CN113067695A - Vehicle networking data exchange method and system based on block chain - Google Patents
Vehicle networking data exchange method and system based on block chain Download PDFInfo
- Publication number
- CN113067695A CN113067695A CN202110290072.4A CN202110290072A CN113067695A CN 113067695 A CN113067695 A CN 113067695A CN 202110290072 A CN202110290072 A CN 202110290072A CN 113067695 A CN113067695 A CN 113067695A
- Authority
- CN
- China
- Prior art keywords
- information
- block chain
- vehicles
- data
- data exchange
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the technical field of data exchange, in particular to a block chain-based data exchange method and system for Internet of vehicles. The method comprises the following steps: the vehicle collects the self parameter information and the surrounding environment information by using a vehicle-mounted sensor; encrypting the collected data; adding the encrypted data into a digital signature of the user; packing the data into blocks and sending the blocks to a block chain; receiving information sent by all vehicles in the range by the block chain; decrypting the received information; calculating the information credibility of the data in the block chain by combining a plurality of vehicles and the surrounding environment of the vehicles; vehicles within range receive the broadcast information for the block chain. The design of the invention realizes the point-to-point communication between vehicles, can quickly acquire information, simultaneously avoids the interference of false information on the vehicles and improves the accuracy of the information.
Description
Technical Field
The invention relates to the technical field of data exchange, in particular to a block chain-based data exchange method and system for Internet of vehicles.
Background
With the development of communication technology relied on by the internet of vehicles, the security of the internet of vehicles becomes a focus of attention while obtaining convenience brought to the society. When using the internet of vehicles service, most automobiles are in a driving state, for example: the information of the condition of the nearby road is obtained through the internet of vehicles service, the position of the running vehicle is changed all the time, the information needs to be updated in real time in order to guarantee the accuracy of the information, meanwhile, false information is mixed in the information, the accuracy of the information is affected, and any event is unacceptable due to the safety of passengers, so that the safety and the reliability of the internet of vehicles information are almost strictly required.
Disclosure of Invention
The invention aims to provide a block chain-based vehicle networking data exchange method and system to solve the problems in the background art.
In order to solve the above technical problem, an object of the present invention is to provide a block chain-based data exchange method for internet of vehicles, including the following steps:
(I) information acquisition:
s1.1, collecting self parameter information and surrounding environment information by a vehicle through a vehicle-mounted sensor;
the vehicle-mounted sensor comprises a radar sensor, an ultrasonic sensor, a laser sensor and the like, wherein the radar sensor is used for acquiring two-dimensional or three-dimensional distance information of the surrounding environment of the vehicle through laser, microwave or sound waves and sensing the driving environment through distance or speed analysis, the vehicle-mounted sensor can directly acquire two-dimensional or three-dimensional distance information of an object with higher precision and is insensitive to the change of the illumination environment, and the commonly used sensors comprise a millimeter wave radar, a laser radar and the like; common vehicle-mounted millimeter wave radars comprise short-range radars, middle-range radars and long-range radars which are respectively used for different applications, wherein the short-range radars are used for sensing scenes such as adjacent vehicles, obstacle detection, parking assistance and the like, are mainly arranged in the side area of the vehicle, are commonly used for monitoring the rear area of the vehicle, and are sometimes used as supplements of a front long-range radar sensor; the mid-range radar is used for sensing the medium distance and the speed, is mainly used in a reverse side warning system to assist a driver to leave a parking space, is used in a scene needing a narrow beam forward view, and is mainly used in an adaptive cruise system (ACC) and other safety fields, such as anti-collision application scenes.
(II) information transmission:
s1.2, encrypting the collected data;
s1.3, adding the encrypted data into a digital signature of the user;
s1.4, packaging the data into blocks and sending the blocks to a block chain;
(III) information verification:
s1.5, receiving information sent by all vehicles in a range by using the block chain;
s1.6, decrypting the received information;
s1.7, combining a plurality of vehicles and the surrounding environment of the vehicles to calculate the information reliability of the data in the block chain;
(IV) information broadcasting:
s1.8, the vehicles within the range receive the broadcast information of the block chain.
As a further improvement of the present technical solution, in S2, the encryption processing adopts an asymmetric encryption algorithm, and an algorithm flow includes the following steps:
s2.1, reading in a plaintext;
s2.2, generating a round key by using the key;
s2.3, performing wheel change;
the round change adopts byte transformation, the byte transformation is a nonlinear byte transformation acting on the bytes, the transformation is reversible, and the advantage of constructing an s-box by using inverse mapping on a finite field is as follows: the expression is simple, the trap door is not believed to exist, the most important thing is that the trap door has good capacity of robust analysis and linear analysis, the affine transformation of the attachment is used for complicating the algebraic expression of the S-box so as to prevent algebraic interpolation attack, and when the S-box is implemented specifically, the S-box can also be implemented by a table look-up method, and part of codes of the S-box are as follows:
Register int i,j;
for(i=0;i<=3;i++);
for(j=0;j<=3;j++);
B[i][j]=S_BOX[B[i][j]/16][B[i][j]%16];
the principle is as follows:
and S2.4, forming a ciphertext.
As a further improvement of the present technical solution, in S2.2, an algorithm flow for generating round keys by using keys is as follows:
wherein each column represents a word aj ∈ GF (2)8)[x]/(x4+1),aij∈GF(28);
And S3.2, representing the number of words in one data block by Nb to form a subkey.
Nb is 4,6 or 8, and similarly, Nk denotes the number of words in the key, so that Nk is 4,6 or 8, and for example, a key with Nk being 6 is described as follows:
as a further improvement of the technical solution, in S1.3, the method flow of the digital signature is as follows:
s4.1, a sender applies a hash function to the message to create a message digest;
s4.2, the sender encrypts the message digest by using a private key of the sender;
and S4.3, creating the personal signature of the sender.
As a further improvement of the technical solution, in S4.1, the method flow of the hash function is as follows:
let EkFor block ciphers, the message M is divided into n-bit segments M ═ M1,M2,…,Mt]Wherein n is a block cipher EkThe steps are as follows:
s5.1, calculating H according to the following formulat:
S5.2, calculating H ' by using another key k ' ≠ k 't=Dk′(Ht),Ht=Ek(H′t)。
As a further improvement of the present technical solution, in S1.6, the method for decrypting information includes the following steps:
s6.1, reading a ciphertext;
s6.2, generating a round key by using the key;
s6.3, performing inverse round conversion;
and S6.4, obtaining a plaintext.
Its decryption code is as follows:
int jiemi(unsigned charS_BOX[][16],unsigned char N_S_BO[][16]{
unsigned char B[4][4];unsigned char keys[4][44];
unsigned char temp[16];int i,j,a;
prinf ("please input ciphertext! \ n");
for(a=0;a<=15;a++)
for(i=0;i<=3;i++)for(j=0;j<=3;j++)
{scanf(″%02x″,&temp[16]);
B[j]Ii]=temp[a];}
keyexpansion(S_BOX,keys);
for (i ═ 0; i < ═ 3; i + +) for (j ═ 0; j < ═ 3; j + +// decryption wheel function
Bili]^=keys[i1[j+40];
int level;
for(level=1;level<=9;level++)
{ invshiftrow (b); // inverse shift transform.
As a further improvement of the present technical solution, in S1.7, the method for determining information reliability includes the steps of:
s7.1, counting the number of all data received in the block chain;
s7.2, classifying the data according to the similarity, and dividing the data into a plurality of groups;
s7.3, counting the number of each group of data;
and S7.4, taking the most data.
As a further improvement of the technical solution, in S7.2, a deep text matching algorithm is adopted for classifying the data according to the similarity, and an algorithm formula is as follows:
s7.2.1, first defineRepresenting text samples s1And s2Where n and m denote sentence length, xiAnd yiRepresenting words in a sentence;
s7.2.2, word expression, functionRepresenting the word xi,yiTo the word vector wi,viMapping the whole sentence to obtain matrixes w and v;
s7.2.3, phrase/sentence expression, and using the functions P ═ phi (w) and q ═ phi (v), the expression of the phrase or the whole sentence is obtained;
s7.2.4 text interaction, with M0Representing the result of two-segment text interaction, defining M0=f(p,q);
S7.2.5, extracting the mode in the matching space, and further extracting the mode information of the matching space on the basis of obtaining the basic mutual informationCan be expressed as a function M0=g(Mk-1);
S7.2.6, obtaining a score of matching degree, wherein the formula is r-h (m)n)。
The invention also provides a block chain-based vehicle networking data exchange system, which comprises any one of the above vehicle networking data exchange methods, and comprises an information acquisition unit, an information transmission unit, an information verification unit and an information broadcasting unit, wherein the information acquisition unit is used for collecting self parameter information and surrounding environment information by a vehicle-mounted sensor, the information transmission unit is used for transmitting the acquired information to the block chain, the information verification unit is used for verifying the accuracy of the information by the block chain, and the information broadcasting unit is used for broadcasting the confidence information.
Compared with the prior art, the invention has the beneficial effects that: in the block chain-based vehicle networking data exchange method and system, the block chain-based vehicle networking technology realizes point-to-point communication between vehicles in a block chain service range, can quickly acquire information, prevents information lag, screens out false information, avoids interference of the false information on the vehicles, and improves the accuracy of the information.
Drawings
FIG. 1 is an overall flow chart of example 1;
FIG. 2 is a flowchart of the asymmetric encryption algorithm of embodiment 1;
FIG. 3 is a flowchart of the algorithm for key generation round keys of example 1;
FIG. 4 is a flowchart of a digital signature method of embodiment 1;
FIG. 5 is a block diagram showing a flow of a method for decrypting information in embodiment 1;
fig. 6 is a flowchart of the information reliability determination method according to embodiment 1.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
As shown in fig. 1 to 6, one of the objects of the present invention is to provide a block chain based data exchange method for internet of vehicles, comprising the following steps:
(I) information acquisition:
s1.1, collecting self parameter information and surrounding environment information by a vehicle through a vehicle-mounted sensor;
the vehicle-mounted sensor comprises a radar sensor, an ultrasonic sensor, a laser sensor and the like, wherein the radar sensor is used for acquiring two-dimensional or three-dimensional distance information of the surrounding environment of the vehicle through laser, microwave or sound waves and sensing the driving environment through distance or speed analysis, the vehicle-mounted sensor can directly acquire two-dimensional or three-dimensional distance information of an object with higher precision and is insensitive to the change of the illumination environment, and the commonly used sensors comprise a millimeter wave radar, a laser radar and the like; common vehicle-mounted millimeter wave radars comprise short-range radars, middle-range radars and long-range radars which are respectively used for different applications, wherein the short-range radars are used for sensing scenes such as adjacent vehicles, obstacle detection, parking assistance and the like, are mainly arranged in the side area of the vehicle, are commonly used for monitoring the rear area of the vehicle, and are sometimes used as supplements of a front long-range radar sensor; the mid-range radar is used for sensing the medium distance and the speed, is mainly used in a reverse side warning system to assist a driver to leave a parking space, is used in a scene needing a narrow beam forward view, and is mainly used in an adaptive cruise system (ACC) and other safety fields, such as anti-collision application scenes.
(II) information transmission:
s1.2, encrypting the collected data;
s1.3, adding the encrypted data into a digital signature of the user;
s1.4, packaging the data into blocks and sending the blocks to a block chain;
(III) information verification:
s1.5, receiving information sent by all vehicles in a range by using the block chain;
s1.6, decrypting the received information;
s1.7, combining a plurality of vehicles and the surrounding environment of the vehicles to calculate the information reliability of the data in the block chain;
(IV) information broadcasting:
s1.8, the vehicles within the range receive the broadcast information of the block chain.
As a further improvement of the present technical solution, in S2, the encryption processing adopts an asymmetric encryption algorithm, and the algorithm flow includes the following steps:
s2.1, reading in a plaintext;
s2.2, generating a round key by using the key;
s2.3, performing wheel change;
the round change adopts byte transformation, the byte transformation is a nonlinear byte transformation acting on the bytes, the transformation is reversible, and the advantage of constructing an s-box by using inverse mapping on a finite field is as follows: the expression is simple, the trap door is not believed to exist, the most important thing is that the trap door has good capacity of robust analysis and linear analysis, the affine transformation of the attachment is used for complicating the algebraic expression of the S-box so as to prevent algebraic interpolation attack, and when the S-box is implemented specifically, the S-box can also be implemented by a table look-up method, and part of codes of the S-box are as follows:
Register int i,j;
for(i=0;i<=3;i++);
for(j=0;j<=3;j++);
B[i][j]=S_BOX[B[i][j]/16][B[i][j]%16];
the principle is as follows:
and S2.4, forming a ciphertext.
As a further improvement of the present technical solution, in S2.2, an algorithm flow for generating round keys by using keys is as follows:
wherein each column represents a word aj ∈ GF (2)8)[x]/(x4+1),aij∈GF(28);
And S3.2, representing the number of words in one data block by Nb to form a subkey.
Nb is 4,6 or 8, and similarly, Nk denotes the number of words in the key, so that Nk is 4,6 or 8, and for example, a key with Nk being 6 is described as follows:
as a further improvement of the technical solution, in S1.3, the method flow of the digital signature is as follows:
s4.1, a sender applies a hash function to the message to create a message digest;
s4.2, the sender encrypts the message digest by using a private key of the sender;
and S4.3, creating the personal signature of the sender.
As a further improvement of the technical solution, in S4.1, the method flow of the hash function is as follows:
let EkFor block ciphers, the message M is divided into n-bit segments M ═ M1,M2,…,Mt]Wherein n is a block cipher EkThe steps are as follows:
s5.1, calculating H according to the following formulat:
S5.2, using another key k' ≠ k, calculating Ht′=Dk′(Ht),Ht=Ek(Ht′)。
As a further improvement of the present technical solution, in S1.6, the method for decrypting information includes the following steps:
s6.1, reading a ciphertext;
s6.2, generating a round key by using the key;
s6.3, performing inverse round conversion;
and S6.4, obtaining a plaintext.
Its decryption code is as follows:
int jiemi(unsigned charS_BOX[][16],unsigned char N_S_BO[][16]{
unsigned char B[4][4];unsigned char keys[4][44];
unsigned char temp[16];int i,j,a;
prinf ("please input ciphertext! \ n");
for(a=0;a<=15;a++)
for(i=0;i<=3;i++)for(j=0;j<=3;j++)
{scanf(″%02x″,&temp[16]);
B[j]Ii]=temp[a];}
keyexpansion(S_BOX,keys);
for (i ═ 0; i < ═ 3; i + +) for (j ═ 0; j < ═ 3; j + +// decryption wheel function
Bili]^=keys[i1[j+40];
int level;
for(level=1;level<=9;level++)
{ invshiftrow (b); // inverse shift transform.
As a further improvement of the present technical solution, in S1.7, the method for determining information reliability includes the steps of:
s7.1, counting the number of all data received in the block chain;
s7.2, classifying the data according to the similarity, and dividing the data into a plurality of groups;
s7.3, counting the number of each group of data;
and S7.4, taking the most data.
As a further improvement of the technical solution, in S7.2, a deep text matching algorithm is used for classifying the data according to the similarity, and an algorithm formula is as follows:
s7.2.1, first defineRepresenting text samples s1And s2Where n and m denote sentence length, xiAnd yiRepresenting words in a sentence;
s7.2.2, word expression, functionRepresenting the word xi,yiTo the word vector wi,viMapping the whole sentence to obtain matrixes w and v;
s7.2.3, phrase/sentence expression, and using the functions P ═ phi (w) and q ═ phi (v), the expression of the phrase or the whole sentence is obtained;
s7.2.4 text interaction, with M0Representing the result of two-segment text interaction, defining M0=f(p,q);
S7.2.5, extracting the pattern in the matching space, and further extracting the pattern information of the matching space on the basis of obtaining the basic mutual information, which can be expressed as a function M0=g(Mk-1);
S7.2.6, obtaining a score of matching degree, wherein the formula is r-h (m)n)。
The invention also provides a block chain-based vehicle networking data exchange system, which comprises any one of the above block chain-based vehicle networking data exchange methods, and comprises an information acquisition unit, an information transmission unit, an information verification unit and an information broadcasting unit, wherein the information acquisition unit is used for collecting parameter information of a vehicle-mounted sensor and surrounding environment information, the information transmission unit is used for transmitting the acquired information to a block chain, the information verification unit is used for verifying the accuracy of the information by the block chain, and the information broadcasting unit is used for broadcasting the confidence information.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (9)
1. The vehicle networking data exchange method based on the block chain is characterized in that: the method comprises the following steps:
(I) information acquisition:
s1.1, collecting self parameter information and surrounding environment information by a vehicle through a vehicle-mounted sensor;
(II) information transmission:
s1.2, encrypting the collected data;
s1.3, adding the encrypted data into a digital signature of the user;
s1.4, packaging the data into blocks and sending the blocks to a block chain;
(III) information verification:
s1.5, receiving information sent by all vehicles in a range by using the block chain;
s1.6, decrypting the received information;
s1.7, combining a plurality of vehicles and the surrounding environment of the vehicles to calculate the information reliability of the data in the block chain;
(IV) information broadcasting:
s1.8, the vehicles within the range receive the broadcast information of the block chain.
2. The block chain-based data exchange method for the internet of vehicles according to claim 1, wherein: in S1.2, the encryption process uses an asymmetric encryption algorithm, and the algorithm flow includes the following steps:
s2.1, reading in a plaintext;
s2.2, generating a round key by using the key;
s2.3, performing wheel change;
and S2.4, forming a ciphertext.
3. The block chain-based data exchange method for the internet of vehicles according to claim 2, wherein: in S2.2, an algorithm flow for generating round keys by using keys is as follows:
wherein each column represents a word aj ∈ GF (2)8)[x]/(x4+1),ajj∈GF(28);
And S3.2, representing the number of words in one data block by Nb to form a subkey.
4. The block chain-based data exchange method for the internet of vehicles according to claim 1, wherein: in S1.3, the digital signature method includes the following steps:
s4.1, a sender applies a hash function to the message to create a message digest;
s4.2, the sender encrypts the message digest by using a private key of the sender;
and S4.3, creating the personal signature of the sender.
5. The block chain-based data exchange method for the Internet of vehicles according to claim 4, wherein: in S4.1, the method flow of the hash function is as follows:
let EkFor block ciphers, the message M is divided into n-bit segments M ═ M1,M2,...,Mt]Wherein n is a block cipher EkThe steps are as follows:
s5.1, calculating H according to the following formulat:
S5.2, use anotherOne key k '≠ k, calculates H't=Dk′(Ht),Ht=Ek(H′t)。
6. The block chain-based data exchange method for the internet of vehicles according to claim 1, wherein: in S1.6, the method for decrypting information includes the following steps:
s6.1, reading a ciphertext;
s6.2, generating a round key by using the key;
s6.3, performing inverse round conversion;
and S6.4, obtaining a plaintext.
7. The block chain-based data exchange method for the internet of vehicles according to claim 1, wherein: in S1.7, the method for determining information reliability includes the following steps:
s7.1, counting the number of all data received in the block chain;
s7.2, classifying the data according to the similarity, and dividing the data into a plurality of groups;
s7.3, counting the number of each group of data;
and S7.4, taking the most data.
8. The block chain-based data exchange method for the internet of vehicles according to claim 7, wherein: in S7.2, a deep text matching algorithm is used to classify the data according to the similarity, and the algorithm formula is as follows:
s7.2.1, first defineRepresenting text samples s1And s2Where n and m denote sentence length, xiAnd yiRepresenting words in a sentence;
s7.2.2, word expression, functionRepresenting the word xi,yiTo the word vector wi,viMapping the whole sentence to obtain matrixes w and v;
s7.2.3, phrase/sentence expression, using the functions p ═ phi (w) and q ═ phi (v), to get the expression of the phrase or the whole sentence;
s7.2.4 text interaction, with M0Representing the result of two-segment text interaction, defining M0=f(p,q);
S7.2.5, extracting the pattern in the matching space, and further extracting the pattern information of the matching space on the basis of obtaining the basic mutual information, which can be expressed as a function M0=g(Mk-1);
S7.2.6, obtaining a score of matching degree, wherein the formula is r-h (m)n)。
9. The block chain-based data exchange system for the Internet of vehicles, which comprises the block chain-based data exchange method for the Internet of vehicles as claimed in any one of claims 1 to 8, and is characterized in that: the system comprises an information acquisition unit, an information transmission unit, an information verification unit and an information broadcasting unit, wherein the information acquisition unit is used for collecting self parameter information and surrounding environment information by a vehicle-mounted sensor, the information transmission unit is used for transmitting the acquired information to a block chain, the information verification unit is used for verifying the accuracy of the information by the block chain, and the information broadcasting unit is used for broadcasting the accurate information.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010482597.3A CN111385768A (en) | 2020-06-01 | 2020-06-01 | Vehicle networking data exchange method and system based on block chain |
CN2020104825973 | 2020-06-01 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113067695A true CN113067695A (en) | 2021-07-02 |
CN113067695B CN113067695B (en) | 2022-12-16 |
Family
ID=71222080
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010482597.3A Pending CN111385768A (en) | 2020-06-01 | 2020-06-01 | Vehicle networking data exchange method and system based on block chain |
CN202110290072.4A Active CN113067695B (en) | 2020-06-01 | 2021-03-18 | Vehicle networking data exchange method and system based on block chain |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010482597.3A Pending CN111385768A (en) | 2020-06-01 | 2020-06-01 | Vehicle networking data exchange method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN111385768A (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111866012B (en) * | 2020-07-29 | 2022-04-29 | 中国联合网络通信集团有限公司 | Vehicle information interaction method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111050303A (en) * | 2019-12-13 | 2020-04-21 | 国家计算机网络与信息安全管理中心山东分中心 | Intelligent Internet of vehicles implementation method and system based on block chain technology |
CN111050317A (en) * | 2019-12-07 | 2020-04-21 | 江西理工大学 | Intelligent traffic data safety sharing method based on alliance block chain |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110830235B (en) * | 2019-11-08 | 2023-03-07 | 华侨大学 | Intelligent vehicle networking trusted data encryption method and system based on block chain |
CN110855670B (en) * | 2019-11-15 | 2021-12-03 | 扬州大学 | Method suitable for credible message broadcasting and security authentication of vehicle-mounted ad hoc network |
-
2020
- 2020-06-01 CN CN202010482597.3A patent/CN111385768A/en active Pending
-
2021
- 2021-03-18 CN CN202110290072.4A patent/CN113067695B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111050317A (en) * | 2019-12-07 | 2020-04-21 | 江西理工大学 | Intelligent traffic data safety sharing method based on alliance block chain |
CN111050303A (en) * | 2019-12-13 | 2020-04-21 | 国家计算机网络与信息安全管理中心山东分中心 | Intelligent Internet of vehicles implementation method and system based on block chain technology |
Non-Patent Citations (3)
Title |
---|
刘辉: "车载自组织网络信息认证和隐私保护机制的研究", 《中国博士学位论文全文数据库 信息科技辑》, 15 February 2013 (2013-02-15) * |
唐兰文等: "基于区块链技术的车联网研究", 《电脑知识与技术》, 31 October 2018 (2018-10-31), pages 2 - 3 * |
田道坤等: "在区块链中基于混合算法的数字签名技术", 《电子科技》, 31 July 2018 (2018-07-31), pages 19 - 23 * |
Also Published As
Publication number | Publication date |
---|---|
CN113067695B (en) | 2022-12-16 |
CN111385768A (en) | 2020-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112367305B (en) | Internet of vehicles protection method based on privacy block chain and mobile terminal | |
Sun et al. | A secure flexible and tampering-resistant data sharing system for vehicular social networks | |
US8001384B2 (en) | Authentication system, authentication method, attesting device, verification device, their programs, and recording medium | |
CN108111294B (en) | Multi-label classification method for protecting privacy based on ML-kNN | |
Mukherjee et al. | An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice | |
CN111050317A (en) | Intelligent traffic data safety sharing method based on alliance block chain | |
CN113067695B (en) | Vehicle networking data exchange method and system based on block chain | |
EP2293492B1 (en) | Method and system for determining securely manhattan distances | |
González-Serrano et al. | Supervised machine learning using encrypted training data | |
CN101647229B (en) | Compressed ecdsa signatures | |
Liu et al. | A secure steganography for privacy protection in healthcare system | |
Liu et al. | A secure lattice-based anonymous authentication scheme for VANETs | |
Sarkar et al. | Stego-chain: A framework to mine encoded stego-block in a decentralized network | |
Zhu et al. | PTFA: A secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system | |
JP7468978B2 (en) | Anonymous collection of data from a group of authorized members | |
Xu et al. | L-TCM: A lightweight privacy-preserving traffic condition monitoring scheme with source authentication in cloud-assisted VANETs | |
Yu et al. | Efficient anonymous data authentication for vehicular ad hoc networks | |
KR20190005540A (en) | Method for Authenticating Evaluation Results of Homomorphic-Encrypted Data | |
Abd-El-Atty et al. | Double medical image cryptosystem based on quantum walk | |
Leaby et al. | Towards design strong emergency and COVID-19 authentication scheme in VANET | |
Laouamer et al. | Informed symmetric encryption algorithm for DICOM medical image based on N-grams | |
Chillali et al. | A diagram of confidentiality of information during a traffic offence | |
Lakshmi et al. | Image encryption algorithms using machine learning and deep learning techniques—A Survey | |
Shi et al. | A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing | |
Changalvala | Sensor Data Integrity Verification for Real-time and Resource Constrained Systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |