CN112911545B - Emergency message dissemination method and system with trust management and privacy protection functions in SAGAVINS - Google Patents
Emergency message dissemination method and system with trust management and privacy protection functions in SAGAVINS Download PDFInfo
- Publication number
- CN112911545B CN112911545B CN202110122978.5A CN202110122978A CN112911545B CN 112911545 B CN112911545 B CN 112911545B CN 202110122978 A CN202110122978 A CN 202110122978A CN 112911545 B CN112911545 B CN 112911545B
- Authority
- CN
- China
- Prior art keywords
- vehicle
- reputation
- emergency
- sky
- vehicles
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 230000007480 spreading Effects 0.000 claims abstract description 6
- 238000004891 communication Methods 0.000 claims description 16
- 230000001413 cellular effect Effects 0.000 claims description 12
- 238000001514 detection method Methods 0.000 claims description 10
- 238000012795 verification Methods 0.000 claims description 9
- 239000000047 product Substances 0.000 claims description 4
- NAWXUBYGYWOOIX-SFHVURJKSA-N (2s)-2-[[4-[2-(2,4-diaminoquinazolin-6-yl)ethyl]benzoyl]amino]-4-methylidenepentanedioic acid Chemical compound C1=CC2=NC(N)=NC(N)=C2C=C1CCC1=CC=C(C(=O)N[C@@H](CC(=C)C(O)=O)C(O)=O)C=C1 NAWXUBYGYWOOIX-SFHVURJKSA-N 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 3
- 239000013589 supplement Substances 0.000 claims description 3
- 230000001360 synchronised effect Effects 0.000 claims description 3
- 101100460704 Aspergillus sp. (strain MF297-2) notI gene Proteins 0.000 claims description 2
- 238000012360 testing method Methods 0.000 claims description 2
- 230000008569 process Effects 0.000 description 4
- 230000010267 cellular communication Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Traffic Control Systems (AREA)
Abstract
The invention discloses an emergency message dissemination method and system in SAGEVNs for both trust management and privacy protection, wherein the method comprises the following steps: initializing a system, initializing a trusted authority TA and initializing other entities in the system; vehicle registration; request of reputation certificate, vehicle request new reputation certificate, temporary private key and secret threshold grade set from TA; spreading emergency messages, wherein when one vehicle senses the occurrence of an emergency, the emergency messages are spread to other vehicles in a V2V mode; the system comprises a reputation feedback report, a vehicle-mounted sensor and a vehicle-mounted sensor, wherein the reputation feedback report is used for sensing the actual state of an emergency and judging the correctness of the emergency when other vehicles drive into a preset range of the emergency; and updating the prestige information, and updating the prestige information of the vehicle by the TA according to the prestige feedback. The method is based on 0-1 coding and FNV hash algorithm, can give consideration to trust management and privacy protection, supports the multiplexing of pseudonyms, temporary public keys and temporary private keys in different time intervals, and has strong fault tolerance and adaptability.
Description
Technical Field
The invention belongs to the technical field of car networking safety, and particularly relates to an emergency message dissemination method and system in SAGEVNs with trust management and privacy protection.
Background
The internet of vehicles can greatly improve road safety and traffic efficiency, and is widely supported by the industry and academia in recent years. Collaborative security applications are an important branch of the internet of vehicles, where emergency message dissemination enables each vehicle to intelligently perceive surrounding conditions and make timely decisions about potential hazards. However, due to the limited coverage of the ground infrastructure (including road side units, cellular base stations, etc.), there is no way to cover every place, especially rural, mountain or disaster areas, by means of a ground network alone. To achieve full coverage radio access services, a new network architecture must be adopted. Air-space-ground integrated internet of vehicles (SAGAVIN) is a product of applying an air-space-ground integrated network (SAGIN) architecture in the internet of vehicles, and comprises a space part (comprising satellites and the like), a sky part (comprising unmanned planes, balloons, airships and the like) and a ground part (comprising road side units, cellular base stations, vehicles and the like). However, SAGIVNs are vulnerable to external and internal attacks due to their bulky, open, heterogeneous, self-organizing, highly dynamic, etc. characteristics, which severely hamper the practical application of SAGIVNs.
Trust management and privacy protection play important roles in SAGEVNs, wherein the trust management is a key tool for constructing the trusted SAGEVNs, and the willingness of users to participate in emergency message dissemination can be greatly enhanced by realizing the privacy protection. However, there are conflicting requirements for trust management and privacy protection, and therefore how to consider trust management and privacy protection in SAGIVNs emergency message dissemination and overcome the deficiencies in the existing research is an urgent problem to be solved.
Disclosure of Invention
The invention mainly aims to overcome the defects and shortcomings in the prior art, and provides an emergency message dissemination method and system for considering both trust management and privacy protection in SAGEVNs, wherein the method is based on 0-1 coding and FNV hash algorithm and can perfectly consider both trust management and privacy protection.
In order to achieve the purpose, the invention adopts the following technical scheme:
an emergency message spreading method considering trust management and privacy protection in SAGAVINS is provided with a trusted authority TA, a road side unit RSU, a cellular base station BS, a vehicle and a vehicle-mounted sensor thereof, a vehicle-mounted unit OBU, a sky component, a satellite and a ground base station corresponding to the satellite, and comprises the following steps:
initializing a system, initializing a trusted authority TA and initializing other entities in the system;
vehicle registration, when a new vehicle is accessed into the SAGAVINS, a trusted authority TA distributes a unique identifier for the new vehicle, generates a master public key and a master private key, installs a trusted platform module and sets an initial reputation score for the vehicle;
the method comprises the steps that a prestige certificate request is carried out, and a vehicle requests a new prestige certificate, a temporary private key and a secret threshold level set from a TA;
spreading emergency messages, wherein when a certain vehicle senses the occurrence of an emergency through a vehicle-mounted sensor, the emergency messages are spread to other vehicles in a vehicle-to-vehicle V2V mode;
the method comprises the following steps that a prestige feedback report is carried out, when other vehicles drive into a preset range of emergency occurrence, the actual state of the emergency is sensed through a vehicle-mounted sensor, and the correctness of the emergency message is judged;
and (4) updating the prestige information, and updating the prestige information of the vehicle by the TA according to the prestige feedback in the database.
Further, the initialization of the trusted authority TA specifically includes:
setting TA self-clock and generating public key Pk for TA selfTAnd private key SkTWherein SkTAlways stored secretly by the TA;
TA divides time into a series of equal-length time intervals T1,T2,., and defining n selectable prestige levels and a threshold level L1<L2<...<LnWherein the length of each time interval is represented as theta, n ∈ Z+;
For each Tα∈{T1,T2,., TA from [0, λ n-1 ]]Randomly selecting n and L in interval1,L2,...,LnOrdered integers in one-to-one correspondenceAnd for eachRespectively calculating 0 codesAnd 1 encodingTo obtainAndall have at mostAn element; wherein λ ∈ Z+;
TA random Generation of secret valuesThe secret value is kept secret by the TA and isAndeach element c in (1) is calculatedGet the corresponding setAndif a hash collision occurs, another random one is generatedAnd regenerateAndthis detection is referred to as "collision detection-i";
wherein,represents the pair c andperforming character string splicing, and performing FNV hash on a spliced result;
binary coding r of TA with random rho bits1,r2,.. fill as a new elementAndto obtainCorresponding set of individual elementsAndfor each rτ∈{r1,r2,., if a certain one is availableIf true, another random value r is usedτThis detection is called "collision detection-II";
TA random rearrangementAndi.e. randomly disordering the element sequence in each set to obtain the corresponding setAndand storing it in a database;
wherein,andare respectively called and Lβ∈{L1,L2,...,LnAt TαInner secret 0 encoding and secret 1 encoding.
Further, the initialization of other entities in the system specifically includes:
configuring a satellite and corresponding ground base stations, and establishing wired connection between each ground base station and a TA (timing advance);
configuring a sky assembly to be suspended above a roadway and to supplement a BS, wherein the sky assembly includes a drone, a balloon, and an airship;
RSUs are installed beside a road, and wired connection is established between each RSU and a TA;
BSs are installed near the road, and a wired connection is established between each BS and the TA.
Further, the vehicle registration specifically includes:
when the vehicle ViUpon registration with the TA, the TA distributes a unique identifier i for it, and the TA generates ViMaster public key ofAnd a master private keyAnd is taken as V in an off-line manneriInstalling a trusted platform module;
the trusted platform module is used for storingPkTA clock synchronized with the TA, parameters shared with the TA, and cryptography and digital signature algorithms to protect the reputation certificate, the temporary private key, and the secret threshold level set from theft, manipulation, or sharing;
TA is V according to equation (1)iSetting initial reputation scoreAnd will ViIs stored in the database, the formula is as follows:
further, the reputation certificate request comprises the steps of:
Vigenerating random valuesAnd selecting a threshold levelThen generates the request informationAs shown in equation (2):
wherein,indicating the use of PkTTo carry outThe asymmetric encryption is carried out in such a way that,indicating use ofThe generated digital signature is shown in formula (3):
vehicle ViWill be connected by means of vehicle-to-infrastructure V2I or vehicle-to-sky assembly V2A or vehicle-to-satellite V2SSending the data to the TA;
receive fromThen, TA utilizes SkTDecryptionTo obtain i, TlViAndand based onAuthenticationThe validity of (2).
Further, the reputation certificate request further comprises the steps of:
TA obtains the Current TαAnd attempts to retrieve V from the databaseiAt TαK groups of reputation certificates, ephemeral private keys, and a secret threshold level set:
if the search result is null, TA searches V in the databaseiCurrent reputation score ofAnd convert it to the current reputation levelThe conversion is shown in equation (4):
TA retrieves from the database at TαInner correspond toSecret 0 encoding ofAnd is ViGenerating k sets of pseudonyms, ephemeral public keys, ephemeral private keys, and random values to form
Wherein,are each ViAt TαA kth pseudonym, a kth temporary public key, a kth temporary private key, and a kth random value within;
for each kappa, TA isEach element c in (1) calculatesFilling according to the method mentioned in TA initializationRandomly rearranging the set to obtain ViAt TαInner kth random reputation levelTA is ViIs generated at TαInner kth reputation certificateAs shown in equation (5):
TA retrieves from the database at TαInner correspond toSecret 1 encoding ofAnd using it as ViAt TαInner secret threshold level setThen will beAndstoring in a database;
After executing corresponding operation according to the retrieval result, TA is ViGenerating a response messageAs shown in equation (7):
wherein,indicating use ofThe asymmetric encryption is carried out and,indicating the use of SkTThe generated digital signature is shown in formula (8):
Vistore in its local storageAndif ViFail to receive in timeThe TA will be requested again with a new request message in the form of V2I or V2A or V2S.
Further, the emergency message dissemination specifically includes:
when a certain vehicle ViV when the presence of an emergency event epsilon is sensed by an on-board sensor and intentionally reported to a surrounding vehicleiFirst, the current T is derivedαRandomly selecting one kappa from {1, 2.. multidot.k }, and then selecting one kappa from the kRetrieving in local storage
wherein,a description is shown with respect to the event epsilon,to representThe time stamp of the time when it was generated,indicating use ofThe generated digital signature is shown in formula (10):
when another vehicle VjReceive fromVjBased onAndseparately verifyAndthe effectiveness of (a) is specifically:
Vjderiving a current time intervalAnd a current time stampRespectively verified by detecting formula (11) and formula (12)Andhas not expired whereinAnd ψ is two predefined parameters;
then is thatEach element c in (1) calculatesTo obtain a corresponding setAnd detectingWhether the result is true or not;
if it is notIs established, thenI.e. ViAt VjIt appears to be authentic, therefore VjIs based on immediatelyMaking a decision; at the same time, VjCan also be based onGenerating and broadcasting an emergency message to other vehicles;
if it is notIf not, thenI.e. ViAt VjIt appears to be untrusted, therefore VjCan not be aligned withMaking any decision;
therein, no matter whetherWhether or not it is true, as long asEffective and unexpired, VjAll storeTo facilitate subsequent reputation feedback reporting.
Further, the reputation feedback report specifically includes:
when a certain vehicle VjWhen the vehicle enters a preset range of the occurrence of the emergency event epsilon, the actual state of the emergency event epsilon is sensed and judged through the vehicle-mounted sensorThe correctness of the test;
wherein, alpha,Andare all extracted fromIndicating use ofThe generated digital signature is shown in formula (15):
Receive fromAfter that, TA is verified by the detection equation (16)Validating and deriving the current timestamp TnT;
TA will beAnd the unique identifier i of the emergency message broadcaster is stored in the database, and if VjIs composed ofReporting a plurality of prestige feedbacks, the TA storing only the latest one;
wherein,Is extracted fromIndicating the use of SkTThe generated digital signature is shown in formula (19):
Receive fromRear, VjUse ofDecryptionAnd verifyWhether or not it is consistent with formula (19), decryptedAnd is storedIn (1)Whether they are equal; if the verification passes, VjConfirm TA has receivedAnd deleted from local storageIf VjFail to receive in timeOr if the verification fails, VjWill be provided withAnd re-sent to TA in V2I or V2A or V2S.
Further, the updating of the reputation information specifically includes:
for each time interval and each vehicle, the TA derives a current timestampAnd selecting V within a predefined time range from the databaseiAll reputation feedback reported by the emergency message;
wherein,for predefining time range parameters, useIs shown as ViThe set of all reputation feedbacks reported by the emergency message of (1);
wherein,andrespectively, V in TA databaseiAnd VjIs equal to [0,1 ] the current reputation score of]Is an attenuation factor;
i.e. if the formula (22) holds,
is calculated asA weighted average sum of; if not, then,are calculated as attenuation factors delta and ViThe product of the current reputation scores;
The invention also provides an emergency message dissemination system with trust management and privacy protection in SAGEVNs, and the system uses the emergency message dissemination method provided by the invention, and comprises a space part, a sky part and a ground part;
the space part comprises a plurality of satellites and corresponding ground base stations;
the sky part consists of a plurality of sky components, and the sky components specifically comprise unmanned planes, balloons and airships;
the ground part comprises a credible institution TA, a plurality of road side units RSUs, a plurality of cellular base stations BS and a plurality of vehicles, and the vehicles are provided with an on-board unit OBU and a plurality of on-board sensors; the trusted authority TA is used for registering vehicles, storing and regularly updating reputation information of the vehicles, generating and distributing reputation certificates, temporary private keys and secret threshold level sets for the vehicles;
the road side unit RSU and the cellular base station BS are used as ground infrastructure, are connected to the TA in a wired mode and are used as an interface for communication between the TA and the vehicle;
the satellites are communicated with each other in a satellite-to-satellite S2S mode, the satellites and the ground base stations are communicated with each other in a ground-to-satellite G2S mode, and the ground base stations are connected to a trusted authority in a wired mode;
the multiple sky components form one or more flying ad hoc networks FANETs, the sky components in the FANETs are communicated with each other in a sky component-to-sky component A2A mode, the sky components and the cellular base station are communicated with each other in a ground-to-sky G2A mode, and the sky components and the satellites are communicated with each other in a sky-to-space A2S mode;
emergency information is disseminated among the vehicles in a V2V wireless communication mode, the vehicles are connected with the RSU or the BS in a V2I wireless communication mode, the vehicles are connected with the sky assembly in a vehicle-to-sky assembly V2A communication mode, and the vehicles are connected with the satellites in a vehicle-to-satellite V2S communication mode.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. based on 0-1 coding and FNV hash algorithm, the invention can give good consideration to trust management and privacy protection; by adopting the SAGIN architecture, each vehicle can be connected to a trusted authority in a reputation certificate request stage and a reputation feedback report stage through various optional modes, and compared with the existing method, the method has stronger applicability; the invention can provide strong fault tolerance and provide strong fault tolerance for temporary faults of the trusted mechanism.
2. The invention supports the multiplexing of the pseudonym, the temporary public key and the temporary private key in different time intervals, and compared with the prior method, the pseudonym, the temporary public key and the temporary private key in the invention are shorter, thereby saving the storage space and the network bandwidth.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
FIG. 2 is a schematic diagram of the system of the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
Examples
As shown in fig. 2, the emergency message dissemination system for both trust management and privacy protection in SAGIVNs of the present invention includes a space portion, a sky portion, and a ground portion;
the space part comprises a plurality of satellites and corresponding ground base stations, the satellites form one or more Satellite hosts, and the satellites in each Satellite host can communicate with each other in a Satellite-to-Satellite (S2S) mode. Meanwhile, the Satellite and the corresponding Ground base station can communicate with each other through a Ground-to-Satellite (G2S) manner, and the Ground base station is connected to a Trusted Authority (TA) through a wired manner.
The sky part comprises a plurality of unmanned aerial vehicles, balloon, airship etc. (all called sky subassembly). The sky components form one or more self-organizing Networks (FANETs), and the sky components can communicate with each other in a sky-to-sky-component (A2A) mode through the sky components in each FANET. In addition, the sky component supports multiple communication modes, such as cellular communication, satellite communication, and the like. Therefore, sky components and cellular Base Stations (BSs) within a certain range can communicate with each other in a Ground-to-Air (G2A) manner, and sky components and satellites can communicate with each other in a sky-to-Space (A2S) manner.
The ground part comprises a centralized Authority (TA) and a large number of Road Side Units (RSUs), cellular Base Stations (BSs) and vehicles (vehicles). The TA is responsible for vehicle registration, storing and periodically updating the reputation information of the vehicle, generating and distributing a reputation certificate/ephemeral private key/secret threshold level set for the vehicle. The RSU and BS act as two types of ground infrastructure, are wired to the TA, and act as an interface for communication between the TA and the vehicle. Each vehicle is equipped with a plurality of On-Board sensors and an On-Board Unit (OBU), which supports a plurality of Communication modes, such as Dedicated Short Range Communication (DSRC), cellular Communication, satellite Communication, and the like. Thus, vehicles can sense an emergency (e.g., an obstacle) within a certain range and communicate with each other in a wireless Vehicle-to-Vehicle (V2V) manner to disseminate emergency information in the SAGIVNs. In addition, each Vehicle can connect a range of RSUs or BSs wirelessly from Vehicle-to-Infrastructure (V2I) depending on the current network status and its own needs; connecting a range of sky components (in the sky part) in a Vehicle-to-sky component (V2A) mode; or connecting the satellites (in space) in a Vehicle-to-Satellite (V2S) manner, wherein the V2A and V2S manners can be regarded as special forms of the G2A and G2S manners, respectively.
In this embodiment, the emergency message dissemination system deploys an emergency message dissemination method that gives consideration to both trust management and privacy protection in SAGIVNs, so as to give consideration to both trust management and privacy protection, as shown in fig. 1, the method specifically includes the following steps:
s1, initializing the system, including initializing a trusted authority TA and initializing other entities in the system;
s11, TA initialization, specifically:
TA sets its clock and generates public key Pk for itselfTAnd private key SkT;
Wherein, SkTAlways stored by the TA secret.
TA divides time into a series of equal-length time intervals T1,T2,., and defining n (n is Z)+) Selectable reputation level and threshold level L1<L2<...<Ln。
Where the length of each time interval is denoted as θ.
For each Tα∈{T1,T2,., TA from [0, λ n-1 ]]Within the interval (lambda belongs to Z+) Randomly selecting n and L1,L2,...,LnOrdered integers in one-to-one correspondenceAnd for eachRespectively calculating 0 codesAnd 1 encodingTo obtainAndall have at mostAnd (4) each element.
TA random Generation of secret valuesThe secret value is kept secret by the TA and isAndeach element c in (1) is calculatedGet the corresponding setAndif a hash collision occurs, another random one is generatedAnd regenerateAndthis detection is referred to as "collision detection-i";
wherein,represents the pair c andperforming character string splicing, and performing FNV hash on a spliced result;
binary coding r of TA with random rho bits1,r2,.. fill as a new elementAndto obtainCorresponding set of individual elementsAndfor each rτ∈{r1,r2,., if a certain one is availableIf true, another random value r is usedτThis detection is called "collision detection-II";
TA random rearrangementAndi.e. randomly disordering the element sequence in each set to obtain the corresponding setAndand storing it in a database;
wherein,andare respectively called and Lβ∈{L1,L2,...,LnAt TαInner secret 0 encoding and secret 1 encoding.
S12, initializing other entities, specifically:
configuring a satellite and corresponding ground base stations, and establishing wired connection between each ground base station and a TA (timing advance);
configuring an unmanned aerial vehicle, a balloon and an airship to suspend above a road and supplement BS;
RSUs are installed beside a road, and wired connection is established between each RSU and a TA;
BSs are installed near the road, and a wired connection is established between each BS and the TA.
S2, vehicle registration, specifically:
when the vehicle ViUpon registration with the TA, the TA distributes a unique identifier i for it, and the TA generates ViMaster public key ofAnd a master private keyAnd is taken as V in an off-line manneriInstalling Trusted Platform Module (TPM) for storagePkTClocks synchronized with the TA, parameters shared with the TA, cryptography and digital signature algorithms, and protection reputation certificates, ephemeral private keys, and secret threshold level sets to ensure that they are not stolen, manipulated, or shared.
TA is V according to equation (1)iSetting initial reputation scoreAnd will ViIs stored in the database, the formula is as follows:
s3, request for reputation certificate, at the beginning of each time interval, vehicle ViRequesting a new reputation certificate, a temporary private key and a secret threshold level set from the TA, specifically:
S31、Vigenerating random valuesAnd selecting a threshold levelThen generates the request informationAs shown in equation (2):
wherein,indicating the use of PkTThe asymmetric encryption is carried out and,indicating use ofThe generated digital signature is shown in formula (3):
receive fromThen, TA utilizes SkTDecryptionTo obtain i,Andand based onAuthenticationThe validity of (2);
TA obtains the Current TαAnd attempts to retrieve V from the databaseiAt TαK groups of reputation certificates, ephemeral private keys, and a secret threshold level set:
if the search result is null, TA searches V in the data baseiCurrent reputation score ofAnd convert it to the current reputation levelThe conversion is shown in equation (4):
TA retrieves from the database at TαInner correspond toSecret 0 encoding ofAnd is ViGenerating k sets of pseudonyms, ephemeral public keys, ephemeral private keys, and random values to form
Wherein,are each ViAt TαThe k-th pseudonym, the k-th temporary public key, the k-th temporary private key and the k-th random key in the blockA machine value;
for each kappa, TA isEach element c in (1) calculatesFilling and randomly rearranging the set (including collision detection-I and collision detection-II) to obtain V according to the method mentioned in TA initializationiAt TαInner kth random reputation levelTA is ViIs generated at TαInner kth reputation certificateAs shown in equation (5):
TA retrieves from the database at TαInner correspond toSecret 1 encoding ofAnd using it as ViAt TαInner secret threshold level setThen will beAndstored in a database.
Secondly, if the retrieval result is not null, the TA adopted result is concentrated on the existing oneAndwithout generating new onesAnd
the above strategy can ensure that even ViRequest TA multiple times, at each TαOnly k groups of reputation certificates, temporary private keys and a secret threshold level set can be obtained, which greatly enhances the privacy protection capability of the method.
wherein,indicating use ofThe asymmetric encryption is carried out and,indicating the use of SkTThe generated digital signature is shown in formula (8):
Vistore in its local storageAndif ViFail to receive in timeIt can adopt other alternative ways (i.e. V2I or V2A or V2S) to send a new request message (containing a new randomTo avoid its request message being linked by an adversary) to request the TA again.
S4, spreading the urgent message, wherein when an urgent event epsilon occurs, the urgent message about epsilon can be spread in nearby vehicles by a V2V method, specifically:
s41, if a certain vehicle ViSensing the presence of epsilon and intentionally reporting to surrounding vehicles by on-board sensors, ViFirst, the current T is derivedαRandomly selecting one kappa from {1, 2.. multidot.k }, and then searching in a local storage
wherein,a description is shown with respect to the event epsilon,to representThe time stamp of the time when it was generated,indicating use ofThe generated digital signature is shown in formula (10):
VjDeriving a current time intervalAnd a current time stampRespectively verified by detecting formula (11) and formula (12)Andhas not expired whereinAnd psi are two predefined parameters.
Vehicle VjRetrieve at T in local storeαInner secret threshold level setAnd fromIs prepared byAndthen is thatEach element c in (1) calculatesTo obtain a corresponding set(it is called VjIs corresponding toRandom threshold level set) and detectWhether or not this is true.
If true, thenI.e. ViAt VjIt appears to be authentic, therefore VjIs based on immediatelyMaking a decision; at the same time, VjCan also be based onGenerating and broadcasting an urgent message to surrounding vehicles;
if not, thenI.e. ViAt VjIt appears to be untrusted, therefore VjCan not be aligned withMaking any decision; whether or notWhether or not it is true, as long asIs effective and does notExpiration date, VjAll storeTo facilitate subsequent reputation feedback reporting. This strategy can greatly facilitate the reputation evolution of newly registered vehicles with low initial reputation scores.
In the above process, each message receiver can accurately judge whether a message broadcaster is trusted or not in a non-interactive and privacy-protecting manner.
S5, the reputation feedback report specifically includes:
when a certain vehicle VjWhen the vehicle enters a preset range of the occurrence of the emergency event epsilon, the actual state of the epsilon (namely whether the vehicle exists or not, marked as) And judgeThe correctness of the operation. VjIs composed ofCalculating a feedback scoreAs shown in equation (13):
wherein, alpha,Andare all extracted fromIndicating use ofThe generated digital signature is shown in formula (15):
receive fromAfter that, TA is verified by the detection equation (16)Validating and deriving the current timestamp TnT。
TA will beAnd a unique identifier i (corresponding to T) of the message broadcasterαInside of) Stored in a database. If VjIs composed ofMultiple reputation feedbacks are reported and the TA stores only the latest one.
wherein,is extracted fromIndicating the use of SkTThe generated digital signature is shown in formula (19):
Receive fromRear, VjUse ofDecryptionAnd verifyWhether or not it is consistent with formula (19), decryptedAnd is storedIn (1)Whether they are equal; if the verification passes, VjConfirm TA has receivedAnd deleted from local storageIf VjFail to receive in timeOr if the verification fails, VjWill be provided withAnd sent to the TA again in the other alternative (i.e., V2I or V2A or V2S).
And S6, updating the reputation information, and updating the reputation information of the vehicle by the TA according to the reputation feedback in the database when each time interval is ended, wherein the updating specifically comprises the following steps:
for each time interval (e.g. T)α) And each vehicle (e.g. V)i),
TA derived current timestampAnd selects from the database that it is within the predefined time range (i.e., satisfies equation (20) whereIs a predefined parameter) is ViAll reputation feedback reported by the urgent message (the set of which is denoted as)
wherein,andrespectively, V in TA databaseiAnd VjIs equal to [0,1 ] the current reputation score of]Is an attenuation factor.
I.e. if the formula (22) holds,
is calculated asWherein the current reputation score of each message recipient is taken as an important weight; if not, then,are calculated as attenuation factors delta and ViThe product of the current prestige scores.
TA will be ViReputation score in the database is updated toIs obtained by the formula (1) and the formula (21)Andall belong to the interval [0,1]。
It should also be noted that in this specification, terms such as "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (9)
1. An emergency message spreading method considering trust management and privacy protection in SAGAVINS is characterized by comprising a trusted authority TA, a road side unit RSU, a cellular base station BS, a vehicle-mounted sensor and a vehicle-mounted unit OBU of the vehicle, a sky component, a satellite and a ground base station corresponding to the satellite, and comprises the following steps:
initializing a system, initializing a trusted authority TA and initializing other entities in the system; the method specifically comprises the following steps:
setting TA self-clock and generating public key Pk for TA selfTAnd private key SkTWherein SkTAlways stored secretly by the TA;
TA divides time into a series of equal-length time intervals T1,T2…, and defining n selectable reputation levels and a threshold level L1<L2<…<LnWherein the length of each time interval is represented as theta, n ∈ Z+;
For each Tα∈{T1,T2…, TA from [0, λ n-1 ]]Randomly selecting n and L in interval1,L2,...,LnOrdered integers in one-to-one correspondenceAnd for eachRespectively calculating 0 codesAnd 1 encodingTo obtainAndall have at mostAn element; wherein λ ∈ Z+;
TA random Generation of secret valuesThe secret value is kept secret by the TA and isAndeach element c in (1) is calculatedGet the corresponding setAndif a hash collision occurs, another random one is generatedAnd regenerateAndreferred to as "collision detection-i";
wherein,represents the pair c andperforming character string splicing, and performing FNV hash on a spliced result;
binary coding r of TA with random rho bits1,r2… filling as a new elementAndto obtainCorresponding set of individual elementsAndfor each rτ∈{r1,r2… }, if a certain one is presentIf true, another random value r is usedτReferred to as "collision detection-II";
TA random rearrangementAndi.e. randomly disordering the element sequence in each set to obtain the corresponding setAndand storing it in a database;
wherein,andare respectively called and Lβ∈{L1,L2,…,LnAt TαInner secret 0 encoding and secret 1 encoding;
vehicle registration, when a new vehicle is accessed into the SAGAVINS, a trusted authority TA distributes a unique identifier for the new vehicle, generates a master public key and a master private key, installs a trusted platform module and sets an initial reputation score for the vehicle;
the method comprises the steps that a prestige certificate request is carried out, and a vehicle requests a new prestige certificate, a temporary private key and a secret threshold level set from a TA;
spreading emergency messages, wherein when a certain vehicle senses the occurrence of an emergency through a vehicle-mounted sensor, the emergency messages are spread to other vehicles in a vehicle-to-vehicle V2V mode;
the method comprises the following steps that a prestige feedback report is carried out, when other vehicles drive into a preset range of emergency occurrence, the actual state of the emergency is sensed through a vehicle-mounted sensor, and the correctness of the emergency message is judged;
and (4) updating the prestige information, and updating the prestige information of the vehicle by the TA according to the prestige feedback in the database.
2. The method as claimed in claim 1, wherein the initialization of other entities in the system is specifically:
configuring a satellite and corresponding ground base stations, and establishing wired connection between each ground base station and a TA (timing advance);
configuring a sky assembly to be suspended above a roadway and to supplement a BS, wherein the sky assembly includes a drone, a balloon, and an airship;
RSUs are installed beside a road, and wired connection is established between each RSU and a TA;
BSs are installed near the road, and a wired connection is established between each BS and the TA.
3. The method as claimed in claim 1, wherein the vehicle registration is specifically as follows:
when the vehicle ViUpon registration with the TA, the TA distributes a unique identifier i for it, and the TA generates ViMaster public key ofAnd a master private keyAnd is taken as V in an off-line manneriInstalling a trusted platform module;
the trusted platform module is used for storingPkTA clock synchronized with the TA, parameters shared with the TA, and cryptography and digital signature algorithms to protect the reputation certificate, the temporary private key, and the secret threshold level set from theft, manipulation, or sharing;
TA is V according to equation (1)iSetting initial reputation scoreAnd will ViIs stored in the database, the formula is as follows:
4. the method of claim 3, wherein said request for reputation certificates comprises the steps of:
Vigenerating random valuesAnd selecting a threshold levelThen generates the request informationAs shown in equation (2):
wherein,indicating the use of PkTThe asymmetric encryption is carried out and,indicating use ofThe generated digital signature is shown in formula (3):
vehicle ViWill be connected by means of vehicle-to-infrastructure V2I or vehicle-to-sky assembly V2A or vehicle-to-satellite V2SSending the data to the TA;
5. The method of claim 4, wherein said request for reputation certificates further comprises the steps of:
TA obtains the Current TαAnd attempts to retrieve V from the databaseiAt TαK groups of reputation certificates, ephemeral private keys, and a secret threshold level set:
if the search result is null, TA searches V in the databaseiCurrent reputation score ofAnd convert it to the current reputation levelThe conversion is shown in equation (4):
TA retrieves from the database at TαInner correspond toSecret 0 encoding ofAnd is ViGenerating k sets of pseudonyms, ephemeral public keys, ephemeral private keys, and random values to form
Wherein,are each ViAt TαA kth pseudonym, a kth temporary public key, a kth temporary private key, and a kth random value within;
for each kappa, TA isEach element c in (1) calculatesFilling and randomly rearranging the set to obtain V according to the method mentioned in TA initializationiAt TαInner kth random prestigeGradeTA is ViIs generated at TαInner kth reputation certificateAs shown in equation (5):
TA retrieves from the database at TαInner correspond toSecret 1 encoding ofAnd using it as ViAt TαInner secret threshold level setThen will beAndstoring in a database;
if the search result is not null, TA adopts the existing result setAndwithout generating new onesAnd
after executing corresponding operation according to the retrieval result, TA is ViGenerating a response messageAs shown in equation (7):
wherein,indicating use ofThe asymmetric encryption is carried out and,indicating the use of SkTGenerated digital signatures, e.g. officialFormula (8):
6. The method as claimed in claim 5, wherein the emergency message dissemination method for both trust management and privacy protection in SAGEVNs is specifically as follows:
when a certain vehicle ViV when the presence of an emergency event epsilon is sensed by an on-board sensor and intentionally reported to a surrounding vehicleiFirst, the current T is derivedαRandomly selecting a kappa from {1,2, …, k }, and then searching in the local storage
wherein,a description is shown with respect to the event epsilon,to representThe time stamp of the time when it was generated,indicating use ofThe generated digital signature is shown in formula (10):
when another vehicle VjReceive fromVjBased onAndseparately verifyAndthe effectiveness of (a) is specifically:
Vjderiving a current time intervalAnd a current time stampRespectively verified by detecting formula (11) and formula (12)Andhas not expired whereinAnd ψ is two predefined parameters;
then is thatEach element c in (1) calculatesTo obtain a corresponding setAnd detectingWhether the result is true or not;
if it is notIs established, thenI.e. ViAt VjIt appears to be authentic, therefore VjIs based on immediatelyMaking a decision; at the same time, VjCan also be based onGenerating and broadcasting an emergency message to other vehicles;
if it is notIf not, thenI.e. ViAt VjIt appears to be untrusted, therefore VjCan not be aligned withMaking any decision;
7. The method as claimed in claim 6, wherein the reputation feedback report is specifically:
when a certain vehicle VjWhen the vehicle enters a preset range of the occurrence of the emergency event epsilon, the actual state of the emergency event epsilon is sensed and judged through the vehicle-mounted sensorThe correctness of the test;
wherein, alpha,Andare all extracted fromIndicating use ofThe generated digital signature is shown in formula (15):
receive fromAfter that, TA is verified by the detection equation (16)Efficient and exportCurrent time stamp TnT;
TA will beAnd the unique identifier i of the emergency message broadcaster is stored in the database, and if VjIs composed ofReporting a plurality of prestige feedbacks, the TA storing only the latest one;
wherein,is extracted from Indicating the use of SkTThe generated digital signature is shown in formula (19):
Receive fromRear, VjUse ofDecryptionAnd verifyWhether or not it is consistent with formula (19), decryptedAnd is storedIn (1)Whether they are equal; if the verification passes, VjConfirm TA has receivedAnd deleted from local storageIf VjFail to receive in timeOr if the verification fails, VjWill be provided withAnd re-sent to TA in V2I or V2A or V2S.
8. The method as claimed in claim 7, wherein the updating of reputation information is specifically as follows:
for each time interval and each vehicle, the TA derives a current timestampAnd selecting V within a predefined time range from the databaseiAll reputation feedback reported by the emergency message;
wherein,for predefining time range parameters, useIs shown as ViThe set of all reputation feedbacks reported by the emergency message of (1);
wherein,andrespectively, V in TA databaseiAnd VjIs equal to [0,1 ] the current reputation score of]Is an attenuation factor;
i.e. if the formula (22) holds,
is calculated asA weighted average sum of; if not, then,are calculated as attenuation factors delta and ViThe product of the current reputation scores;
An emergency message dissemination system for both trust management and privacy protection in SAGAVINs, characterized in that the emergency message dissemination method of any of claims 1-8 is applied, comprising a space section, a sky section and a ground section;
the space part comprises a plurality of satellites and corresponding ground base stations;
the sky part consists of a plurality of sky components, and the sky components specifically comprise unmanned planes, balloons and airships;
the ground part comprises a credible institution TA, a plurality of road side units RSUs, a plurality of cellular base stations BS and a plurality of vehicles, and the vehicles are provided with an on-board unit OBU and a plurality of on-board sensors; the trusted authority TA is used for registering vehicles, storing and regularly updating reputation information of the vehicles, generating and distributing reputation certificates, temporary private keys and secret threshold level sets for the vehicles;
the road side unit RSU and the cellular base station BS are used as ground infrastructure, are connected to the TA in a wired mode and are used as an interface for communication between the TA and the vehicle;
the satellites are communicated with each other in a satellite-to-satellite S2S mode, the satellites and the ground base stations are communicated with each other in a ground-to-satellite G2S mode, and the ground base stations are connected to a trusted authority in a wired mode;
the multiple sky components form one or more flying ad hoc networks FANETs, the sky components in the FANETs are communicated with each other in a sky component-to-sky component A2A mode, the sky components and the cellular base station are communicated with each other in a ground-to-sky G2A mode, and the sky components and the satellites are communicated with each other in a sky-to-space A2S mode;
emergency information is disseminated among the vehicles in a V2V wireless communication mode, the vehicles are connected with the RSU or the BS in a V2I wireless communication mode, the vehicles are connected with the sky assembly in a vehicle-to-sky assembly V2A communication mode, and the vehicles are connected with the satellites in a vehicle-to-satellite V2S communication mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110122978.5A CN112911545B (en) | 2021-01-29 | 2021-01-29 | Emergency message dissemination method and system with trust management and privacy protection functions in SAGAVINS |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110122978.5A CN112911545B (en) | 2021-01-29 | 2021-01-29 | Emergency message dissemination method and system with trust management and privacy protection functions in SAGAVINS |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112911545A CN112911545A (en) | 2021-06-04 |
CN112911545B true CN112911545B (en) | 2022-04-12 |
Family
ID=76120197
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110122978.5A Active CN112911545B (en) | 2021-01-29 | 2021-01-29 | Emergency message dissemination method and system with trust management and privacy protection functions in SAGAVINS |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112911545B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113727282B (en) * | 2021-08-18 | 2023-05-26 | 暨南大学 | Similarity-based trust evaluation method for privacy protection in Internet of vehicles |
CN114125728B (en) * | 2021-12-02 | 2022-11-29 | 暨南大学 | Trust evaluation method and system for lightweight and privacy protection in unmanned aerial vehicle network |
CN117915312B (en) * | 2023-12-06 | 2024-07-23 | 暨南大学 | Reputation updating system and method for privacy protection in cloud-assisted Internet of vehicles |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004032416A1 (en) * | 2002-08-30 | 2004-04-15 | Agency For Science, Technology And Research | Public key cryptography and a framework therefor |
CN109194480A (en) * | 2018-07-23 | 2019-01-11 | 厦门大学 | The certification of low latitude node identities and method for secret protection based on hash chain |
CN111885544A (en) * | 2020-07-16 | 2020-11-03 | 暨南大学 | Emergency message dissemination method and system with trust management and privacy protection functions in Internet of vehicles |
-
2021
- 2021-01-29 CN CN202110122978.5A patent/CN112911545B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004032416A1 (en) * | 2002-08-30 | 2004-04-15 | Agency For Science, Technology And Research | Public key cryptography and a framework therefor |
CN109194480A (en) * | 2018-07-23 | 2019-01-11 | 厦门大学 | The certification of low latitude node identities and method for secret protection based on hash chain |
CN111885544A (en) * | 2020-07-16 | 2020-11-03 | 暨南大学 | Emergency message dissemination method and system with trust management and privacy protection functions in Internet of vehicles |
Non-Patent Citations (2)
Title |
---|
空天车地一体化技术在列车群车联网中的应用框架研究;高一凡等;《现代城市轨道交通》;20200520(第05期);全文 * |
面向沉浸式体验的空天地一体化车联网体系架构与关键技术;牛志升等;《物联网学报》;20170930(第02期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112911545A (en) | 2021-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112911545B (en) | Emergency message dissemination method and system with trust management and privacy protection functions in SAGAVINS | |
JP5442877B2 (en) | Terminal device | |
EP3738272B1 (en) | Cryptographic methods and systems using activation codes for digital certificate revocation | |
CN111967051B (en) | Block chain-based inter-vehicle data safety sharing method and system | |
KR101521412B1 (en) | Protocol Management System for Aggregating Massages based on certification | |
JP5390036B2 (en) | OBE | |
EP3422793A1 (en) | Communication method, apparatus and system | |
US20130305043A1 (en) | System and Methods to Perform Public Key Infrastructure (PKI) Operations in Vehicle Networks using One-Way Communications Infrastructure | |
CN112752236B (en) | Block chain-based networking automobile authentication method, equipment and storage medium | |
CN109067525A (en) | Message authentication method based on half credible administrative center in car networking | |
CN111885544B (en) | Emergency message dissemination method and system for considering trust management and privacy protection in Internet of vehicles | |
JP6799563B2 (en) | Receiving device, receiving method | |
WO2017020206A1 (en) | Communication method and related device | |
JP3920583B2 (en) | COMMUNICATION SECURITY MAINTAINING METHOD, APPARATUS THEREOF, AND PROCESSING PROGRAM THEREOF | |
Malandrino et al. | A-VIP: Anonymous verification and inference of positions in vehicular networks | |
JP6187888B2 (en) | Processing equipment | |
JP4540681B2 (en) | COMMUNICATION SECURITY MAINTAINING METHOD, APPARATUS THEREOF, AND PROCESSING PROGRAM THEREOF | |
JP5903629B2 (en) | Wireless device | |
JP2016019078A (en) | Roadside communication device, security processing method, and computer program | |
CN105813068B (en) | Distributed verifiable threshold key distribution method based on vehicle-mounted short-distance communication network | |
CN115664745A (en) | Distributed block chain BPFT (Business Process File) consensus method based on prestige and networking method of intelligent Internet of vehicles | |
Sasikumar et al. | TRANSFERRING SECURITY MESSAGE IN TAXI SERVICE IN VEHICULAR AD HOC NETWORK | |
Kamalavathi et al. | A new secure message transferring in taxi service for vehicular ad hoc network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |