CN113067695B - Vehicle networking data exchange method and system based on block chain - Google Patents

Vehicle networking data exchange method and system based on block chain Download PDF

Info

Publication number
CN113067695B
CN113067695B CN202110290072.4A CN202110290072A CN113067695B CN 113067695 B CN113067695 B CN 113067695B CN 202110290072 A CN202110290072 A CN 202110290072A CN 113067695 B CN113067695 B CN 113067695B
Authority
CN
China
Prior art keywords
information
block chain
data
vehicles
data exchange
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110290072.4A
Other languages
Chinese (zh)
Other versions
CN113067695A (en
Inventor
王暾
左敏江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinruixin Intelligent Iot Research Institute Nanjing Co ltd
Original Assignee
Xinruixin Intelligent Iot Research Institute Nanjing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinruixin Intelligent Iot Research Institute Nanjing Co ltd filed Critical Xinruixin Intelligent Iot Research Institute Nanjing Co ltd
Publication of CN113067695A publication Critical patent/CN113067695A/en
Application granted granted Critical
Publication of CN113067695B publication Critical patent/CN113067695B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of data exchange, in particular to a block chain-based data exchange method and system for Internet of vehicles. The method comprises the following steps: the vehicle collects the self parameter information and the surrounding environment information by using a vehicle-mounted sensor; encrypting the collected data; adding the encrypted data into a digital signature of the user; packing the data into blocks and sending the blocks to a block chain; receiving information sent by all vehicles in the range by the block chain; decrypting the received information; calculating the information credibility of the data in the block chain by combining a plurality of vehicles and the surrounding environment of the vehicles; vehicles within range receive the broadcast information for the block chain. The design of the invention realizes the point-to-point communication between vehicles, can quickly acquire information, simultaneously avoids the interference of false information on the vehicles and improves the accuracy of the information.

Description

Vehicle networking data exchange method and system based on block chain
Technical Field
The invention relates to the technical field of data exchange, in particular to a block chain-based data exchange method and system for Internet of vehicles.
Background
With the development of communication technology relied on by the internet of vehicles, the security of the internet of vehicles becomes a focus of attention while obtaining convenience brought to the society. When using the internet of vehicles service, most automobiles are in a driving state, for example: the information of the condition of the nearby road is obtained through the internet of vehicles service, the position of the running vehicle is changed all the time, the information needs to be updated in real time in order to guarantee the accuracy of the information, meanwhile, false information is mixed in the information, the accuracy of the information is affected, and any event is unacceptable due to the safety of passengers, so that the safety and the reliability of the internet of vehicles information are almost strictly required.
Disclosure of Invention
The invention aims to provide a block chain-based vehicle networking data exchange method and system to solve the problems in the background art.
In order to solve the above technical problems, an object of the present invention is to provide a block chain-based data exchange method for internet of vehicles, including the following steps:
(I) information acquisition:
s1.1, collecting self parameter information and surrounding environment information by a vehicle through a vehicle-mounted sensor;
the vehicle-mounted sensor comprises a radar sensor, an ultrasonic sensor, a laser sensor and the like, wherein the radar sensor is used for acquiring two-dimensional or three-dimensional distance information of the surrounding environment of the vehicle through laser, microwave or sound waves and sensing the driving environment through distance or speed analysis, the vehicle-mounted sensor can directly acquire two-dimensional or three-dimensional distance information of an object with higher precision and is insensitive to the change of the illumination environment, and the commonly used sensors comprise a millimeter wave radar, a laser radar and the like; common vehicle-mounted millimeter wave radars comprise short-range radars, middle-range radars and long-range radars which are respectively used for different applications, wherein the short-range radars are used for sensing scenes such as adjacent vehicles, obstacle detection, parking assistance and the like, are mainly arranged in the side area of the vehicle, are commonly used for monitoring the rear area of the vehicle, and are sometimes used as supplements of a front long-range radar sensor; the mid-range radar is used for sensing the medium distance and the speed, is mainly used in a reverse side warning system to assist a driver to leave a parking space, is used in a scene needing a narrow beam forward view, and is mainly used in an adaptive cruise system (ACC) and other safety fields, such as anti-collision application scenes.
(II) information transmission:
s1.2, encrypting the collected data;
s1.3, adding the encrypted data into a digital signature of the user;
s1.4, packaging the data into blocks and sending the blocks to a block chain;
(III) information verification:
s1.5, receiving information sent by all vehicles in a range by using the block chain;
s1.6, decrypting the received information;
s1.7, combining a plurality of vehicles and the surrounding environment of the vehicles to calculate the information reliability of the data in the block chain;
(IV) information broadcasting:
s1.8, the vehicles within the range receive the broadcast information of the block chain.
As a further improvement of the technical solution, in S1.2, the encryption processing adopts an asymmetric encryption algorithm, and an algorithm flow includes the following steps:
s2.1, reading in a plaintext;
s2.2, generating a round key by using the key;
s2.3, performing wheel change;
the round change adopts byte transformation, the byte transformation is a nonlinear byte transformation acting on the bytes, the transformation is reversible, and the advantage of constructing an s-box by using inverse mapping on a finite field is as follows: the expression is simple, the trap door is not believed to exist, the most important thing is that the trap door has good capacity of robust analysis and linear analysis, the affine transformation of the attachment is used for complicating the algebraic expression of the S-box so as to prevent algebraic interpolation attack, and when the S-box is implemented specifically, the S-box can also be implemented by a table look-up method, and part of codes of the S-box are as follows:
Register int i,j;
for(i=0;i<=3;i++);
for(j=0;j<=3;j++);
B[i][j]=S_BOX[B[i][j]/16][B[i][j]%16];
the principle is as follows:
Figure GDA0003889220690000031
and S2.4, forming a ciphertext.
As a further improvement of the present technical solution, in S2.2, an algorithm flow for generating round keys by using keys is as follows:
s3.1, setting a secret key as:
Figure GDA0003889220690000032
wherein each column represents a word aj ∈ GF (2) 8 )[x]/(x 4 +1),aij∈GF(2 8 );
And S3.2, representing the number of words in one data block by Nb to form a subkey.
Nb =4,6 or 8, and similarly, nk denotes the number of words in the key, then Nk =4,6 or 8, for example, the key with Nk =6 is written as follows:
Figure GDA0003889220690000033
as a further improvement of the technical solution, in S1.3, the method flow of the digital signature is as follows:
s4.1, a sender applies a hash function to the message to create a message digest;
s4.2, the sender encrypts the message digest by using a private key of the sender;
and S4.3, creating the personal signature of the sender.
As a further improvement of the technical solution, in S4.1, the method flow of the hash function is as follows:
let E k For block ciphers, the message M is divided into n-bit segments M = [ M = 1 ,M 2 ,…,M t ]Wherein n is a block cipher E k The steps are as follows:
s5.1, calculating H according to the following formula t
H 1 =E k (M 1 ),
Figure GDA0003889220690000041
2≤i≤t;
S5.2, using another key k '≠ k, calculates H' t =D k' (H t ),H t =E k (H′ t )。
As a further improvement of the present technical solution, in S1.6, the method for decrypting information includes the following steps:
s6.1, reading a ciphertext;
s6.2, generating a round key by using the key;
s6.3, performing inverse round transformation;
and S6.4, obtaining a plaintext.
Its decryption code is as follows:
int jiemi(unsigned charS_BOX[][16],unsigned char N_S_BO[][16]{
unsigned char B[4][4];unsigned char keys[4][44];
unsigned char temp[16];int i,j,a;
prinf ("please enter ciphertext |/n");
for(a=0;a<=15;a++)
for(i=0;i<=3;i++)for(j=0;j<=3;j++)
{scanf("%02x",&temp[16]);
B[j]Ii]=temp[a];}
keyexpansion(S_BOX,keys);
for (i =0;i < =3;i + +) for (j =0;j < =3;j + +// decryption round function
Bili]^=keys[i1[j+40];
int level;
for(level=1;level<=9;level++)
{ invshiftrow (B); // inverse shift transform.
As a further improvement of the present technical solution, in S1.7, the method for determining information reliability includes the steps of:
s7.1, counting the quantity of all data received in the block chain;
s7.2, classifying the data according to the similarity, and dividing the data into a plurality of groups;
s7.3, counting the number of each group of data;
and S7.4, taking the most data.
As a further improvement of the technical solution, in S7.2, a deep text matching algorithm is adopted for classifying the data according to the similarity, and an algorithm formula is as follows:
s7.2.1, first defined
Figure GDA0003889220690000051
Representing text samples s 1 And s 2 Where n and m denote sentence length, x i And y i Representing words in a sentence;
s7.2.2, word expression, function
Figure GDA0003889220690000052
Representing the word x i ,y i To the word vector w i ,v i Mapping the whole sentence to obtain matrixes w and v;
s7.2.3, phrase/sentence expressions, using functions P = phi (w), q = phi (v), resulting in expression of a phrase or entire sentence;
s7.2.4 text interaction, with M 0 Representing the result of two-segment text interaction, defining M 0 =f(p,q);
S7.2.5, extracting the mode information in the matching space based on the basic interactive information, which can be expressed as function M 0 =g(M k-1 );
S7.2.6, scoring the matching degree to obtain a score of the matching degree, wherein the formula is r = h (m) n )。
The invention also provides a block chain-based vehicle networking data exchange system, which comprises any one of the above vehicle networking data exchange methods, and comprises an information acquisition unit, an information transmission unit, an information verification unit and an information broadcasting unit, wherein the information acquisition unit is used for collecting self parameter information and surrounding environment information by a vehicle-mounted sensor, the information transmission unit is used for transmitting the acquired information to the block chain, the information verification unit is used for verifying the accuracy of the information by the block chain, and the information broadcasting unit is used for broadcasting the confidence information.
Compared with the prior art, the invention has the beneficial effects that: in the block chain-based vehicle networking data exchange method and system, the block chain-based vehicle networking technology realizes point-to-point communication between vehicles in a block chain service range, can quickly acquire information, prevents information lag, screens out false information, avoids interference of the false information on the vehicles, and improves the accuracy of the information.
Drawings
FIG. 1 is an overall flow chart of example 1;
FIG. 2 is a flowchart of the asymmetric encryption algorithm of embodiment 1;
FIG. 3 is a flowchart of the algorithm for key generation round keys of example 1;
FIG. 4 is a flowchart of a digital signature method of embodiment 1;
FIG. 5 is a flowchart of a method for decrypting information according to embodiment 1;
fig. 6 is a flowchart of the method for determining information reliability according to embodiment 1.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
As shown in fig. 1 to 6, one of the objects of the present invention is to provide a block chain based data exchange method for internet of vehicles, comprising the following steps:
(I) information acquisition:
s1.1, collecting self parameter information and surrounding environment information by a vehicle through a vehicle-mounted sensor;
the vehicle-mounted sensor comprises a radar sensor, an ultrasonic sensor, a laser sensor and the like, wherein the radar sensor is used for acquiring two-dimensional or three-dimensional distance information of the surrounding environment of the vehicle through laser, microwave or sound waves and sensing the driving environment through distance or speed analysis, the vehicle-mounted sensor can directly acquire two-dimensional or three-dimensional distance information of an object with higher precision and is insensitive to the change of the illumination environment, and the commonly used sensors comprise a millimeter wave radar, a laser radar and the like; common vehicle-mounted millimeter wave radars comprise short-range radars, middle-range radars and long-range radars which are respectively used for different applications, wherein the short-range radars are used for sensing scenes such as adjacent vehicles, obstacle detection, parking assistance and the like, are mainly arranged in the side area of the vehicle, are commonly used for monitoring the rear area of the vehicle, and are sometimes used as supplements of a front long-range radar sensor; the mid-range radar is used for sensing the medium distance and the speed, is mainly used in a reverse side warning system to assist a driver to leave a parking space, is used in a scene needing a narrow beam forward view, and is mainly used in an adaptive cruise system (ACC) and other safety fields, such as anti-collision application scenes.
(II) information transmission:
s1.2, encrypting the collected data;
s1.3, adding the encrypted data into a digital signature of the user;
s1.4, packaging data into blocks and sending the blocks to a block chain;
(III) information verification:
s1.5, receiving information sent by all vehicles in a range by using the block chain;
s1.6, decrypting the received information;
s1.7, combining a plurality of vehicles and the surrounding environment of the vehicles to calculate the information reliability of the data in the block chain;
(IV) information broadcasting:
s1.8, the vehicles within the range receive the broadcast information of the block chain.
As a further improvement of the technical solution, in S1.2, the encryption processing adopts an asymmetric encryption algorithm, and the algorithm flow includes the following steps:
s2.1, reading in a plaintext;
s2.2, generating a round key by using the key;
s2.3, performing wheel change;
the round change adopts byte transformation, the byte transformation is a nonlinear byte transformation acting on the bytes, the transformation is reversible, and the advantage of constructing an s-box by using inverse mapping on a finite field is as follows: the expression is simple, the trap door is not believed to exist, the most important thing is that the trap door has good capacity of robust analysis and linear analysis, the affine transformation of the attachment is used for complicating the algebraic expression of the S-box so as to prevent algebraic interpolation attack, and when the S-box is implemented specifically, the S-box can also be implemented by a table look-up method, and part of codes of the S-box are as follows:
Register int i,j;
for(i=0;i<=3;i++);
for(j=0;j<=3;j++);
B[i][j]=S_BOX[B[i][j]/16][B[i][j]%16];
the principle is as follows:
Figure GDA0003889220690000081
and S2.4, forming a ciphertext.
As a further improvement of the present technical solution, in S2.2, an algorithm flow for generating round keys by using keys is as follows:
s3.1, setting a secret key as:
Figure GDA0003889220690000082
wherein each column represents a word aj ∈ GF (2) 8 )[x]/(x 4 +1),aij∈GF(2 8 );
And S3.2, representing the number of words in one data block by Nb to form a subkey.
Nb =4,6 or 8, and similarly, nk represents the number of words in the key, then Nk =4,6 or 8, for example, the key with Nk =6 is written as follows:
Figure GDA0003889220690000083
as a further improvement of the technical solution, in S1.3, the method flow of the digital signature is as follows:
s4.1, a sender applies a hash function to the message to create a message digest;
s4.2, the sender encrypts the message digest by using a private key of the sender;
and S4.3, creating the personal signature of the sender.
As a further improvement of the technical solution, in S4.1, the method flow of the hash function is as follows:
let E k For block ciphers, the message M is divided into n-bit segments M = [ M = 1 ,M 2 ,…,M t ]Wherein n is a block cipher E k The steps are as follows:
s5.1, calculating H according to the following formula t
H 1 =E k (M 1 ),
Figure GDA0003889220690000084
2≤i≤t;
S5.2, calculating H ' by using another key k ' ≠ k ' t =D k' (H t ),H t =E k (H' t )。
As a further improvement of the present technical solution, in S1.6, the method for decrypting information includes the following steps:
s6.1, reading a ciphertext;
s6.2, generating a round key by using the key;
s6.3, performing inverse round conversion;
and S6.4, obtaining a plaintext.
Its decryption code is as follows:
int jiemi(unsigned charS_BOX[][16],unsigned char N_S_BO[][16]{
unsigned char B[4][4];unsigned char keys[4][44];
unsigned char temp[16];int i,j,a;
prinf ("please enter ciphertext! \ n");
for(a=0;a<=15;a++)
for(i=0;i<=3;i++)for(j=0;j<=3;j++)
{scanf("%02x",&temp[16]);
B[j]Ii]=temp[a];}
keyexpansion(S_BOX,keys);
for (i =0;i < =3;i + +) for (j =0;j < =3;j + +// decryption round function
Bili]^=keys[i1[j+40];
int level;
for(level=1;level<=9;level++)
{ invshiftrow (B); // inverse shift transform.
As a further improvement of the present technical solution, in S1.7, the method for determining information reliability includes the steps of:
s7.1, counting the number of all data received in the block chain;
s7.2, classifying the data according to the similarity, and dividing the data into a plurality of groups;
s7.3, counting the number of data in each group;
and S7.4, taking the most data.
As a further improvement of the technical solution, in S7.2, a deep text matching algorithm is used for classifying the data according to the similarity, and an algorithm formula is as follows:
s7.2.1, first defined
Figure GDA0003889220690000101
Representing text samples s 1 And s 2 Where n and m denote sentence length, x i And y i Representing words in a sentence;
s7.2.2, word expression, function
Figure GDA0003889220690000102
Representing the word x i ,y i To the word vector w i ,v i Mapping the whole sentence to obtain matrixes w and v;
s7.2.3, phrase/sentence expression, using functions P = Φ (w), q = Φ (v), resulting in expression of a phrase or entire sentence;
s7.2.4 text interaction, with M 0 Representing knots after interaction of two sections of textFruit, definition of M 0 =f(p,q);
S7.2.5, extracting the mode information in the matching space based on the basic interactive information, which can be expressed as function M 0 =g(M k-1 );
S7.2.6, scoring the matching degree to obtain a score of the matching degree, wherein the formula is r = h (m) n )。
The invention also provides a block chain-based vehicle networking data exchange system, which comprises any one of the above block chain-based vehicle networking data exchange methods, and comprises an information acquisition unit, an information transmission unit, an information verification unit and an information broadcasting unit, wherein the information acquisition unit is used for collecting parameter information of a vehicle-mounted sensor and surrounding environment information, the information transmission unit is used for transmitting the acquired information to a block chain, the information verification unit is used for verifying the accuracy of the information by the block chain, and the information broadcasting unit is used for broadcasting the confidence information.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (4)

1. The car networking data exchange method based on the block chain is characterized in that: the method comprises the following steps:
(I) information acquisition:
s1.1, collecting self parameter information and surrounding environment information by a vehicle through a vehicle-mounted sensor;
(II) information transmission:
s1.2, encrypting the collected data;
s1.3, adding the encrypted data into a digital signature of the user;
s1.4, packaging data into blocks and sending the blocks to a block chain;
(III) information verification:
s1.5, receiving information sent by all vehicles in a range by using the block chain;
s1.6, decrypting the received information;
s1.7, combining a plurality of vehicles and the surrounding environment of the vehicles to calculate the information reliability of data in a block chain;
(IV) information broadcasting:
s1.8, receiving broadcast information of the block chain by vehicles within the range;
in S1.7, the method for determining information reliability includes the following steps:
s7.1, counting the quantity of all data received in the block chain;
s7.2, classifying the data according to the similarity, and dividing the data into a plurality of groups;
s7.3, counting the number of each group of data;
s7.4, taking the most data;
in S7.2, a deep text matching algorithm is used to classify the data according to the similarity, and the algorithm formula is as follows:
s7.2.1, first defined
Figure FDA0003889220680000011
Representing text samples s 1 And s 2 Where n and m denote sentence length, x i And y i Representing words in a sentence;
s7.2.2, word expressions, functions
Figure FDA0003889220680000012
Representing the word x i ,y i To the word vector w i ,v i Mapping the whole sentence to obtain matrixes w and v;
s7.2.3, phrase/sentence expressions, using functions P = phi (w), q = phi (v), resulting in expression of a phrase or entire sentence;
s7.2.4 text interaction, with M 0 Representing the result of two-segment text interaction, defining M 0 As a function of p and q;
s7.2.5, extracting the mode in the matching space, and further extracting the mode information of the matching space on the basis of obtaining the interaction result;
5363 and scoring the matching degree by the matching degree score of S7.2.6.
2. The block chain-based data exchange method for the internet of vehicles according to claim 1, wherein: in S1.2, the encryption process uses an asymmetric encryption algorithm, and the algorithm flow includes the following steps:
s2.1, reading in a plaintext;
s2.2, generating a round key by using the key;
s2.3, performing wheel change;
and S2.4, forming a ciphertext.
3. The block chain-based data exchange method for the internet of vehicles according to claim 1, wherein: in S1.3, the digital signature method includes the following steps:
s4.1, a sender applies a hash function to the data to create a message digest;
s4.2, the sender encrypts the message digest by using a private key of the sender;
and S4.3, creating the personal signature of the sender.
4. The block chain-based data exchange method for the internet of vehicles according to claim 1, wherein: in S1.6, the method for decrypting information includes the following steps:
s6.1, reading a ciphertext;
s6.2, generating a round key by using the key;
s6.3, performing inverse round conversion;
and S6.4, obtaining a plaintext.
CN202110290072.4A 2020-06-01 2021-03-18 Vehicle networking data exchange method and system based on block chain Active CN113067695B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010482597.3A CN111385768A (en) 2020-06-01 2020-06-01 Vehicle networking data exchange method and system based on block chain
CN2020104825973 2020-06-01

Publications (2)

Publication Number Publication Date
CN113067695A CN113067695A (en) 2021-07-02
CN113067695B true CN113067695B (en) 2022-12-16

Family

ID=71222080

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010482597.3A Pending CN111385768A (en) 2020-06-01 2020-06-01 Vehicle networking data exchange method and system based on block chain
CN202110290072.4A Active CN113067695B (en) 2020-06-01 2021-03-18 Vehicle networking data exchange method and system based on block chain

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202010482597.3A Pending CN111385768A (en) 2020-06-01 2020-06-01 Vehicle networking data exchange method and system based on block chain

Country Status (1)

Country Link
CN (2) CN111385768A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866012B (en) * 2020-07-29 2022-04-29 中国联合网络通信集团有限公司 Vehicle information interaction method and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111050303A (en) * 2019-12-13 2020-04-21 国家计算机网络与信息安全管理中心山东分中心 Intelligent Internet of vehicles implementation method and system based on block chain technology

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830235B (en) * 2019-11-08 2023-03-07 华侨大学 Intelligent vehicle networking trusted data encryption method and system based on block chain
CN110855670B (en) * 2019-11-15 2021-12-03 扬州大学 Method suitable for credible message broadcasting and security authentication of vehicle-mounted ad hoc network
CN111050317B (en) * 2019-12-07 2022-08-02 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111050303A (en) * 2019-12-13 2020-04-21 国家计算机网络与信息安全管理中心山东分中心 Intelligent Internet of vehicles implementation method and system based on block chain technology

Also Published As

Publication number Publication date
CN111385768A (en) 2020-07-07
CN113067695A (en) 2021-07-02

Similar Documents

Publication Publication Date Title
CN112367305B (en) Internet of vehicles protection method based on privacy block chain and mobile terminal
US8001384B2 (en) Authentication system, authentication method, attesting device, verification device, their programs, and recording medium
Sun et al. A secure flexible and tampering-resistant data sharing system for vehicular social networks
JP2021500832A (en) Cryptography methods and systems for managing digital certificates
CN111050317A (en) Intelligent traffic data safety sharing method based on alliance block chain
Liu et al. An efficient anonymous authentication protocol using batch operations for VANETs
CN113067695B (en) Vehicle networking data exchange method and system based on block chain
CN105812354B (en) Location privacy protection method based on attack resistance in car networking under a kind of LBS background
CN110730064B (en) Data fusion method based on privacy protection in crowd sensing network
CN101647229B (en) Compressed ecdsa signatures
Liu et al. A secure steganography for privacy protection in healthcare system
EP2293492A2 (en) Method and system for determining securely manhattan distances
Han et al. Federated learning‐based trajectory prediction model with privacy preserving for intelligent vehicle
Zhu et al. PTFA: A secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system
Sun et al. Anonymous authentication and key agreement scheme combining the group key for vehicular ad hoc networks
JP7468978B2 (en) Anonymous collection of data from a group of authorized members
Yu et al. Efficient anonymous data authentication for vehicular ad hoc networks
Li et al. Privacy-preserving and real-time detection of vehicular congestion using multilayer perceptron approach for internet of vehicles
KR20190005540A (en) Method for Authenticating Evaluation Results of Homomorphic-Encrypted Data
Abd-El-Atty et al. Double medical image cryptosystem based on quantum walk
Sharma Position falsification detection in vanet with consecutive bsm approach using machine learning algorithm
Leaby et al. Towards design strong emergency and COVID-19 authentication scheme in VANET
Laouamer et al. Informed symmetric encryption algorithm for DICOM medical image based on N-grams
Changalvala Sensor Data Integrity Verification for Real-time and Resource Constrained Systems
Shi et al. A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant