CN113067695A - Vehicle networking data exchange method and system based on block chain - Google Patents

Vehicle networking data exchange method and system based on block chain Download PDF

Info

Publication number
CN113067695A
CN113067695A CN202110290072.4A CN202110290072A CN113067695A CN 113067695 A CN113067695 A CN 113067695A CN 202110290072 A CN202110290072 A CN 202110290072A CN 113067695 A CN113067695 A CN 113067695A
Authority
CN
China
Prior art keywords
information
block chain
vehicles
data
data exchange
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110290072.4A
Other languages
Chinese (zh)
Other versions
CN113067695B (en
Inventor
王暾
左敏江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinruixin Intelligent Iot Research Institute Nanjing Co ltd
Original Assignee
Xinruixin Intelligent Iot Research Institute Nanjing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinruixin Intelligent Iot Research Institute Nanjing Co ltd filed Critical Xinruixin Intelligent Iot Research Institute Nanjing Co ltd
Publication of CN113067695A publication Critical patent/CN113067695A/en
Application granted granted Critical
Publication of CN113067695B publication Critical patent/CN113067695B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of data exchange, in particular to a block chain-based data exchange method and system for Internet of vehicles. The method comprises the following steps: the vehicle collects the self parameter information and the surrounding environment information by using a vehicle-mounted sensor; encrypting the collected data; adding the encrypted data into a digital signature of the user; packing the data into blocks and sending the blocks to a block chain; receiving information sent by all vehicles in the range by the block chain; decrypting the received information; calculating the information credibility of the data in the block chain by combining a plurality of vehicles and the surrounding environment of the vehicles; vehicles within range receive the broadcast information for the block chain. The design of the invention realizes the point-to-point communication between vehicles, can quickly acquire information, simultaneously avoids the interference of false information on the vehicles and improves the accuracy of the information.

Description

Vehicle networking data exchange method and system based on block chain
Technical Field
The invention relates to the technical field of data exchange, in particular to a block chain-based data exchange method and system for Internet of vehicles.
Background
With the development of communication technology relied on by the internet of vehicles, the security of the internet of vehicles becomes a focus of attention while obtaining convenience brought to the society. When using the internet of vehicles service, most automobiles are in a driving state, for example: the information of the condition of the nearby road is obtained through the internet of vehicles service, the position of the running vehicle is changed all the time, the information needs to be updated in real time in order to guarantee the accuracy of the information, meanwhile, false information is mixed in the information, the accuracy of the information is affected, and any event is unacceptable due to the safety of passengers, so that the safety and the reliability of the internet of vehicles information are almost strictly required.
Disclosure of Invention
The invention aims to provide a block chain-based vehicle networking data exchange method and system to solve the problems in the background art.
In order to solve the above technical problem, an object of the present invention is to provide a block chain-based data exchange method for internet of vehicles, including the following steps:
(I) information acquisition:
s1.1, collecting self parameter information and surrounding environment information by a vehicle through a vehicle-mounted sensor;
the vehicle-mounted sensor comprises a radar sensor, an ultrasonic sensor, a laser sensor and the like, wherein the radar sensor is used for acquiring two-dimensional or three-dimensional distance information of the surrounding environment of the vehicle through laser, microwave or sound waves and sensing the driving environment through distance or speed analysis, the vehicle-mounted sensor can directly acquire two-dimensional or three-dimensional distance information of an object with higher precision and is insensitive to the change of the illumination environment, and the commonly used sensors comprise a millimeter wave radar, a laser radar and the like; common vehicle-mounted millimeter wave radars comprise short-range radars, middle-range radars and long-range radars which are respectively used for different applications, wherein the short-range radars are used for sensing scenes such as adjacent vehicles, obstacle detection, parking assistance and the like, are mainly arranged in the side area of the vehicle, are commonly used for monitoring the rear area of the vehicle, and are sometimes used as supplements of a front long-range radar sensor; the mid-range radar is used for sensing the medium distance and the speed, is mainly used in a reverse side warning system to assist a driver to leave a parking space, is used in a scene needing a narrow beam forward view, and is mainly used in an adaptive cruise system (ACC) and other safety fields, such as anti-collision application scenes.
(II) information transmission:
s1.2, encrypting the collected data;
s1.3, adding the encrypted data into a digital signature of the user;
s1.4, packaging the data into blocks and sending the blocks to a block chain;
(III) information verification:
s1.5, receiving information sent by all vehicles in a range by using the block chain;
s1.6, decrypting the received information;
s1.7, combining a plurality of vehicles and the surrounding environment of the vehicles to calculate the information reliability of the data in the block chain;
(IV) information broadcasting:
s1.8, the vehicles within the range receive the broadcast information of the block chain.
As a further improvement of the present technical solution, in S2, the encryption processing adopts an asymmetric encryption algorithm, and an algorithm flow includes the following steps:
s2.1, reading in a plaintext;
s2.2, generating a round key by using the key;
s2.3, performing wheel change;
the round change adopts byte transformation, the byte transformation is a nonlinear byte transformation acting on the bytes, the transformation is reversible, and the advantage of constructing an s-box by using inverse mapping on a finite field is as follows: the expression is simple, the trap door is not believed to exist, the most important thing is that the trap door has good capacity of robust analysis and linear analysis, the affine transformation of the attachment is used for complicating the algebraic expression of the S-box so as to prevent algebraic interpolation attack, and when the S-box is implemented specifically, the S-box can also be implemented by a table look-up method, and part of codes of the S-box are as follows:
Register int i,j;
for(i=0;i<=3;i++);
for(j=0;j<=3;j++);
B[i][j]=S_BOX[B[i][j]/16][B[i][j]%16];
the principle is as follows:
Figure BDA0002982062020000031
and S2.4, forming a ciphertext.
As a further improvement of the present technical solution, in S2.2, an algorithm flow for generating round keys by using keys is as follows:
s3.1, setting a secret key as follows:
Figure BDA0002982062020000032
wherein each column represents a word aj ∈ GF (2)8)[x]/(x4+1),aij∈GF(28);
And S3.2, representing the number of words in one data block by Nb to form a subkey.
Nb is 4,6 or 8, and similarly, Nk denotes the number of words in the key, so that Nk is 4,6 or 8, and for example, a key with Nk being 6 is described as follows:
Figure BDA0002982062020000033
as a further improvement of the technical solution, in S1.3, the method flow of the digital signature is as follows:
s4.1, a sender applies a hash function to the message to create a message digest;
s4.2, the sender encrypts the message digest by using a private key of the sender;
and S4.3, creating the personal signature of the sender.
As a further improvement of the technical solution, in S4.1, the method flow of the hash function is as follows:
let EkFor block ciphers, the message M is divided into n-bit segments M ═ M1,M2,…,Mt]Wherein n is a block cipher EkThe steps are as follows:
s5.1, calculating H according to the following formulat
Figure BDA0002982062020000041
S5.2, calculating H ' by using another key k ' ≠ k 't=Dk′(Ht),Ht=Ek(H′t)。
As a further improvement of the present technical solution, in S1.6, the method for decrypting information includes the following steps:
s6.1, reading a ciphertext;
s6.2, generating a round key by using the key;
s6.3, performing inverse round conversion;
and S6.4, obtaining a plaintext.
Its decryption code is as follows:
int jiemi(unsigned charS_BOX[][16],unsigned char N_S_BO[][16]{
unsigned char B[4][4];unsigned char keys[4][44];
unsigned char temp[16];int i,j,a;
prinf ("please input ciphertext! \ n");
for(a=0;a<=15;a++)
for(i=0;i<=3;i++)for(j=0;j<=3;j++)
{scanf(″%02x″,&temp[16]);
B[j]Ii]=temp[a];}
keyexpansion(S_BOX,keys);
for (i ═ 0; i < ═ 3; i + +) for (j ═ 0; j < ═ 3; j + +// decryption wheel function
Bili]^=keys[i1[j+40];
int level;
for(level=1;level<=9;level++)
{ invshiftrow (b); // inverse shift transform.
As a further improvement of the present technical solution, in S1.7, the method for determining information reliability includes the steps of:
s7.1, counting the number of all data received in the block chain;
s7.2, classifying the data according to the similarity, and dividing the data into a plurality of groups;
s7.3, counting the number of each group of data;
and S7.4, taking the most data.
As a further improvement of the technical solution, in S7.2, a deep text matching algorithm is adopted for classifying the data according to the similarity, and an algorithm formula is as follows:
s7.2.1, first define
Figure BDA0002982062020000051
Representing text samples s1And s2Where n and m denote sentence length, xiAnd yiRepresenting words in a sentence;
s7.2.2, word expression, function
Figure BDA0002982062020000052
Representing the word xi,yiTo the word vector wi,viMapping the whole sentence to obtain matrixes w and v;
s7.2.3, phrase/sentence expression, and using the functions P ═ phi (w) and q ═ phi (v), the expression of the phrase or the whole sentence is obtained;
s7.2.4 text interaction, with M0Representing the result of two-segment text interaction, defining M0=f(p,q);
S7.2.5, extracting the mode in the matching space, and further extracting the mode information of the matching space on the basis of obtaining the basic mutual informationCan be expressed as a function M0=g(Mk-1);
S7.2.6, obtaining a score of matching degree, wherein the formula is r-h (m)n)。
The invention also provides a block chain-based vehicle networking data exchange system, which comprises any one of the above vehicle networking data exchange methods, and comprises an information acquisition unit, an information transmission unit, an information verification unit and an information broadcasting unit, wherein the information acquisition unit is used for collecting self parameter information and surrounding environment information by a vehicle-mounted sensor, the information transmission unit is used for transmitting the acquired information to the block chain, the information verification unit is used for verifying the accuracy of the information by the block chain, and the information broadcasting unit is used for broadcasting the confidence information.
Compared with the prior art, the invention has the beneficial effects that: in the block chain-based vehicle networking data exchange method and system, the block chain-based vehicle networking technology realizes point-to-point communication between vehicles in a block chain service range, can quickly acquire information, prevents information lag, screens out false information, avoids interference of the false information on the vehicles, and improves the accuracy of the information.
Drawings
FIG. 1 is an overall flow chart of example 1;
FIG. 2 is a flowchart of the asymmetric encryption algorithm of embodiment 1;
FIG. 3 is a flowchart of the algorithm for key generation round keys of example 1;
FIG. 4 is a flowchart of a digital signature method of embodiment 1;
FIG. 5 is a block diagram showing a flow of a method for decrypting information in embodiment 1;
fig. 6 is a flowchart of the information reliability determination method according to embodiment 1.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
As shown in fig. 1 to 6, one of the objects of the present invention is to provide a block chain based data exchange method for internet of vehicles, comprising the following steps:
(I) information acquisition:
s1.1, collecting self parameter information and surrounding environment information by a vehicle through a vehicle-mounted sensor;
the vehicle-mounted sensor comprises a radar sensor, an ultrasonic sensor, a laser sensor and the like, wherein the radar sensor is used for acquiring two-dimensional or three-dimensional distance information of the surrounding environment of the vehicle through laser, microwave or sound waves and sensing the driving environment through distance or speed analysis, the vehicle-mounted sensor can directly acquire two-dimensional or three-dimensional distance information of an object with higher precision and is insensitive to the change of the illumination environment, and the commonly used sensors comprise a millimeter wave radar, a laser radar and the like; common vehicle-mounted millimeter wave radars comprise short-range radars, middle-range radars and long-range radars which are respectively used for different applications, wherein the short-range radars are used for sensing scenes such as adjacent vehicles, obstacle detection, parking assistance and the like, are mainly arranged in the side area of the vehicle, are commonly used for monitoring the rear area of the vehicle, and are sometimes used as supplements of a front long-range radar sensor; the mid-range radar is used for sensing the medium distance and the speed, is mainly used in a reverse side warning system to assist a driver to leave a parking space, is used in a scene needing a narrow beam forward view, and is mainly used in an adaptive cruise system (ACC) and other safety fields, such as anti-collision application scenes.
(II) information transmission:
s1.2, encrypting the collected data;
s1.3, adding the encrypted data into a digital signature of the user;
s1.4, packaging the data into blocks and sending the blocks to a block chain;
(III) information verification:
s1.5, receiving information sent by all vehicles in a range by using the block chain;
s1.6, decrypting the received information;
s1.7, combining a plurality of vehicles and the surrounding environment of the vehicles to calculate the information reliability of the data in the block chain;
(IV) information broadcasting:
s1.8, the vehicles within the range receive the broadcast information of the block chain.
As a further improvement of the present technical solution, in S2, the encryption processing adopts an asymmetric encryption algorithm, and the algorithm flow includes the following steps:
s2.1, reading in a plaintext;
s2.2, generating a round key by using the key;
s2.3, performing wheel change;
the round change adopts byte transformation, the byte transformation is a nonlinear byte transformation acting on the bytes, the transformation is reversible, and the advantage of constructing an s-box by using inverse mapping on a finite field is as follows: the expression is simple, the trap door is not believed to exist, the most important thing is that the trap door has good capacity of robust analysis and linear analysis, the affine transformation of the attachment is used for complicating the algebraic expression of the S-box so as to prevent algebraic interpolation attack, and when the S-box is implemented specifically, the S-box can also be implemented by a table look-up method, and part of codes of the S-box are as follows:
Register int i,j;
for(i=0;i<=3;i++);
for(j=0;j<=3;j++);
B[i][j]=S_BOX[B[i][j]/16][B[i][j]%16];
the principle is as follows:
Figure BDA0002982062020000081
and S2.4, forming a ciphertext.
As a further improvement of the present technical solution, in S2.2, an algorithm flow for generating round keys by using keys is as follows:
s3.1, setting a secret key as follows:
Figure BDA0002982062020000082
wherein each column represents a word aj ∈ GF (2)8)[x]/(x4+1),aij∈GF(28);
And S3.2, representing the number of words in one data block by Nb to form a subkey.
Nb is 4,6 or 8, and similarly, Nk denotes the number of words in the key, so that Nk is 4,6 or 8, and for example, a key with Nk being 6 is described as follows:
Figure BDA0002982062020000083
as a further improvement of the technical solution, in S1.3, the method flow of the digital signature is as follows:
s4.1, a sender applies a hash function to the message to create a message digest;
s4.2, the sender encrypts the message digest by using a private key of the sender;
and S4.3, creating the personal signature of the sender.
As a further improvement of the technical solution, in S4.1, the method flow of the hash function is as follows:
let EkFor block ciphers, the message M is divided into n-bit segments M ═ M1,M2,…,Mt]Wherein n is a block cipher EkThe steps are as follows:
s5.1, calculating H according to the following formulat
Figure BDA0002982062020000084
S5.2, using another key k' ≠ k, calculating Ht′=Dk′(Ht),Ht=Ek(Ht′)。
As a further improvement of the present technical solution, in S1.6, the method for decrypting information includes the following steps:
s6.1, reading a ciphertext;
s6.2, generating a round key by using the key;
s6.3, performing inverse round conversion;
and S6.4, obtaining a plaintext.
Its decryption code is as follows:
int jiemi(unsigned charS_BOX[][16],unsigned char N_S_BO[][16]{
unsigned char B[4][4];unsigned char keys[4][44];
unsigned char temp[16];int i,j,a;
prinf ("please input ciphertext! \ n");
for(a=0;a<=15;a++)
for(i=0;i<=3;i++)for(j=0;j<=3;j++)
{scanf(″%02x″,&temp[16]);
B[j]Ii]=temp[a];}
keyexpansion(S_BOX,keys);
for (i ═ 0; i < ═ 3; i + +) for (j ═ 0; j < ═ 3; j + +// decryption wheel function
Bili]^=keys[i1[j+40];
int level;
for(level=1;level<=9;level++)
{ invshiftrow (b); // inverse shift transform.
As a further improvement of the present technical solution, in S1.7, the method for determining information reliability includes the steps of:
s7.1, counting the number of all data received in the block chain;
s7.2, classifying the data according to the similarity, and dividing the data into a plurality of groups;
s7.3, counting the number of each group of data;
and S7.4, taking the most data.
As a further improvement of the technical solution, in S7.2, a deep text matching algorithm is used for classifying the data according to the similarity, and an algorithm formula is as follows:
s7.2.1, first define
Figure BDA0002982062020000101
Representing text samples s1And s2Where n and m denote sentence length, xiAnd yiRepresenting words in a sentence;
s7.2.2, word expression, function
Figure BDA0002982062020000102
Representing the word xi,yiTo the word vector wi,viMapping the whole sentence to obtain matrixes w and v;
s7.2.3, phrase/sentence expression, and using the functions P ═ phi (w) and q ═ phi (v), the expression of the phrase or the whole sentence is obtained;
s7.2.4 text interaction, with M0Representing the result of two-segment text interaction, defining M0=f(p,q);
S7.2.5, extracting the pattern in the matching space, and further extracting the pattern information of the matching space on the basis of obtaining the basic mutual information, which can be expressed as a function M0=g(Mk-1);
S7.2.6, obtaining a score of matching degree, wherein the formula is r-h (m)n)。
The invention also provides a block chain-based vehicle networking data exchange system, which comprises any one of the above block chain-based vehicle networking data exchange methods, and comprises an information acquisition unit, an information transmission unit, an information verification unit and an information broadcasting unit, wherein the information acquisition unit is used for collecting parameter information of a vehicle-mounted sensor and surrounding environment information, the information transmission unit is used for transmitting the acquired information to a block chain, the information verification unit is used for verifying the accuracy of the information by the block chain, and the information broadcasting unit is used for broadcasting the confidence information.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (9)

1. The vehicle networking data exchange method based on the block chain is characterized in that: the method comprises the following steps:
(I) information acquisition:
s1.1, collecting self parameter information and surrounding environment information by a vehicle through a vehicle-mounted sensor;
(II) information transmission:
s1.2, encrypting the collected data;
s1.3, adding the encrypted data into a digital signature of the user;
s1.4, packaging the data into blocks and sending the blocks to a block chain;
(III) information verification:
s1.5, receiving information sent by all vehicles in a range by using the block chain;
s1.6, decrypting the received information;
s1.7, combining a plurality of vehicles and the surrounding environment of the vehicles to calculate the information reliability of the data in the block chain;
(IV) information broadcasting:
s1.8, the vehicles within the range receive the broadcast information of the block chain.
2. The block chain-based data exchange method for the internet of vehicles according to claim 1, wherein: in S1.2, the encryption process uses an asymmetric encryption algorithm, and the algorithm flow includes the following steps:
s2.1, reading in a plaintext;
s2.2, generating a round key by using the key;
s2.3, performing wheel change;
and S2.4, forming a ciphertext.
3. The block chain-based data exchange method for the internet of vehicles according to claim 2, wherein: in S2.2, an algorithm flow for generating round keys by using keys is as follows:
s3.1, setting a secret key as follows:
Figure FDA0002982062010000011
wherein each column represents a word aj ∈ GF (2)8)[x]/(x4+1),ajj∈GF(28);
And S3.2, representing the number of words in one data block by Nb to form a subkey.
4. The block chain-based data exchange method for the internet of vehicles according to claim 1, wherein: in S1.3, the digital signature method includes the following steps:
s4.1, a sender applies a hash function to the message to create a message digest;
s4.2, the sender encrypts the message digest by using a private key of the sender;
and S4.3, creating the personal signature of the sender.
5. The block chain-based data exchange method for the Internet of vehicles according to claim 4, wherein: in S4.1, the method flow of the hash function is as follows:
let EkFor block ciphers, the message M is divided into n-bit segments M ═ M1,M2,...,Mt]Wherein n is a block cipher EkThe steps are as follows:
s5.1, calculating H according to the following formulat
H1=Ek(M1),
Figure FDA0002982062010000021
S5.2, use anotherOne key k '≠ k, calculates H't=Dk′(Ht),Ht=Ek(H′t)。
6. The block chain-based data exchange method for the internet of vehicles according to claim 1, wherein: in S1.6, the method for decrypting information includes the following steps:
s6.1, reading a ciphertext;
s6.2, generating a round key by using the key;
s6.3, performing inverse round conversion;
and S6.4, obtaining a plaintext.
7. The block chain-based data exchange method for the internet of vehicles according to claim 1, wherein: in S1.7, the method for determining information reliability includes the following steps:
s7.1, counting the number of all data received in the block chain;
s7.2, classifying the data according to the similarity, and dividing the data into a plurality of groups;
s7.3, counting the number of each group of data;
and S7.4, taking the most data.
8. The block chain-based data exchange method for the internet of vehicles according to claim 7, wherein: in S7.2, a deep text matching algorithm is used to classify the data according to the similarity, and the algorithm formula is as follows:
s7.2.1, first define
Figure FDA0002982062010000031
Representing text samples s1And s2Where n and m denote sentence length, xiAnd yiRepresenting words in a sentence;
s7.2.2, word expression, function
Figure FDA0002982062010000032
Representing the word xi,yiTo the word vector wi,viMapping the whole sentence to obtain matrixes w and v;
s7.2.3, phrase/sentence expression, using the functions p ═ phi (w) and q ═ phi (v), to get the expression of the phrase or the whole sentence;
s7.2.4 text interaction, with M0Representing the result of two-segment text interaction, defining M0=f(p,q);
S7.2.5, extracting the pattern in the matching space, and further extracting the pattern information of the matching space on the basis of obtaining the basic mutual information, which can be expressed as a function M0=g(Mk-1);
S7.2.6, obtaining a score of matching degree, wherein the formula is r-h (m)n)。
9. The block chain-based data exchange system for the Internet of vehicles, which comprises the block chain-based data exchange method for the Internet of vehicles as claimed in any one of claims 1 to 8, and is characterized in that: the system comprises an information acquisition unit, an information transmission unit, an information verification unit and an information broadcasting unit, wherein the information acquisition unit is used for collecting self parameter information and surrounding environment information by a vehicle-mounted sensor, the information transmission unit is used for transmitting the acquired information to a block chain, the information verification unit is used for verifying the accuracy of the information by the block chain, and the information broadcasting unit is used for broadcasting the accurate information.
CN202110290072.4A 2020-06-01 2021-03-18 Vehicle networking data exchange method and system based on block chain Active CN113067695B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010482597.3A CN111385768A (en) 2020-06-01 2020-06-01 Vehicle networking data exchange method and system based on block chain
CN2020104825973 2020-06-01

Publications (2)

Publication Number Publication Date
CN113067695A true CN113067695A (en) 2021-07-02
CN113067695B CN113067695B (en) 2022-12-16

Family

ID=71222080

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010482597.3A Pending CN111385768A (en) 2020-06-01 2020-06-01 Vehicle networking data exchange method and system based on block chain
CN202110290072.4A Active CN113067695B (en) 2020-06-01 2021-03-18 Vehicle networking data exchange method and system based on block chain

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202010482597.3A Pending CN111385768A (en) 2020-06-01 2020-06-01 Vehicle networking data exchange method and system based on block chain

Country Status (1)

Country Link
CN (2) CN111385768A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866012B (en) * 2020-07-29 2022-04-29 中国联合网络通信集团有限公司 Vehicle information interaction method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111050303A (en) * 2019-12-13 2020-04-21 国家计算机网络与信息安全管理中心山东分中心 Intelligent Internet of vehicles implementation method and system based on block chain technology
CN111050317A (en) * 2019-12-07 2020-04-21 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830235B (en) * 2019-11-08 2023-03-07 华侨大学 Intelligent vehicle networking trusted data encryption method and system based on block chain
CN110855670B (en) * 2019-11-15 2021-12-03 扬州大学 Method suitable for credible message broadcasting and security authentication of vehicle-mounted ad hoc network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111050317A (en) * 2019-12-07 2020-04-21 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain
CN111050303A (en) * 2019-12-13 2020-04-21 国家计算机网络与信息安全管理中心山东分中心 Intelligent Internet of vehicles implementation method and system based on block chain technology

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
刘辉: "车载自组织网络信息认证和隐私保护机制的研究", 《中国博士学位论文全文数据库 信息科技辑》, 15 February 2013 (2013-02-15) *
唐兰文等: "基于区块链技术的车联网研究", 《电脑知识与技术》, 31 October 2018 (2018-10-31), pages 2 - 3 *
田道坤等: "在区块链中基于混合算法的数字签名技术", 《电子科技》, 31 July 2018 (2018-07-31), pages 19 - 23 *

Also Published As

Publication number Publication date
CN113067695B (en) 2022-12-16
CN111385768A (en) 2020-07-07

Similar Documents

Publication Publication Date Title
CN112367305B (en) Internet of vehicles protection method based on privacy block chain and mobile terminal
Sun et al. A secure flexible and tampering-resistant data sharing system for vehicular social networks
US8001384B2 (en) Authentication system, authentication method, attesting device, verification device, their programs, and recording medium
CN108111294B (en) Multi-label classification method for protecting privacy based on ML-kNN
Mukherjee et al. An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice
CN111050317A (en) Intelligent traffic data safety sharing method based on alliance block chain
CN113067695B (en) Vehicle networking data exchange method and system based on block chain
EP2293492B1 (en) Method and system for determining securely manhattan distances
González-Serrano et al. Supervised machine learning using encrypted training data
CN101647229B (en) Compressed ecdsa signatures
Liu et al. A secure steganography for privacy protection in healthcare system
Liu et al. A secure lattice-based anonymous authentication scheme for VANETs
Sarkar et al. Stego-chain: A framework to mine encoded stego-block in a decentralized network
Zhu et al. PTFA: A secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system
JP7468978B2 (en) Anonymous collection of data from a group of authorized members
Xu et al. L-TCM: A lightweight privacy-preserving traffic condition monitoring scheme with source authentication in cloud-assisted VANETs
Yu et al. Efficient anonymous data authentication for vehicular ad hoc networks
KR20190005540A (en) Method for Authenticating Evaluation Results of Homomorphic-Encrypted Data
Abd-El-Atty et al. Double medical image cryptosystem based on quantum walk
Leaby et al. Towards design strong emergency and COVID-19 authentication scheme in VANET
Laouamer et al. Informed symmetric encryption algorithm for DICOM medical image based on N-grams
Chillali et al. A diagram of confidentiality of information during a traffic offence
Lakshmi et al. Image encryption algorithms using machine learning and deep learning techniques—A Survey
Shi et al. A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing
Changalvala Sensor Data Integrity Verification for Real-time and Resource Constrained Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant