CN110365746A - A kind of information transferring method and system - Google Patents
A kind of information transferring method and system Download PDFInfo
- Publication number
- CN110365746A CN110365746A CN201910546922.5A CN201910546922A CN110365746A CN 110365746 A CN110365746 A CN 110365746A CN 201910546922 A CN201910546922 A CN 201910546922A CN 110365746 A CN110365746 A CN 110365746A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- information
- encryption
- communication model
- transferring method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of information transferring method and systems, and wherein method includes the following steps: to establish vehicle and vehicle Communication Model and vehicle and vehicle cloud Communication Model;Then, the certification certificate of each vehicle oneself is obtained, it is ensured that each car identity information;Storage of the vehicle cloud to vehicle condition value is recycled, using difference of the state value on time dimension, creates Traffic encryption key(TEK);It can be realized two vehicles not needing to establish Security Association in advance, and do not need to hold consultation, in true environment, two cars interaction is transient, and after leaving, does not need to maintain communication state;Optimized by encryption, reduces key and generate time and encryption data time, encryption optimization algorithm is conducive to ensure the safety of information, promotes the development of car networking industry.
Description
Technical field
The present invention relates to the communications fields, and in particular to a kind of information transferring method and system.
Background technique
Internet of Things is the information carriers such as internet, conventional telecommunications net, allows all common objects that can exercise standalone feature
Realize that the network to interconnect, Internet of Things are generally wireless network, and since the equipment around everyone can achieve 1 thousand to five
Thousand, so Internet of Things may include 500 million to one gigabit objects;And it is Internet of Things Network Communication that Internet of Things, which communicate, between vehicle and vehicle
How the emphasis of research is gone the problems such as solving some vehicle safeties, efficiency using mobile ad-hoc network, how increasing
Vehicle in solve fast and accurately to position, rapid and safe message transmission, and to meet the characteristic of In-vehicle networking is one
A problem, for example, vehicle node movement speed is than very fast, closeness is very high, and may be by extraneous interference;With current
Social development in science and technology, the value of car networking are very big;But with the appearance of network intrusions phenomenon, network security problem also by
Step obtains various circles of society, government and the relevant technologies department and pays much attention to, since vehicle is directly related to the safety of driving,
The communication security of vehicle and vehicle is by very big attention, and existing information transmission mode safety is poor, is easily invaded, serious shadow
Ring the development of car networking industry.
Therefore, in order to solve the above problem, a kind of information transferring method and system are needed, existing car networking information can be passed
Delivery method optimizes, and reduces key and generates time and encryption data time, encryption optimization algorithm is conducive to ensure the peace of information
Quan Xing promotes the development of car networking industry.
Summary of the invention
In view of this, the purpose of the present invention is overcoming defect in the prior art, a kind of information transferring method is provided and is
System, can optimize existing car networking information transferring method, reduce key and generate time and encryption data time, encrypt excellent
Change the safety that algorithm is conducive to ensure information, promotes the development of car networking industry.
A kind of information transferring method of the invention, including the following steps:
Step 1: vehicle and vehicle Communication Model and vehicle and vehicle cloud Communication Model are established;
Step 2: the certification certificate of each vehicle oneself is obtained, it is ensured that each car identity information;
Step 3: the storage using vehicle cloud to vehicle condition value utilizes difference of the state value on time dimension, wound
Build Traffic encryption key(TEK);
Wherein, the information of vehicle and vehicle Communication Model transmission is encrypted using asymmetry, vehicle and vehicle cloud Communication Model
Information transmission is encrypted using symmetry.
Further, in step 3,
The chaotic method of mapping is introduced in asymmetry ciphering process to optimize, and is expressed as following public affairs under chaos sequence mapping
Formula: xi+ 1=μxi(1-xi), i=1,2 ..., L;The mapping of above-mentioned chaotic mode is defined as according to parameter value
Vehicle and vehicle Communication Model information encryption storage integer construct random sequence.
Further, the specific steps are as follows:
In to asymmetric encryption techniques optimization process, 0≤μ≤1, x0 indicate that Logistic mapping attracts fixed point;xi+
1=μ xi(1-xi);If μ≤4, Logistic mapping start the overall process for entering chaos from the change procedure of doubling time, under
Formula statement:
The statistical property that Logistic maps the asymmetric encryption techniques to be formed optimization is obtained by ρ (x).
Further, in step 3, symmetry ciphering process is stated with following formula:
In the information symmetrical of vehicle and vehicle cloud Communication Model encryption optimization process, x is choseniSeveral after decimal point have
The pseudo-random sequence for imitating integer building in digital network consisting information, will be by { xiRepresent information in integer building pseudorandom
Sequence is expressed as information symmetrical encryption technology optimization key.
The invention also discloses a kind of message transfer system, the message transfer system is transmitted using a kind of above-mentioned information
Method carries out the transmission of car networking information.
The beneficial effects of the present invention are: a kind of information transferring method disclosed by the invention and system, can be realized two vehicles
It does not need to establish Security Association in advance, and does not need to hold consultation, in true environment, two cars interaction is transient,
And after leaving, do not need to maintain communication state;Optimized by encryption, reduce key and generate time and encryption data time,
Encryption optimization algorithm is conducive to ensure the safety of information, promotes the development of car networking industry.
Specific embodiment
One of the present embodiment information transferring method and system;Include the following steps:
Step 1: vehicle and vehicle Communication Model and vehicle and vehicle cloud Communication Model are established;
Step 2: the certification certificate of each vehicle oneself is obtained, it is ensured that each car identity information;
Step 3: the storage using vehicle cloud to vehicle condition value utilizes difference of the state value on time dimension, wound
Build Traffic encryption key(TEK);
Wherein, the information of vehicle and vehicle Communication Model transmission is encrypted using asymmetry, vehicle and vehicle cloud Communication Model
Information transmission is encrypted using symmetry;Doing so maximum benefit is exactly, and two vehicles do not need to establish Security Association in advance, and
And it does not need to hold consultation.In true environment, two cars interaction is transient, and after leaving, does not need to maintain this
Communication state.
In the present embodiment, in step 3, the chaotic method of mapping is introduced in asymmetry ciphering process and is optimized, chaos
Following formula is expressed as under sequence mapping: xi+ 1=μxi(1-xi), i=1,2 ..., L;Mapping for above-mentioned chaotic mode, root
According to parameter value, it is defined as vehicle and vehicle Communication Model information encryption storage integer building random sequence.Specific step is as follows:
In to asymmetric encryption techniques optimization process, 0≤μ≤1, x0 indicate that Logistic mapping attracts fixed point;xi+
1=μ xi(1-xi);If μ≤4, Logistic mapping start the overall process for entering chaos from the change procedure of doubling time, under
Formula statement:
The statistical property that Logistic maps the asymmetric encryption techniques to be formed optimization is obtained by ρ (x);In step 3
In, symmetry ciphering process is stated with following formula:
In the information symmetrical of vehicle and vehicle cloud Communication Model encryption optimization process, x is choseniSeveral after decimal point have
The pseudo-random sequence for imitating integer building in digital network consisting information, will be by { xiRepresent information in integer building pseudorandom
Sequence is expressed as information symmetrical encryption technology optimization key;
It is compared with the traditional method, the encryption method after optimization is all remote excellent in terms of key generates time and encryption data time
In traditional algorithm, laggard driving connected network communication information is interacted using RAS calculation formula repeatedly and is encrypted, using non-after optimization
Symmetry encryption utilizes symmetry encryption to communicate vehicle with vehicle cloud Communication Model in vehicle and vehicle Communication Model communication encryption
Encryption overcomes conventional encryption methods not can guarantee time and the secrecy effect of information encryption to ensure information cipher round results.
The invention also discloses a kind of message transfer system, the message transfer system is transmitted using a kind of above-mentioned information
Method carries out the transmission of car networking information.
Finally, it is stated that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although referring to compared with
Good embodiment describes the invention in detail, those skilled in the art should understand that, it can be to skill of the invention
Art scheme is modified or replaced equivalently, and without departing from the objective and range of technical solution of the present invention, should all be covered at this
In the scope of the claims of invention.
Claims (5)
1. a kind of information transferring method, it is characterised in that: include the following steps:
Step 1: vehicle and vehicle Communication Model and vehicle and vehicle cloud Communication Model are established;
Step 2: the certification certificate of each vehicle oneself is obtained, it is ensured that each car identity information;
Step 3: the storage using vehicle cloud to vehicle condition value, using difference of the state value on time dimension, creation is logical
Believe encryption key;
Wherein, the information of vehicle and vehicle Communication Model transmission is encrypted using asymmetry, the information of vehicle and vehicle cloud Communication Model
Transmission is encrypted using symmetry.
2. a kind of information transferring method according to claim 1, it is characterised in that: in step 3, in asymmetry plus
The chaotic method of mapping is introduced during close to optimize, and is expressed as following formula under chaos sequence mapping: xi+ 1=μxi(1-xi),i
=1,2 ..., L;Is defined as by vehicle and is added with vehicle Communication Model information according to parameter value for the mapping of above-mentioned chaotic mode
Close storage integer constructs random sequence.
3. a kind of information transferring method according to claim 2, it is characterised in that: specific step is as follows: to asymmetric
In encryption technology optimization process, 0≤μ≤1, x0 indicate that Logistic mapping attracts fixed point;xi+ 1=μ xi(1-xi);If μ
≤ 4, Logistic mapping start the overall process for entering chaos from the change procedure of doubling time, are stated with following formula:
The statistical property that Logistic maps the asymmetric encryption techniques to be formed optimization is obtained by ρ (x).
4. a kind of information transferring method according to claim 1, it is characterised in that: in step 3, for symmetry plus
Close process is stated with following formula:
In the information symmetrical of vehicle and vehicle cloud Communication Model encryption optimization process, x is choseniSeveral significant figures after decimal point
The pseudo-random sequence that integer constructs in word network consisting information, will be by { xiRepresent information in integer building pseudo-random sequence
It is expressed as information symmetrical encryption technology optimization key.
5. a kind of message transfer system, it is characterised in that: the message transfer system is used as any right of claim 1-4 is wanted
A kind of information transferring method is asked to carry out the transmission of car networking information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910546922.5A CN110365746A (en) | 2019-06-24 | 2019-06-24 | A kind of information transferring method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910546922.5A CN110365746A (en) | 2019-06-24 | 2019-06-24 | A kind of information transferring method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110365746A true CN110365746A (en) | 2019-10-22 |
Family
ID=68215738
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910546922.5A Pending CN110365746A (en) | 2019-06-24 | 2019-06-24 | A kind of information transferring method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110365746A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100031042A1 (en) * | 2007-10-26 | 2010-02-04 | Telcordia Technologies, Inc. | Method and System for Secure Session Establishment Using Identity-Based Encryption (VDTLS) |
US20170076395A1 (en) * | 2014-03-03 | 2017-03-16 | Inrix Inc. | User-managed evidentiary record of driving behavior and risk rating |
CN106713237A (en) * | 2015-11-16 | 2017-05-24 | 厦门雅迅网络股份有限公司 | Encryption method of vehicle-mounted terminal and center platform communication |
CN107045650A (en) * | 2016-10-25 | 2017-08-15 | 罗轶 | Net based on block chain about car |
CN107105060A (en) * | 2017-05-27 | 2017-08-29 | 天津恒天新能源汽车研究院有限公司 | A kind of method for realizing electric automobile information security |
CN107404461A (en) * | 2016-05-19 | 2017-11-28 | 阿里巴巴集团控股有限公司 | Data safe transmission method, client and service end method, apparatus and system |
CN108881176A (en) * | 2018-05-28 | 2018-11-23 | 惠州市德赛西威汽车电子股份有限公司 | A kind of method of secure communication between car networking terminal |
-
2019
- 2019-06-24 CN CN201910546922.5A patent/CN110365746A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100031042A1 (en) * | 2007-10-26 | 2010-02-04 | Telcordia Technologies, Inc. | Method and System for Secure Session Establishment Using Identity-Based Encryption (VDTLS) |
US20170076395A1 (en) * | 2014-03-03 | 2017-03-16 | Inrix Inc. | User-managed evidentiary record of driving behavior and risk rating |
CN106713237A (en) * | 2015-11-16 | 2017-05-24 | 厦门雅迅网络股份有限公司 | Encryption method of vehicle-mounted terminal and center platform communication |
CN107404461A (en) * | 2016-05-19 | 2017-11-28 | 阿里巴巴集团控股有限公司 | Data safe transmission method, client and service end method, apparatus and system |
CN107045650A (en) * | 2016-10-25 | 2017-08-15 | 罗轶 | Net based on block chain about car |
CN107105060A (en) * | 2017-05-27 | 2017-08-29 | 天津恒天新能源汽车研究院有限公司 | A kind of method for realizing electric automobile information security |
CN108881176A (en) * | 2018-05-28 | 2018-11-23 | 惠州市德赛西威汽车电子股份有限公司 | A kind of method of secure communication between car networking terminal |
Non-Patent Citations (2)
Title |
---|
JUN ZHENG: "Delivery Delay Analysis for Roadside Unit Deployment in Vehicular Ad Hoc Networks With Intermittent Connectivity", 《IEEE》 * |
卜莉娜: "高速公路车联网系统安全架构研究", 《中国优秀硕士学位论文全文数据库》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105100112B (en) | RFID cluster label ownership transfer methods based on cloud storage | |
Wei et al. | A privacy-preserving fog computing framework for vehicular crowdsensing networks | |
CN108989318B (en) | Light-weight security authentication and key exchange method for narrowband Internet of things | |
CN110377002A (en) | A kind of adaptive interior CAN bus method of controlling security and system | |
CN111600661B (en) | Three-dimensional encryption OFDM optical system based on real-time updated chaotic key distribution | |
Lai et al. | Identity-based encryption secure against selective opening chosen-ciphertext attack | |
Sherif et al. | Privacy-preserving ride sharing organization scheme for autonomous vehicles in large cities | |
Xie et al. | A Wireless Key Generation Algorithm for RFID System Based on Bit Operation. | |
CN117171779B (en) | Data processing device based on intersection protection | |
CN114172639B (en) | Quantum encryption communication method based on block chain | |
CN106789963A (en) | Asymmetric whitepack cipher encrypting method and device and equipment | |
CN110365746A (en) | A kind of information transferring method and system | |
CN114257314B (en) | Quantum encryption communication method based on multiparty security calculation | |
CN105743882A (en) | Quantum key distribution eavesdropping judgment method based on BB84 protocol | |
CN109728908A (en) | A kind of key management method based on quantum safety moving storage medium | |
CN114172635B (en) | Double-speed service aliasing communication method based on quantum distribution | |
CN103957112A (en) | Security multicast communication method based on chaotic neural network | |
Li | Research on an optimised encryption algorithm for network information security communication | |
CN106487495A (en) | Lightweight RFID authentication method based on integer chaos | |
Zhang et al. | Chaotic Stream Cipher‐Based Secure Data Communications over Intelligent Transportation Network | |
Lin et al. | [Retracted] Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data | |
CN111914967B (en) | Elliptic curve radio frequency identification bidirectional authentication method with random parameter entrusted storage | |
Kadhim et al. | Secure Data Packet in MANET Based Chaos-Modified AES Algorithm | |
CN115329369B (en) | Model joint construction method based on multi-party longitudinal privacy protection and logistic regression | |
CN115001650B (en) | Entity alignment encryption computing system and method based on graph neural network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191022 |