anonymous authentication system and method
Wang et al. Enhanced security identity-based privacy-preserving authentication scheme supporting revocation for VANETs
CN108964919B (en) Lightweight anonymous authentication method with privacy protection based on Internet of vehicles
Masood et al. Security and privacy challenges in connected vehicular cloud computing
Tzeng et al. Enhancing security and privacy for identity-based batch verification scheme in VANETs
Al-Kahtani Survey on security attacks in vehicular ad hoc networks (VANETs)
Chuang et al. TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks
Guo et al. Chameleon hashing for secure and privacy-preserving vehicular communications
CN111372248A (en) Efficient anonymous identity authentication method in Internet of vehicles environment
CN107888377B (en) VANETs position privacy protection method based on random encryption period
Sharma et al. BlockAPP: Using blockchain for authentication and privacy preservation in IoV
Reddy et al. Sybil attack detection technique using session key certificate in vehicular ad hoc networks
CN108632820B (en) Identity-based anonymous authentication method in vehicle-mounted ad hoc network
Ahmed et al. [Retracted] A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks
Rezazadeh Baee et al. Authentication strategies in vehicular communications: a taxonomy and framework
CN114286332B (en) Dynamic efficient vehicle-mounted cloud management method with privacy protection function
CN112243234A (en) Identity-based privacy security protection method for Internet of vehicles
Su et al. Blockchain‐based internet of vehicles privacy protection system
Adigun et al. Protocol of change pseudonyms for VANETs
CN110677256B (en) VPKI-based VANETs pseudonym revocation system and method
CN114430552B (en) Vehicle networking v2v efficient communication method based on message pre-authentication technology
Theodore et al. A novel lightweight authentication and privacy-preserving protocol for vehicular ad hoc networks
Funderburg et al. Efficient short group signatures for conditional privacy in vehicular ad hoc networks via ID caching and timed revocation
Almulla et al. An efficient k‐Means authentication scheme for digital certificates revocation validation in vehicular ad hoc networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant