CN111901126B - Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer - Google Patents

Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer Download PDF

Info

Publication number
CN111901126B
CN111901126B CN202010778775.7A CN202010778775A CN111901126B CN 111901126 B CN111901126 B CN 111901126B CN 202010778775 A CN202010778775 A CN 202010778775A CN 111901126 B CN111901126 B CN 111901126B
Authority
CN
China
Prior art keywords
data
decryption
priority
protocol stack
safety data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010778775.7A
Other languages
Chinese (zh)
Other versions
CN111901126A (en
Inventor
王鹤
潘为豪
王晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Wangfuda Information Technology Co ltd
Original Assignee
Shenzhen Wangfuda Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Wangfuda Information Technology Co ltd filed Critical Shenzhen Wangfuda Information Technology Co ltd
Priority to CN202010778775.7A priority Critical patent/CN111901126B/en
Publication of CN111901126A publication Critical patent/CN111901126A/en
Application granted granted Critical
Publication of CN111901126B publication Critical patent/CN111901126B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/125Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Communication Control (AREA)

Abstract

The invention discloses a method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer, belonging to the technical field of C-V2X wireless communication and comprising the following steps: acquiring a plurality of V2X safety data of an MAC layer; the data receiving thread calculates the self-defined priority; inserting the custom priority into each piece of V2X safety data, and sending the updated V2X safety data to a thread in a decryption and signature checking thread pool for decryption and signature checking operation to obtain the V2X safety data after decryption and signature checking operation; carrying out protocol analysis on the V2X safety data after decryption and signature verification operation; inserting the V2X safety data after protocol analysis into a multi-priority data queue according to the priority and the receiving time; the application layer acquires V2X safety data after the data and protocol analysis from the multi-priority data queue and performs protocol logic processing; the processing that the V2X protocol stack network layer avoids decrypting and checking the time consumption of the module is finished, the time consumption caused by single thread sequence processing is solved, the time consumption operation is reduced, and the performance of processing the data packet by the software protocol stack is improved.

Description

Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer
Technical Field
The invention relates to the technical field of C-V2X wireless communication, in particular to a method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer.
Background
As the name suggests, V2X (Vehicle to event) is a communication system that is specially used for connecting a Vehicle with the surrounding environment, and is connected with Everything and belongs to the internet of things.
In a C-V2X network layer software protocol stack, algorithm operations of encryption, decryption, signature and signature verification are performed, but these cryptographic operations are usually time-consuming, and especially when a software algorithm is used, the cryptographic operations become a time-consuming bottleneck, and hardware encryption and decryption increase costs.
Disclosure of Invention
According to the problems in the prior art, the invention discloses a method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer, which comprises the following steps:
s1, collecting a plurality of V2X safety data of an MAC layer;
s2, calculating a custom priority by a data receiving thread;
s3, inserting the custom priority into each piece of V2X safety data by the data receiving thread to obtain updated V2X safety data;
s4, the data receiving thread sends the updated V2X safety data to a thread in a decryption and signature checking thread pool to perform decryption and signature checking operation, and the V2X safety data after the decryption and signature checking operation are obtained;
s5, carrying out protocol analysis on the V2X safety data after decryption and signature verification operation;
s6, inserting the V2X safety data after the protocol analysis into a multi-priority data queue according to the priority and the receiving time;
s7, the application layer acquires the V2X safety data after the data is analyzed by the protocol from the multi-priority data queue and performs protocol logic processing; namely, the processing that the network layer of the V2X protocol stack avoids decrypting the signature verification module and consumes time is finished.
Further, the data receiving thread custom priority is obtained by: the priority is customized by combining the priority uploaded by the MAC layer and the time when the V2X security data is received.
Further, the data receiving thread obtains the current time of the protocol stack operating system as the data receiving time while receiving the V2X security data.
Further, the priority data queue comprises a plurality of data queues, the data queues insert data according to an insert-first-execution principle, and the maximum data quantity in the data queues is determined according to a memory of a protocol stack operating system.
Furthermore, a corresponding priority data queue is found through the analyzed priority field, the analyzed V2X safety data are inserted into the queue according to the sequence of data receiving time, and the protocol stack is transmitted to an application layer.
Due to the adoption of the technical scheme, the method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer solves the problem of time consumption caused by single-thread sequential processing, reduces time consumption operation by parallelly processing the data packets, improves the performance of a software protocol stack for processing the data packets, and improves the processing capacity of the protocol stack.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a process diagram of the method of the present invention.
Detailed Description
In order to make the technical solutions and advantages of the present invention clearer, the following describes the technical solutions in the embodiments of the present invention clearly and completely with reference to the drawings in the embodiments of the present invention:
fig. 1 is a schematic diagram of a process of a method of the present invention, which is a method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer, and includes the following steps:
s1, collecting a plurality of V2X safety data of an MAC layer;
s2, calculating a custom priority by a data receiving thread;
s3, inserting the custom priority into each piece of V2X safety data by the data receiving thread to obtain updated V2X safety data;
s4, the data receiving thread sends the updated V2X safety data to a thread in a decryption and signature checking thread pool to perform decryption and signature checking operation, and the V2X safety data after the decryption and signature checking operation are obtained;
s5, carrying out protocol analysis on the V2X safety data after decryption and signature verification operation;
s6, inserting the V2X safety data after protocol analysis into a multi-priority data queue according to the priority and the receiving time;
s7, the application layer acquires data from the multi-priority data queue, analyzes the protocol and then carries out V2X safety data, and carries out protocol logic processing; namely, the processing that the network layer of the V2X protocol stack avoids decrypting the signature verification module and consumes time is finished.
Further, the data receiving thread custom priority is obtained by: the priority uploaded by the MAC layer and the time for receiving the V2X safety data are combined to define the priority, the priority uploaded by the MAC layer occupies 1 byte, the time for receiving the V2X safety data occupies 16 bytes, the definition priority is inserted before the V2X safety data, and the definition priority of each V2X safety data is different and is used for identifying the uniqueness of each safety data.
Further, the data receiving thread obtains the current time of the protocol stack operating system as the data receiving time while receiving the V2X safety data, and the precision is accurate to ms.
Further: the priority data queue comprises a plurality of data queues, the data queues insert data according to the principle of inserting first and executing first, and the maximum data quantity in the data queues is determined according to the internal memory of the protocol stack operating system.
Further, a decryption and signature checking thread pool is set, and the maximum thread number in the decryption and signature checking thread pool is set according to the maximum acceptable number at the same time in the step S1.
Furthermore, a corresponding priority data queue is found through the analyzed priority field, and the analyzed V2X safety data are inserted into the queue according to the sequence of the receiving time and are transmitted to an application layer.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered as the technical solutions and the inventive concepts of the present invention within the technical scope of the present invention.

Claims (5)

1. A method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer is characterized in that: the method comprises the following steps:
s1, collecting a plurality of V2X safety data of an MAC layer;
s2, calculating a custom priority by a data receiving thread;
s3, inserting the custom priority into each piece of V2X safety data by the data receiving thread to obtain updated V2X safety data;
s4, the data receiving thread sends the updated V2X safety data to a thread in a decryption and signature checking thread pool to perform decryption and signature checking operation, and the V2X safety data after the decryption and signature checking operation are obtained;
s5, carrying out protocol analysis on the V2X safety data after decryption and signature verification operation;
s6, inserting the V2X safety data after protocol analysis into a multi-priority data queue according to the priority and the receiving time;
s7, the application layer acquires the V2X safety data after the data is analyzed by the protocol from the multi-priority data queue and performs protocol logic processing; namely, the processing that the network layer of the V2X protocol stack avoids decrypting the signature verification module and consumes time is finished.
2. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 1, wherein: the data receiving thread self-defined priority is obtained by the following method: the priority is customized by combining the priority uploaded by the MAC layer and the time when the V2X security data is received.
3. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 2, wherein: and the data receiving thread acquires the current time of the protocol stack operating system as the data receiving time while receiving the V2X safety data.
4. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 1, wherein: the priority data queue comprises a plurality of data queues, the data queues insert data according to the principle of first insertion and first execution, and the maximum data quantity in the data queues is determined according to the memory of a protocol stack operating system.
5. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 1, wherein: finding out the corresponding priority data queue through the analyzed priority field, inserting the analyzed V2X safety data into the queue according to the sequence of data receiving time, and transmitting the queue to an application layer.
CN202010778775.7A 2020-08-05 2020-08-05 Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer Active CN111901126B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010778775.7A CN111901126B (en) 2020-08-05 2020-08-05 Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010778775.7A CN111901126B (en) 2020-08-05 2020-08-05 Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer

Publications (2)

Publication Number Publication Date
CN111901126A CN111901126A (en) 2020-11-06
CN111901126B true CN111901126B (en) 2022-10-14

Family

ID=73245967

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010778775.7A Active CN111901126B (en) 2020-08-05 2020-08-05 Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer

Country Status (1)

Country Link
CN (1) CN111901126B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113795008B (en) * 2021-03-29 2022-08-02 荣耀终端有限公司 V2X signature verification method and device, electronic equipment and readable storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101612518B1 (en) * 2009-11-26 2016-04-15 삼성전자주식회사 Endecryptor enabling parallel processing and en/decryption method thereof
US10475344B2 (en) * 2017-08-01 2019-11-12 Denso International America, Inc. Systems and methods for adaptive filtering of vehicle-to-vehicle messages from remote vehicles
CN109768939B (en) * 2018-11-27 2021-05-25 中国科学院计算技术研究所 Priority-supporting labeling network stack method and system
CN109672996B (en) * 2018-12-29 2022-02-11 重庆邮电大学 Road side equipment system based on V2X and information distribution method thereof

Also Published As

Publication number Publication date
CN111901126A (en) 2020-11-06

Similar Documents

Publication Publication Date Title
US11971978B2 (en) Vehicle network system whose security is improved using message authentication code
CN109379380A (en) Data transmission method, data receiver method and remote printing system, mobile terminal
CN111083161A (en) Data transmission processing method and device and Internet of things equipment
EP3605881B1 (en) Method and device for transmitting and receiving network management information, transmitting apparatus and receiving apparatus
WO2021022794A1 (en) Rdma-based data transmission method, network card, server and medium
US10243829B2 (en) Communication protocol testing method, and tested device and testing platform thereof
CN111049803A (en) Data encryption and platform security access method based on vehicle-mounted CAN bus communication system
CN112995208B (en) Fault early warning test method and system for intelligent lock and storage medium
US20200128042A1 (en) Communication method and apparatus for an industrial control system
EP4057576A1 (en) Packet encapsulating method and apparatus, and packet decapsulating method and apparatus
CN111901126B (en) Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer
CN110336661B (en) AES-GCM data processing method, device, electronic equipment and storage medium
US11082411B2 (en) RDMA-based data transmission method, network interface card, server and medium
CN111416791B (en) Data transmission method, equipment and system
CN114978676B (en) Data packet encryption and decryption method and system based on FPGA and eBPF cooperation
CN110557446A (en) communication method and system adapted by ATT and data segmentation and recombination
CN115914130A (en) Data traffic processing method and device of intelligent network card
CN115361210A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN115866587A (en) Internet of things safety data processing method, device and system based on real-time dynamic transmission
US11599649B2 (en) Method and apparatus for managing transmission of secure data packets
US11960611B2 (en) Efficient distribution of processes between a vehicle control computing device and a cryptographic module, and method for operation thereof
CN115152180A (en) Improved packet transmission
CN117560226B (en) Method and device for data transmission through VPN
CN111262837A (en) Data encryption method, data decryption method, system, equipment and medium
CN109831293B (en) Decryption method and system based on Aes algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant