CN109362062B - ID-based group signature-based VANETs anonymous authentication system and method - Google Patents
ID-based group signature-based VANETs anonymous authentication system and method Download PDFInfo
- Publication number
- CN109362062B CN109362062B CN201811391465.9A CN201811391465A CN109362062B CN 109362062 B CN109362062 B CN 109362062B CN 201811391465 A CN201811391465 A CN 201811391465A CN 109362062 B CN109362062 B CN 109362062B
- Authority
- CN
- China
- Prior art keywords
- obu
- unit
- vehicle
- roadside
- vehicle unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/46—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the technical field of wireless network security, and provides a VANETs anonymous authentication system based on an ID-based group signature. The invention also provides a method for anonymous authentication by using the system, wherein a third-party trust mechanism generates an initial pseudonym, an initial trust value and a signature private key for a vehicle unit, the vehicle unit and the roadside unit execute a V2I authentication protocol after generating the signature private key, a group private key and a group public key for the roadside unit, the vehicle unit executes a V2V authentication protocol among the vehicle units and generates a shared key when the vehicle units are legal, and finally the roadside unit assists the third-party trust mechanism to track the real identity of the vehicle unit which sends the malicious message and further process the real identity. The invention can ensure the anonymity of the identity of the vehicle node, avoid the expense of certificate storage and management, and improve the privacy protection strength and the authentication efficiency.
Description
Technical Field
The invention relates to the technical field of wireless network security, in particular to a VANETs anonymous authentication system and method based on ID-based group signature.
Background
In recent years, with the rapid development of ad hoc networks and Internet of things (IoT), intelligent transportation systems have become a research hotspot in academic and industrial circles. As an important component in the field of intelligent transportation, Vehicle Ad hoc Networks (VANETs) are an effective technology that can provide wide safety applications for Vehicle users, and are special mobile Ad hoc Networks that connect road entities such as vehicles and roadside infrastructures with a traffic network to form an intelligent network by using vehicles as basic information units and using technologies such as wireless access. It relies On a Trusted Authority (TAs), vehicle units (RSUs) and roadside units (OBUs), where RSUs are widely distributed at the Road edge to meet specific services, while OBUs are installed in VANETs's vehicles. By means of dedicated short-range communication technology (DSRC), nodes in the network are able to communicate with roadside Infrastructure unit nodes (V2I) or with other Vehicle unit nodes (V2V) during free-driving. By broadcasting information such as position, direction, speed, traffic incident and the like at regular time, a user can obtain real-time road condition information and information of neighbor vehicle nodes to avoid traffic risks. The VANETs can effectively prevent potential traffic hidden dangers, provide a new solution for collecting and releasing traffic safety information, accident early warning, accident investigation, vehicle-mounted office entertainment and the like, and also provide point-to-point (P2P) service for users and value-added services for accessing Internet and the like so as to realize functions of collaborative safe driving, intelligent scheduling, charging service and the like among vehicles. Therefore, the VANETs can enhance the driving experience of vehicle users, improve the life quality of people and have great significance for the development of intelligent cities.
However, VANETs also have a number of security issues. The VANETs are an open access environment and have high privacy sensitivity, and if an illegal attacker accesses a network, a plurality of privacy information of a legal node, such as user identity, driving track and the like, can be easily stolen. If the security sensitive network cannot consider and solve the security problem, threats, risks and loopholes exist, and economic loss and even life security are extremely easy to bring to users. The security protocols of VANETs must guarantee basic security requirements (authentication and non-repudiation) and privacy (identity and location privacy) of the vehicle user from being accessed, tracked or analyzed by unauthorized entities.
In the current VANETs access authentication method, an anonymous authentication technology is mostly adopted, so that privacy protection is realized while authentication reliability is achieved, and meanwhile, the method can well cope with flow analysis attacks. In the current VANETs anonymous access authentication method, the most used are the certificate-based anonymous access authentication method and the group signature-based anonymous access authentication method, wherein the group signature-based anonymous access authentication method can provide anonymity which a general digital signature does not have due to the group signature technology, so that group members can sign on behalf of the whole group and only a group owner can reveal the true identity of the group members. In these methods, although identity privacy protection can be achieved to a certain extent, a large number of anonymous certificates or anonymous identities need to be maintained, resulting in large costs for managing and storing certificates and keys. With the rise of identity-based cryptography, since the key management problem can be better solved, a plurality of identity-based VANETs anonymous access authentication methods are proposed in succession, but these methods still do not form a complete and mature scheme to realize identity authentication, privacy protection and malicious node identification and revocation in VANETs under the condition of safety and high efficiency.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides the VANETs anonymous authentication system and method based on the ID-based group signature, which can ensure the anonymity of the identity of the vehicle node and avoid the expense of certificate storage and management, thereby improving the privacy protection strength and the authentication efficiency of the vehicle node and simultaneously reducing the calculation expense and the communication expense of an authentication scheme.
The technical scheme of the invention is as follows:
a VANETs anonymous authentication system based on ID-based group signature is characterized in that: the system comprises a third-party trust authority, a plurality of roadside units and a plurality of vehicle units;
the third-party trust mechanism is connected with the roadside unit through a network, the vehicle unit is connected with the roadside unit through the network, and the third-party trust mechanism is communicated with the vehicle unit through the roadside unit; the third-party trust mechanism and the roadside units trust each other, the third-party trust mechanism is completely trusted by the vehicle units, the vehicle units and the roadside units do not trust each other, the vehicle units do not trust each other, and the roadside units do not trust each other;
the third-party trust mechanism registers for a roadside unit and a vehicle unit entering VANETs, generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
the roadside unit is an infrastructure established at the roadside and generates a new pseudonym, a group signature key and the validity period of the group signature key for a legally accessed vehicle unit;
the vehicle unit is a communication unit loaded on a vehicle node, the vehicle unit is switched among different roadside units along with the movement process of the vehicle node, the vehicle unit is responsible for communication between the corresponding vehicle node and the roadside units and between the corresponding vehicle node and other vehicle nodes, and different vehicle units can directly communicate in a neighbor range and communicate outside the neighbor range in an opportunistic routing manner; the vehicle unit can issue safety information periodically, wherein the safety information comprises the pseudonym, the current speed, the position and the road condition of a vehicle node corresponding to the vehicle unit; the vehicle unit registers to a third-party trust authority after a corresponding vehicle node enters a VANETs, and the vehicle unit obtains a new pseudonym, a group signature key and the validity period of the group signature key which are generated for the vehicle unit by a roadside unit serving as a group manager through bidirectional authentication with the roadside unit;
only the third-party trust authority can obtain the real identity of the vehicle unit, and only the third-party trust authority can cancel the vehicle unit; the roadside unit can assist a third party trust authority in tracking the true identity of the vehicle unit.
A method for anonymous authentication by using the VANETs anonymous authentication system based on ID-based group signature is characterized by comprising the following steps:
step 1: the roadside unit and the vehicle unit register with a third-party trust authority at an initial stage, the third-party trust authority generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and the third-party trust authority generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
step 2: during the moving process of the vehicle unit, when the vehicle unit moves to the wireless communication range of the accessible roadside unit, a V2I authentication protocol is executed between the vehicle unit and the roadside unit to authenticate whether the vehicle unit and the roadside unit are legal or not, and if the vehicle unit and the roadside unit are legal, the roadside unit generates the validity period of a new pseudonym, a group signature key and a group signature key for the legally accessed vehicle unit;
and step 3: legal two vehicle unit OBU completing V2I authenticationaAnd OBUbPerforms a V2V authentication protocol to accomplish mutual authentication, i.e., OBUaAnd OBUbIf the mutual authentication is legal, if the OBU is not legalaAnd OBUbIf both are legal, the OBU is startedaAnd OBUbObtaining a second shared secret key for subsequent secure communication;
and 4, step 4: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m is verified, if the message m fails to pass the verification, the message m is judged to be a malicious message, and a warning message is sent to an adjacent roadside unit; the adjacent roadside unit further sends the warning message to a third-party trust mechanism; the third party trust mechanism is used for aiming at the OBU according to the warning messageaTracking the true identity of the user;
and 5: and the third-party trust mechanism reduces the trust value of the vehicle unit which sends the malicious message, checks the trust value of the vehicle unit, judges the vehicle unit as a malicious node if the trust value of the vehicle unit is less than a critical value N, broadcasts the initial pseudonym of the vehicle unit to all roadside units, enables all the roadside units to stop providing access service for the vehicle unit, and simultaneously carries out further processing under the roadside and cancels the vehicle unit.
The step 1 comprises the following steps:
step 1.1: the vehicle unit registers to a third party trust authority at an initial stage, and specifically comprises:
step 1.1.1: the vehicle unit submits the real identity ID of the vehicle unit to a third-party trust authority through a secure channel;
and 1.1.2: third party trust authority random selectionAs the private key of the third party trust authority, and then selecting a symmetric encryption algorithm E with a key of KK() To calculate an initial pseudonym V for the vehicle unitID=EK(ID) followed by setting an initial trust value for the vehicle unit to N0And calculating the private signature key of the vehicle unit asWherein H0For the hash function, P ∈ G1,G1An addition group selected for a third party trust authority, P being G1The number of the generator in the inner layer,is a finite field;
step 1.1.3: third party trust authority will { s over secure channelv,VID,N0Sending the data to a vehicle unit;
step 1.1.4: vehicle unit pair received sv,VID,N0Storing;
step 1.2: the roadside unit registers to a third party trust authority at an initial stage, and the method specifically comprises the following steps:
step 1.2.1: the roadside unit submits the real identity R of the roadside unit to a third-party trust authority through a secure channelID;
Step 1.2.2: the third party trust organization calculates the signature private key of the roadside unit asThird party trust authority random selectionAs the group private key of the roadside unit, and calculating the group public key of the roadside unit as PKg=sgP;
Step 1.2.3: the third party trust mechanism will make a great deal through a secure channelsR,sg,PKgSending the data to a roadside unit;
step 1.2.4: roadside unit pair received sR,sg,PKgAnd storing.
In the step 2, the V2I authentication protocol is executed between the vehicle unit and the roadside unit, which specifically includes the following steps:
step 2.1: the roadside unit periodically broadcasts a first message { R } to the surroundingsID,PKg,σ1,TS1};
Wherein σ1Is a first signature and is generated by the roadside unit, signature private key s representing the use of roadside unitsRPairing information { PK through identity-based signature scheme BLMQg,TS1Sign, TS1Is a time stamp, hRSU=H1(PKg||TS1,x1),H1In order to be a function of the hash function,g is an addition group G1A point of (1), rRSUIs a random number, and is a random number,VRSU=(rRSU+hRSU)sR;
step 2.2: when a vehicle unit comes within communication range of a roadside unit, a first message { R is receivedID,PKg,σ1,TS1Checking the time stamp TS first1If it is valid, if the time stamp TS1If it is valid, the first signature σ is verified1Determine equation one
where e is a bilinear map, PpubSystem public key, P, generated for a third party trust authoritypub=sP;
If the equation is established, the roadside unit is legal, and the vehicle unit selects the random number rOBUUsing the private signature key s of the vehicle unitVPairing information { r ] through an identity-based signature scheme BLMQOBU,TS2Signing to generate a second signatureA first shared key K is then calculated for the vehicle unit and the roadside unitV-R=PKgrOBU=sgPrOBUThen using the secret key as KV-RSymmetric encryption algorithm ofFor initial pseudonym VIDAnd a random number rOBUEncrypting to generate ciphertextFinally, a second message { c, r is sent to the roadside unitOBUP,σ2,TS2And go to step 2.3;
wherein the content of the first and second substances,TS2is a time stamp, hOBU=H1(rOBU||TS2,x2),VOBU=(rOBU+hOBU)sV;
If the equation is not established, the vehicle unit refuses to access the roadside unit and moves to the next roadside unit;
step 2.3: the roadside unit receives the second message { c, r) from the vehicle unitOBUP,σ2,TS2After that time, the device is started to be operated,checking the time stamp TS first2If it is valid, if the time stamp TS2If valid, the first shared secret key K is calculatedV-R=rOBUPsg=rOBUPKgAnd using the first shared key KV-RDecrypting the ciphertext c to obtain V of the vehicle unitIDAnd rOBUAnd then verify the second signature σ of the vehicle unit2Judging equation two
if the second equation is established, the vehicle unit is legal, and the step 2.4 is entered;
if the second equation is not satisfied, the roadside unit refuses to provide the access service for the vehicle unit;
step 2.4: vehicle unit selection random number xOBUThen using the secret key as KV-RSymmetric encryption algorithm ofFor xOBUP-cipher generation of third messageAnd sends a third message c to the roadside unit1(ii) a Wherein the content of the first and second substances,
step 2.5: the roadside unit receives the third message c from the vehicle unit1Thereafter, first the first shared key K is usedV-RThe third message c1Decrypting to obtain x of the vehicle unitOBUP, then select the ith random numberGenerating the ith new pseudonym V for the vehicle uniti={Vi,1,Vi,2And generating an ith group signing key sk for the vehicle uniti=sgH3(Vi,2,rOBUxOBUP) and selects T as the validity period of the group signing key, followed by the use of the key KV-RSymmetric encryption algorithm ofFor the ith new pseudonym ViThe ith group signing key skiAnd generating ith fourth message by encrypting the validity period T of the group signing keyAnd sends an ith fourth message c to the vehicle unit2i(ii) a Wherein, Vi,1=uiP,H2、H3Are all hash functions;
step 2.6: the vehicle unit receives the ith fourth message c2iThereafter, the first shared key K is usedV-RThe ith fourth message c2iDecipher to obtain < ski,ViT >, then will be < ski,ViAnd T is stored in TPD of the vehicle unit, and a group signature key list { < sk is finally obtained1,V1,T>,<sk2,V2,T>,...,<ski,Vi,T>,...,<skn,Vn,T>}。
In step 3, two vehicle units OBUaAnd OBUbThe method executes a V2V authentication protocol, and specifically comprises the following steps:
step 3.1: OBUaRandomly selecting a new pseudonym Vj={Vj,1,Vj,2V and new pseudonymsjCorresponding group signing key skjGenerating an OBUaGroup signature public keyThen an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUaGroup signature public keySigning to generate a third signatureAnd to the OBUbSending a fifth messageWherein, TSaIs a time stamp;
step 3.2: OBUbReceiving the fifth messageThen, the timestamp TS is checked firstaIf it is valid, if the time stamp TSaIf it is valid, the third signature σ is verified3(ii) a If the third signature σ3Successful verification, OBUbRandomly selecting a new pseudonym Vk={Vk,1,Vk,2V and new pseudonymskCorresponding group signing key skkGenerating an OBUbGroup signature public keyThen an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUbGroup signature public keySigning to generate a fourth signatureThen selecting random numberIs an OBUbAnd OBUaCalculates a second shared secret key K therebetweenV-V=nbRa=nbnaP, and the second shared secret key KV-VStored in OBUbIn the TPD of (2), then to the OBUaSending a sixth messageWherein, TSbIs a time stamp;
step 3.3: OBUaReceiving the sixth messageThen, the timestamp TS is checked firstbIf it is valid, if the time stamp TSbIf it is valid, the fourth signature σ is verified4(ii) a If the fourth signature σ4If the verification is successful, calculating a second shared secret key KV-V=naRb=nanbP, and the second shared secret key KV-VStored in OBUaIn the TPD of (1).
The step 4 comprises the following steps:
step 4.1: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m will be verified if the OBUbUsing a second shared secret key KV-VIf the message m cannot be decrypted, the message m is not verified, the message m is judged to be a malicious message, and a warning message alert is generated, wherein the warning message alert comprises an OBU (on-board unit)aMessage m and OBU sentaNew pseudonym V usedjThen sending a warning message alert to the adjacent roadside unit;
step 4.2: after receiving the warning message alert, the adjacent roadside unit sends the warning message alert to a third-party trust mechanism through a safety channel;
step 4.3: after the third party trust machine receives the warning message alert, according to the OBUaNew pseudonym V usedj={Vj,1,Vj,2Calculate OBUaInitial pseudonym ofFinally, for the initial pseudonym VIDDecrypting to obtain the OBUaThe true identity ID of; wherein, Vj,1=ujP,
The invention has the beneficial effects that:
firstly, the anonymous identity authentication scheme based on the ID-based group signature is applied to the identity privacy protection of the vehicle nodes in the VANETs, the pseudonyms and the group signature are used, the vehicle nodes are guaranteed to finish access authentication and safe communication under the condition that the real identities of the vehicle nodes are not exposed, the anonymity of the identities of the vehicle nodes can be guaranteed, and therefore the privacy protection strength of the vehicle nodes is improved;
secondly, the invention adopts an identity-based mechanism system, and does not need to store a large number of public key certificates, thereby avoiding the expense of certificate storage and management, improving the authentication efficiency, reducing the calculation expense and the communication expense of the authentication scheme, and greatly improving the performance of the authentication system.
Drawings
Fig. 1 is a structural diagram of the anonymous authentication system of VANETs based on ID-based group signature according to the present invention.
Detailed Description
The invention will be further described with reference to the following figures and examples.
The invention aims to provide a VANETs anonymous authentication system and method based on ID-based group signature, which are used for ensuring the anonymity of the identity of a vehicle node and avoiding the expense of certificate storage and management, thereby improving the privacy protection strength and the authentication efficiency of the vehicle node and simultaneously reducing the calculation expense and the communication expense of an authentication scheme.
Fig. 1 shows a structure diagram of the VANETs anonymous authentication system based on ID-based group signature according to the present invention. In fig. 1, TA (trustedauthority) represents a third party trust authority of the present invention, TA being generally controlled by a government regulatory authority; rsu (road Side unit) represents a roadside unit of the present invention, and obu (onboard unit) represents a vehicle unit of the present invention.
The invention discloses a VANETs anonymous authentication system based on ID-based group signature, which is characterized in that: the system comprises a third-party trust authority, a plurality of roadside units and a plurality of vehicle units;
the third-party trust mechanism is connected with the roadside unit through a network, the vehicle unit is connected with the roadside unit through the network, and the third-party trust mechanism is communicated with the vehicle unit through the roadside unit; the third-party trust mechanism and the roadside units trust each other, the third-party trust mechanism is completely trusted by the vehicle units, the vehicle units and the roadside units do not trust each other, the vehicle units do not trust each other, and the roadside units do not trust each other;
the third-party trust mechanism registers for a roadside unit and a vehicle unit entering VANETs, generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
the roadside unit is an infrastructure established at the roadside and generates a new pseudonym, a group signature key and the validity period of the group signature key for a legally accessed vehicle unit;
the vehicle unit is a communication unit loaded on a vehicle node, the vehicle unit is switched among different roadside units along with the movement process of the vehicle node, the vehicle unit is responsible for communication between the corresponding vehicle node and the roadside units and between the corresponding vehicle node and other vehicle nodes, and different vehicle units can directly communicate in a neighbor range and communicate outside the neighbor range in an opportunistic routing manner; the vehicle unit can issue safety information periodically, wherein the safety information comprises the pseudonym, the current speed, the position and the road condition of a vehicle node corresponding to the vehicle unit; the vehicle unit registers to a third-party trust authority after a corresponding vehicle node enters a VANETs, and the vehicle unit obtains a new pseudonym, a group signature key and the validity period of the group signature key which are generated for the vehicle unit by a roadside unit serving as a group manager through bidirectional authentication with the roadside unit;
only the third-party trust authority can obtain the real identity of the vehicle unit, and only the third-party trust authority can cancel the vehicle unit; the roadside unit can assist a third party trust authority in tracking the true identity of the vehicle unit.
A method for anonymous authentication by using the VANETs anonymous authentication system based on ID-based group signature is characterized by comprising the following steps:
step 1: the roadside unit and the vehicle unit register with a third-party trust authority at an initial stage, the third-party trust authority generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and the third-party trust authority generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
step 2: during the moving process of the vehicle unit, when the vehicle unit moves to the wireless communication range of the accessible roadside unit, a V2I authentication protocol is executed between the vehicle unit and the roadside unit to authenticate whether the vehicle unit and the roadside unit are legal or not, and if the vehicle unit and the roadside unit are legal, the roadside unit generates the validity period of a new pseudonym, a group signature key and a group signature key for the legally accessed vehicle unit;
and step 3: legal two vehicle unit OBU completing V2I authenticationaAnd OBUbPerforms a V2V authentication protocol to accomplish mutual authentication, i.e., OBUaAnd OBUbIf the mutual authentication is legal, if the OBU is not legalaAnd OBUbIf both are legal, the OBU is startedaAnd OBUbObtaining a second shared secret key for subsequent secure communication;
the V2I (Vehicle to Infrastructure) authentication protocol refers to an authentication protocol for communication between a Vehicle unit and a roadside unit, and is one of t communications in VANETs; the V2V (Vehicle to Vehicle) authentication protocol is a two-way authentication protocol for communication between Vehicle units.
And 4, step 4: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m is verified, if the message m fails to pass the verification, the message m is judged to be a malicious message, and a warning message is sent to an adjacent roadside unit; the adjacent roadside unit further sends the warning message to a third-party trust mechanism; third party trust authority rootAccording to the warning message pair OBUaTracking the true identity of the user;
and 5: and the third-party trust mechanism reduces the trust value of the vehicle unit which sends the malicious message, checks the trust value of the vehicle unit, judges the vehicle unit as a malicious node if the trust value of the vehicle unit is less than a critical value N, broadcasts the initial pseudonym of the vehicle unit to all roadside units, enables all the roadside units to stop providing access service for the vehicle unit, and simultaneously carries out further processing under the roadside and cancels the vehicle unit.
The step 1 comprises the following steps:
step 1.1: the vehicle unit registers to a third party trust authority at an initial stage, and specifically comprises:
step 1.1.1: the vehicle unit submits the real identity ID of the vehicle unit to a third-party trust authority through a secure channel;
step 1.1.2: third party trust authority random selectionAs the private key of the third party trust authority, and then selecting a symmetric encryption algorithm E with a key of KK() To calculate an initial pseudonym V for the vehicle unitID=EK(ID) followed by setting an initial trust value for the vehicle unit to N0And calculating the private signature key of the vehicle unit asWherein H0For the hash function, P ∈ G1,G1An addition group selected for a third party trust authority, P being G1The number of the generator in the inner layer,is a finite field;
step 1.1.3: third party trust authority will { s over secure channelv,VID,N0Sending the data to a vehicle unit;
step 1.1.4: vehicle unit pair receivingS ofv,VID,N0Storing;
step 1.2: the roadside unit registers to a third party trust authority at an initial stage, and the method specifically comprises the following steps:
step 1.2.1: the roadside unit submits the real identity R of the roadside unit to a third-party trust authority through a secure channelID;
Step 1.2.2: the third party trust organization calculates the signature private key of the roadside unit asThird party trust authority random selectionAs the group private key of the roadside unit, and calculating the group public key of the roadside unit as PKg=sgP;
Step 1.2.3: third party trust authority will { s over secure channelR,sg,PKgSending the data to a roadside unit;
step 1.2.4: roadside unit pair received sR,sg,PKgAnd storing.
In the step 2, the V2I authentication protocol is executed between the vehicle unit and the roadside unit, which specifically includes the following steps:
step 2.1: the roadside unit periodically broadcasts a first message { R } to the surroundingsID,PKg,σ1,TS1};
Wherein σ1Is a first signature and is generated by the roadside unit, signature private key s representing the use of roadside unitsRPairing information { PK through identity-based signature scheme BLMQg,TS1Sign, TS1Is a time stamp, hRSU=H1(PKg||TS1,x1),H1In order to be a function of the hash function,g is an addition group G1A point of (1), rRSUIs a random number, and is a random number,VRSU=(rRSU+hRSU)sR;
step 2.2: when a vehicle unit comes within communication range of a roadside unit, a first message { R is receivedID,PKg,σ1,TS1Checking the time stamp TS first1If it is valid, if the time stamp TS1If it is valid, the first signature σ is verified1Determine equation one
where e is a bilinear map, PpubSystem public key, P, generated for a third party trust authoritypub=sP;
If the equation is established, the roadside unit is legal, and the vehicle unit selects the random number rOBUUsing the private signature key s of the vehicle unitVPairing information { r ] through an identity-based signature scheme BLMQOBU,TS2Signing to generate a second signatureA first shared key K is then calculated for the vehicle unit and the roadside unitV-R=PKgrOBU=sgPrOBUThen using the secret key as KV-RSymmetric encryption algorithm ofFor initial pseudonym VIDAnd a random number rOBUEncrypting to generate ciphertextFinally, a second message { c, r is sent to the roadside unitOBUP,σ2,TS2And go to step 2.3;
wherein the content of the first and second substances,TS2is a time stamp, hOBU=H1(rOBU||TS2,x2),VOBU=(rOBU+hOBU)sV;
If the equation is not established, the vehicle unit refuses to access the roadside unit and moves to the next roadside unit;
step 2.3: the roadside unit receives the second message { c, r) from the vehicle unitOBUP,σ2,TS2After that, check the timestamp TS first2If it is valid, if the time stamp TS2If valid, the first shared secret key K is calculatedV-R=rOBUPsg=rOBUPKgAnd using the first shared key KV-RDecrypting the ciphertext c to obtain V of the vehicle unitIDAnd rOBUAnd then verify the second signature σ of the vehicle unit2Judging equation two
if the second equation is established, the vehicle unit is legal, and the step 2.4 is entered;
if the second equation is not satisfied, the roadside unit refuses to provide the access service for the vehicle unit;
step 2.4: vehicle unit selection random number xOBUThen using the secret key as KV-RSymmetric encryption algorithm ofFor xOBUP-cipher generation of third messageAnd sends a third message c to the roadside unit1(ii) a Wherein the content of the first and second substances,
step 2.5: the roadside unit receives the third message c from the vehicle unit1Thereafter, first the first shared key K is usedV-RThe third message c1Decrypting to obtain x of the vehicle unitOBUP, then select the ith random numberGenerating the ith new pseudonym V for the vehicle uniti={Vi,1,Vi,2And generating an ith group signing key sk for the vehicle uniti=sgH3(Vi,2,rOBUxOBUP) and selects T as the validity period of the group signing key, followed by the use of the key KV-RSymmetric encryption algorithm ofFor the ith new pseudonym ViThe ith group signing key skiAnd generating ith fourth message by encrypting the validity period T of the group signing keyAnd sends an ith fourth message c to the vehicle unit2i(ii) a Wherein, Vi,1=uiP,H2、H3Are all hash functions;
step 2.6: the vehicle unit receives the ith fourth message c2iThereafter, the first shared key K is usedV-RThe ith fourth message c2iDecipher to obtain < ski,ViT >, then will be < ski,Vi,T>The key list is stored in the TPD of the vehicle unit, and the group signature key list { < sk is finally obtained1,V1,T>,<sk2,V2,T>,...,<ski,Vi,T>,...,<skn,Vn,T>}。
Among them, tpd (tamperprofvice) is a tamper resistant device used to perform security operations such as signature and credit updates. BLMQ is an identity-based signature scheme proposed by paulos.l.m.barreto, benoitlilbert, noelmccullagagh, and Jean-JacquesQuisquater, in which a user can verify whether the signature of the other party is legitimate only by providing the identity to the other party without the public key of the other party. When the group signing key is generated, the third-party trust mechanism and the related parameters of the roadside unit are needed at the same time, and an attacker cannot forge the key, so that only legal group members can sign the message and cannot sign on behalf of other group members, and the signature can be opened and the real identity of the signer can be restored only by the third-party trust mechanism, so that the anonymity of the user identity is protected, and the identity privacy protection of the system is realized.
In step 3, two vehicle units OBUaAnd OBUbThe method executes a V2V authentication protocol, and specifically comprises the following steps:
step 3.1: OBUaRandomly selecting a new pseudonym Vj={Vj,1,Vj,2V and new pseudonymsjCorresponding group signing key skjGenerating an OBUaGroup signature public keyThen an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUaGroup signature public keySigning to generate a third signatureAnd to the OBUbSending a fifth messageWherein, TSaIs a time stamp;
step 3.2: OBUbReceiving the fifth messageThen, the timestamp TS is checked firstaIf it is valid, if the time stamp TSaIf it is valid, the third signature σ is verified3(ii) a If the third signature σ3Successful verification, OBUbRandomly selecting a new pseudonym Vk={Vk,1,Vk,2V and new pseudonymskCorresponding group signing key skkGenerating an OBUbGroup signature public keyThen an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUbGroup signature public keySigning to generate a fourth signatureThen selecting random numberIs an OBUbAnd OBUaCalculates a second shared secret key K therebetweenV-V=nbRa=nbnaP, and the second shared secret key KV-VStored in OBUbIn the TPD of (2), then to the OBUaSending a sixth messageWherein, TSbIs a time stamp;
step 3.3: OBUaReceiving the sixth messageThen, the timestamp TS is checked firstbIf valid, if the timestamp isTSbIf it is valid, the fourth signature σ is verified4(ii) a If the fourth signature σ4If the verification is successful, calculating a second shared secret key KV-V=naRb=nanbP, and the second shared secret key KV-VStored in OBUaIn the TPD of (1).
The ID-based group Signature scheme proposed by Pankaj Sarde, Amitabh Banerjee is an ID-based group Signature, which is an IGS (ID-based group Signature), in which a user can generate a Signature on behalf of the whole group as a group member. In the invention, the identity-based group signature scheme IGS is applied to the anonymous access authentication process of the vehicle nodes entering the VANETs, so that the legality of the vehicle node identities and the safety of subsequent communication can be ensured, and the identity privacy of the vehicle nodes is effectively protected.
The step 4 comprises the following steps:
step 4.1: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m will be verified if the OBUbUsing a second shared secret key KV-VIf the message m cannot be decrypted, the message m is not verified, the message m is judged to be a malicious message, and a warning message alert is generated, wherein the warning message alert comprises an OBU (on-board unit)aMessage m and OBU sentaNew pseudonym V usedjThen sending a warning message alert to the adjacent roadside unit;
step 4.2: after receiving the warning message alert, the adjacent roadside unit sends the warning message alert to a third-party trust mechanism through a safety channel;
step 4.3: after the third party trust machine receives the warning message alert, according to the OBUaNew pseudonym V usedj={Vj,1,Vj,2Calculate OBUaInitial pseudonym ofFinally, for the initial pseudonym VIDDecrypting to obtain the OBUaThe true identity ID of; wherein, Vj,1=ujP,
The above description details one embodiment of the present invention. It is to be understood that the above-described embodiments are only some embodiments of the present invention, and not all embodiments; the above examples are only for explaining the present invention and do not constitute a limitation to the scope of protection of the present invention. All other embodiments, which can be derived by those skilled in the art from the above-described embodiments without any creative effort, namely all modifications, equivalents, improvements and the like made within the spirit and principle of the present application, fall within the protection scope of the present invention claimed.
Claims (4)
1. A method for anonymous authentication of a VANETs anonymous authentication system based on ID-based group signature comprises a third party trust mechanism, a plurality of roadside units and a plurality of vehicle units;
the third-party trust mechanism is connected with the roadside unit through a network, the vehicle unit is connected with the roadside unit through the network, and the third-party trust mechanism is communicated with the vehicle unit through the roadside unit; the third-party trust mechanism and the roadside units trust each other, the third-party trust mechanism is completely trusted by the vehicle units, the vehicle units and the roadside units do not trust each other, the vehicle units do not trust each other, and the roadside units do not trust each other;
the third-party trust mechanism registers for a roadside unit and a vehicle unit entering VANETs, generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
the roadside unit is an infrastructure established at the roadside and generates a new pseudonym, a group signature key and the validity period of the group signature key for a legally accessed vehicle unit;
the vehicle unit is a communication unit loaded on a vehicle node, the vehicle unit is switched among different roadside units along with the movement process of the vehicle node, the vehicle unit is responsible for communication between the corresponding vehicle node and the roadside units and between the corresponding vehicle node and other vehicle nodes, and different vehicle units can directly communicate in a neighbor range and communicate outside the neighbor range in an opportunistic routing manner; the vehicle unit can issue safety information periodically, wherein the safety information comprises the pseudonym, the current speed, the position and the road condition of a vehicle node corresponding to the vehicle unit; the vehicle unit registers to a third-party trust authority after a corresponding vehicle node enters a VANETs, and the vehicle unit obtains a new pseudonym, a group signature key and the validity period of the group signature key which are generated for the vehicle unit by a roadside unit serving as a group manager through bidirectional authentication with the roadside unit;
only the third-party trust authority can obtain the real identity of the vehicle unit, and only the third-party trust authority can cancel the vehicle unit; the roadside unit can assist a third-party trust authority in tracking the real identity of the vehicle unit;
the method is characterized by comprising the following steps:
step 1: the roadside unit and the vehicle unit register with a third-party trust authority at an initial stage, the third-party trust authority generates an initial pseudonym, an initial trust value and a signature private key of the vehicle unit for the vehicle unit, and the third-party trust authority generates a signature private key, a group private key and a group public key of the roadside unit for the roadside unit;
step 2: during the moving process of the vehicle unit, when the vehicle unit moves to the wireless communication range of the accessible roadside unit, a V2I authentication protocol is executed between the vehicle unit and the roadside unit to authenticate whether the vehicle unit and the roadside unit are legal or not, and if the vehicle unit and the roadside unit are legal, the roadside unit generates the validity period of a new pseudonym, a group signature key and a group signature key for the legally accessed vehicle unit;
and step 3: legal two vehicle unit OBU completing V2I authenticationaAnd OBUbBetweenPerforming the V2V authentication protocol to accomplish mutual authentication, i.e. OBUaAnd OBUbIf the mutual authentication is legal, if the OBU is not legalaAnd OBUbIf both are legal, the OBU is startedaAnd OBUbObtaining a second shared secret key for subsequent secure communication;
and 4, step 4: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m is verified, if the message m fails to pass the verification, the message m is judged to be a malicious message, and a warning message is sent to an adjacent roadside unit; the adjacent roadside unit further sends the warning message to a third-party trust mechanism; the third party trust mechanism is used for aiming at the OBU according to the warning messageaTracking the true identity of the user;
and 5: the third-party trust mechanism reduces the trust value of the vehicle unit which sends the malicious message, checks the trust value of the vehicle unit, if the trust value of the vehicle unit is less than the critical value N, the vehicle unit is judged as a malicious node, the third-party trust mechanism broadcasts the initial pseudonym of the vehicle unit to all roadside units, all the roadside units stop providing access service for the vehicle unit, and meanwhile, the third-party trust mechanism carries out further processing under the roadside and cancels the vehicle unit;
the step 1 comprises the following steps:
step 1.1: the vehicle unit registers to a third party trust authority at an initial stage, and specifically comprises:
step 1.1.1: the vehicle unit submits the real identity ID of the vehicle unit to a third-party trust authority through a secure channel;
step 1.1.2: third party trust authority random selectionAs the private key of the third party trust authority, and then selecting a symmetric encryption algorithm E with a key of KK() To calculate an initial pseudonym V for the vehicle unitID=EK(ID) followed by setting an initial trust value for the vehicle unit to N0And calculateThe private signature key of the vehicle unit isWherein H0For the hash function, P ∈ G1,G1An addition group selected for a third party trust authority, P being G1The number of the generator in the inner layer,is a finite field;
step 1.1.3: third party trust authority will { s over secure channelv,VID,N0Sending the data to a vehicle unit;
step 1.1.4: vehicle unit pair received sv,VID,N0Storing;
step 1.2: the roadside unit registers to a third party trust authority at an initial stage, and the method specifically comprises the following steps:
step 1.2.1: the roadside unit submits the real identity R of the roadside unit to a third-party trust authority through a secure channelID;
Step 1.2.2: the third party trust organization calculates the signature private key of the roadside unit asThird party trust authority random selectionAs the group private key of the roadside unit, and calculating the group public key of the roadside unit as PKg=sgP;
Step 1.2.3: third party trust authority will { s over secure channelR,sg,PKgSending the data to a roadside unit;
step 1.2.4: roadside unit pair received sR,sg,PKgAnd storing.
2. The ID-based group signature VANETs anonymous authentication method as claimed in claim 1, wherein in step 2, a V2I authentication protocol is performed between the vehicle unit and the roadside unit, specifically comprising the steps of:
step 2.1: the roadside unit periodically broadcasts a first message { R } to the surroundingsID,PKg,σ1,TS1};
Wherein σ1Is a first signature and is generated by the roadside unit, signature private key s representing the use of roadside unitsRPairing information { PK through identity-based signature scheme BLMQg,TS1Sign, TS1Is a time stamp, hRSU=H1(PKg||TS1,x1),H1In order to be a function of the hash function,g is an addition group G1A point of (1), rRSUIs a random number, and is a random number,VRSU=(rRSU+hRSU)sR;
step 2.2: when a vehicle unit comes within communication range of a roadside unit, a first message { R is receivedID,PKg,σ1,TS1Checking the time stamp TS first1If it is valid, if the time stamp TS1If it is valid, the first signature σ is verified1Determine equation one
where e is a bilinear map, PpubSystem public key, P, generated for a third party trust authoritypub=sP;
If the equation is established, the roadside unit is legal, and the vehicle unit selects the random number rOBUUsing the private signature key s of the vehicle unitVPairing information { r ] through an identity-based signature scheme BLMQOBU,TS2Signing to generate a second signatureA first shared key is then calculated for use between the vehicle unit and the roadside unitThen using the secret key as KV-RSymmetric encryption algorithm ofFor initial pseudonym VIDAnd a random number rOBUEncrypting to generate ciphertextFinally, a second message { c, r is sent to the roadside unitOBUP,σ2,TS2And go to step 2.3;
wherein the content of the first and second substances,TS2is a time stamp, hOBU=H1(rOBU||TS2,x2),VOBU=(rOBU+hOBU)sV;
If the equation is not established, the vehicle unit refuses to access the roadside unit and moves to the next roadside unit;
step 2.3: the roadside unit receives the second message { c, r) from the vehicle unitOBUP,σ2,TS2After that, check the timestamp TS first2Whether or not it is effectiveIf the time stamp TS2If valid, the first shared secret key K is calculatedV-R=rOBUPsg=rOBUPKgAnd using the first shared key KV-RDecrypting the ciphertext c to obtain V of the vehicle unitIDAnd rOBUAnd then verify the second signature σ of the vehicle unit2Judging equation two
if the second equation is established, the vehicle unit is legal, and the step 2.4 is entered;
if the second equation is not satisfied, the roadside unit refuses to provide the access service for the vehicle unit;
step 2.4: vehicle unit selection random number xOBUThen using the secret key as KV-RSymmetric encryption algorithm ofFor xOBUP-cipher generation of third messageAnd sends a third message c to the roadside unit1(ii) a Wherein the content of the first and second substances,
step 2.5: the roadside unit receives the third message c from the vehicle unit1Thereafter, first the first shared key K is usedV-RThe third message c1Decrypting to obtain x of the vehicle unitOBUP, then select the ith random numberGenerating the ith new pseudonym V for the vehicle uniti={Vi,1,Vi,2And generating an ith group signing key sk for the vehicle uniti=sgH3(Vi,2,rOBUxOBUP) and selects T as the validity period of the group signing key, followed by the use of the key KV-RSymmetric encryption algorithm ofFor the ith new pseudonym ViThe ith group signing key skiAnd generating ith fourth message by encrypting the validity period T of the group signing keyAnd sends an ith fourth message c to the vehicle unit2i(ii) a Wherein, Vi,1=uiP,H2、H3Are all hash functions;
step 2.6: the vehicle unit receives the ith fourth message c2iThereafter, the first shared key K is usedV-RThe ith fourth message c2iDecipher to obtain < ski,ViT >, then will be < ski,ViAnd T is stored in TPD of the vehicle unit, and a group signature key list { < sk is finally obtained1,V1,T>,<sk2,V2,T>,…,<ski,Vi,T>,...,<skn,Vn,T>}。
3. The method for anonymous authentication of VANETs based on ID-based group signatures as claimed in claim 2, wherein in step 3, two vehicle units OBUsaAnd OBUbThe method executes a V2V authentication protocol, and specifically comprises the following steps:
step 3.1: OBUaRandomly selecting a new pseudonym Vj={Vj,1,Vj,2V and new pseudonymsjCorresponding group signing key skjGenerating an OBUaGroup signature public keyThen an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUaGroup signature public keySigning to generate a third signatureAnd to the OBUbSending a fifth messageWherein, TSaIs a time stamp;
step 3.2: OBUbReceiving the fifth messageThen, the timestamp TS is checked firstaIf it is valid, if the time stamp TSaIf it is valid, the third signature σ is verified3(ii) a If the third signature σ3Successful verification, OBUbRandomly selecting a new pseudonym Vk={Vk,1,Vk,2V and new pseudonymskCorresponding group signing key skkGenerating an OBUbGroup signature public keyThen an identity-based group signature scheme IGS is performed on the group public key PKgAnd OBUbGroup signature public keySigning to generate a fourth signatureThen selecting random numberIs an OBUbAnd OBUaTo calculate a second share therebetweenSecret key KV-V=nbRa=nbnaP, and the second shared secret key KV-VStored in OBUbIn the TPD of (2), then to the OBUaSending a sixth messageWherein, TSbIs a time stamp;
step 3.3: OBUaReceiving the sixth messageThen, the timestamp TS is checked firstbIf it is valid, if the time stamp TSbIf it is valid, the fourth signature σ is verified4(ii) a If the fourth signature σ4If the verification is successful, calculating a second shared secret key KV-V=naRb=nanbP, and the second shared secret key KV-VStored in OBUaIn the TPD of (1).
4. The method for anonymously authenticating VANETs based on ID-based group signatures as claimed in claim 3, wherein said step 4 comprises the steps of:
step 4.1: on two vehicle units OBUaAnd OBUbDuring communication between the OBU and the other OBUbReceive OBUaWhen message m is sent, OBUbThe message m will be verified if the OBUbUsing a second shared secret key KV-VIf the message m cannot be decrypted, the message m is not verified, the message m is judged to be a malicious message, and a warning message alert is generated, wherein the warning message alert comprises an OBU (on-board unit)aMessage m and OBU sentaNew pseudonym V usedjThen sending a warning message alert to the adjacent roadside unit;
step 4.2: after receiving the warning message alert, the adjacent roadside unit sends the warning message alert to a third-party trust mechanism through a safety channel;
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811391465.9A CN109362062B (en) | 2018-11-21 | 2018-11-21 | ID-based group signature-based VANETs anonymous authentication system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811391465.9A CN109362062B (en) | 2018-11-21 | 2018-11-21 | ID-based group signature-based VANETs anonymous authentication system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109362062A CN109362062A (en) | 2019-02-19 |
CN109362062B true CN109362062B (en) | 2021-07-13 |
Family
ID=65338316
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811391465.9A Active CN109362062B (en) | 2018-11-21 | 2018-11-21 | ID-based group signature-based VANETs anonymous authentication system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109362062B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109788456B (en) * | 2019-02-26 | 2021-09-03 | 武汉大学 | Group-based lightweight low-overhead secure communication method in Internet of vehicles environment |
CN110234093B (en) * | 2019-07-04 | 2021-11-26 | 南京邮电大学 | Internet of things equipment encryption method based on IBE (Internet of things) in Internet of vehicles environment |
CN110677256B (en) * | 2019-09-24 | 2022-08-16 | 东北大学 | VPKI-based VANETs pseudonym revocation system and method |
CN112351408B (en) * | 2021-01-08 | 2021-04-06 | 北京电信易通信息技术股份有限公司 | Data safety transmission method and system for intelligent network-connected electric vehicle |
CN115001722B (en) * | 2021-02-20 | 2024-06-11 | 南京如般量子科技有限公司 | Anti-quantum computing Internet of vehicles communication method and system based on CA and national encryption algorithm |
CN114257374B (en) * | 2021-12-20 | 2023-08-15 | 山东大学 | Verifiable secure outsourcing calculation method and system for identifying cryptosystem |
CN116033414B (en) * | 2023-02-16 | 2023-06-13 | 北京金睛云华科技有限公司 | VANETs privacy protection method and equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107071774A (en) * | 2017-03-23 | 2017-08-18 | 郭明 | A kind of VANET access authentication methods of the short group ranking of identity-based |
CN107580006A (en) * | 2017-11-01 | 2018-01-12 | 安徽大学 | Vehicular ad hoc network conditionity method for secret protection based on register list |
KR101837338B1 (en) * | 2017-02-16 | 2018-03-09 | 한양대학교 에리카산학협력단 | Cloud-Assisted Conditional Privacy Preserving Authentication Method for VANET and System Therefor |
CN108632820A (en) * | 2018-04-11 | 2018-10-09 | 上海电机学院 | The anonymous authentication method of identity-based in a kind of vehicular ad hoc network |
-
2018
- 2018-11-21 CN CN201811391465.9A patent/CN109362062B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101837338B1 (en) * | 2017-02-16 | 2018-03-09 | 한양대학교 에리카산학협력단 | Cloud-Assisted Conditional Privacy Preserving Authentication Method for VANET and System Therefor |
CN107071774A (en) * | 2017-03-23 | 2017-08-18 | 郭明 | A kind of VANET access authentication methods of the short group ranking of identity-based |
CN107580006A (en) * | 2017-11-01 | 2018-01-12 | 安徽大学 | Vehicular ad hoc network conditionity method for secret protection based on register list |
CN108632820A (en) * | 2018-04-11 | 2018-10-09 | 上海电机学院 | The anonymous authentication method of identity-based in a kind of vehicular ad hoc network |
Non-Patent Citations (1)
Title |
---|
Improvement of a Convertible Undeniable Partially Blind Signature Scheme;20th International Conference on Advanced Information Networking;《IEEE-20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA"06)》;20061231;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN109362062A (en) | 2019-02-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sheikh et al. | A comprehensive survey on VANET security services in traffic management system | |
CN109362062B (en) | ID-based group signature-based VANETs anonymous authentication system and method | |
Wang et al. | Enhanced security identity-based privacy-preserving authentication scheme supporting revocation for VANETs | |
CN108964919B (en) | Lightweight anonymous authentication method with privacy protection based on Internet of vehicles | |
Masood et al. | Security and privacy challenges in connected vehicular cloud computing | |
Tzeng et al. | Enhancing security and privacy for identity-based batch verification scheme in VANETs | |
Al-Kahtani | Survey on security attacks in vehicular ad hoc networks (VANETs) | |
Chuang et al. | TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks | |
Guo et al. | Chameleon hashing for secure and privacy-preserving vehicular communications | |
CN111372248A (en) | Efficient anonymous identity authentication method in Internet of vehicles environment | |
CN107888377B (en) | VANETs position privacy protection method based on random encryption period | |
Sharma et al. | BlockAPP: Using blockchain for authentication and privacy preservation in IoV | |
Reddy et al. | Sybil attack detection technique using session key certificate in vehicular ad hoc networks | |
CN108632820B (en) | Identity-based anonymous authentication method in vehicle-mounted ad hoc network | |
Ahmed et al. | [Retracted] A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks | |
Rezazadeh Baee et al. | Authentication strategies in vehicular communications: a taxonomy and framework | |
CN114286332B (en) | Dynamic efficient vehicle-mounted cloud management method with privacy protection function | |
CN112243234A (en) | Identity-based privacy security protection method for Internet of vehicles | |
Su et al. | Blockchain‐based internet of vehicles privacy protection system | |
Adigun et al. | Protocol of change pseudonyms for VANETs | |
CN110677256B (en) | VPKI-based VANETs pseudonym revocation system and method | |
CN114430552B (en) | Vehicle networking v2v efficient communication method based on message pre-authentication technology | |
Theodore et al. | A novel lightweight authentication and privacy-preserving protocol for vehicular ad hoc networks | |
Funderburg et al. | Efficient short group signatures for conditional privacy in vehicular ad hoc networks via ID caching and timed revocation | |
Almulla et al. | An efficient k‐Means authentication scheme for digital certificates revocation validation in vehicular ad hoc networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |