CN113207105B - V2X anonymous communication method, device, electronic equipment and storage medium - Google Patents

V2X anonymous communication method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113207105B
CN113207105B CN202110334541.8A CN202110334541A CN113207105B CN 113207105 B CN113207105 B CN 113207105B CN 202110334541 A CN202110334541 A CN 202110334541A CN 113207105 B CN113207105 B CN 113207105B
Authority
CN
China
Prior art keywords
certificate
anonymous
certificates
sequence
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110334541.8A
Other languages
Chinese (zh)
Other versions
CN113207105A (en
Inventor
李峰
牟洪雨
曹增良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Automotive Research Institute Co Ltd
Original Assignee
Beijing Automotive Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Automotive Research Institute Co Ltd filed Critical Beijing Automotive Research Institute Co Ltd
Priority to CN202110334541.8A priority Critical patent/CN113207105B/en
Publication of CN113207105A publication Critical patent/CN113207105A/en
Application granted granted Critical
Publication of CN113207105B publication Critical patent/CN113207105B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

The application discloses a V2X anonymous communication method, a device, an electronic device and a storage medium, wherein the method comprises the following steps: detecting whether the vehicle carries out V2X communication; when the vehicle is detected to carry out V2X communication, sequentially extracting anonymous certificates from the head position of a preset certificate library based on the certificate sequence to generate a communication message, and carrying out signature verification; and detecting the available number of the unextracted anonymous certificates in the certificate sequence, and when the available number is smaller than a preset threshold value, reordering the extracted anonymous certificates, and linking the extracted anonymous certificates with the unextracted anonymous certificates to generate a new certificate sequence so as to perform signature verification based on the new certificate sequence. Therefore, the problem that in the related art, the used anonymous certificate is repeatedly used for issuing in the use process of the V2X service, so that the risk of vehicle privacy disclosure is caused is solved, and the privacy safety is greatly improved.

Description

V2X anonymous communication method, device, electronic equipment and storage medium
Technical Field
The present application relates to the field of network security technologies, and in particular, to a method, an apparatus, an electronic device, and a storage medium for anonymous V2X communication.
Background
In the practical application of the V2X (vehicle to X) technology, in order to protect the privacy information of the vehicle, an anonymous certificate is used to sign the information, so as to protect the privacy of the vehicle. Under such a mechanism, the vehicle usually has multiple valid anonymous certificates at the same time to form a certificate bank, and the vehicle obtains an anonymous certificate from the certificate bank for message signature in a period of time according to a switching mechanism defined by privacy rules.
However, because the total amount of anonymous certificates in the certificate bank is limited, the vehicle inevitably reuses the used anonymous certificates for issuing in the use process of the V2X service, which creates a potential risk of vehicle privacy disclosure, and is in need of solution.
Content of application
The application provides a V2X anonymous communication method, a device, an electronic device and a storage medium, which are used for solving the problem that the privacy of a vehicle is revealed because an anonymous certificate which is used repeatedly is issued, and the security of the privacy is greatly improved.
An embodiment of a first aspect of the present application provides a method for anonymous communication of V2X, including the following steps:
detecting whether the vehicle carries out V2X communication;
when the vehicle is detected to carry out V2X communication, sequentially extracting anonymous certificates from the head position of a preset certificate library based on a certificate sequence to generate a communication message, and carrying out signature verification; and
detecting the available number of the unextracted anonymous certificates on the certificate sequence, and when the available number is smaller than a preset threshold value, reordering the extracted anonymous certificates, and linking the extracted anonymous certificates to generate a new certificate sequence so as to perform signature verification based on the new certificate sequence.
Optionally, the reordering of the extracted anonymous certificates comprises:
acquiring last extraction time of a current anonymous certificate;
calculating a time interval according to the last extraction time and the current time;
allowing the current anonymous credential to be reordered when the time interval is greater than a credential reuse time security interval.
Optionally, the certificate reuse time security interval is a time required for switching of the anonymous certificate of the preset threshold.
Optionally, the method further comprises:
detecting whether each anonymous certificate of the preset certificate bank is expired;
and if any anonymous certificate is detected to be expired, carrying out expiration processing on any anonymous certificate.
Optionally, the sequentially extracting anonymous certificates from the head position of the preset certificate repository based on the certificate sequence includes:
removing the extracted anonymous certificate from the certificate sequence to generate a certificate subsequence;
and carrying out disorder processing on the certificate subsequence so as to generate the new certificate sequence.
Optionally, after generating the new certificate sequence, further comprising:
and copying the new certificate sequence to the tail position of the preset certificate library, and updating the preset certificate library. The embodiment of the second aspect of the present application provides a V2X anonymous communication device, including:
the device comprises a first detection module, a second detection module and a control module, wherein the first detection module is used for detecting whether the vehicle carries out V2X communication;
the generating module is used for sequentially extracting anonymous certificates from the head position of a preset certificate library based on a certificate sequence to generate a communication message and carry out signature verification when the vehicle is detected to carry out V2X communication; and
and the verification module is used for detecting the available number of the unextracted anonymous certificates in the certificate sequence, reordering the extracted anonymous certificates when the available number is smaller than a preset threshold value, and generating a new certificate sequence by combining the unextracted anonymous certificates for linkage so as to perform signature verification based on the new certificate sequence.
Optionally, the verification module includes:
the acquisition unit is used for acquiring the last extraction time of the current anonymous certificate;
the calculating unit is used for calculating a time interval according to the last extraction time and the current time;
a sorting unit configured to allow the current anonymous certificate to be reordered when the time interval is greater than a certificate reuse time security interval. Optionally, the certificate reuse time security interval is a time required for switching of the anonymous certificate of the preset threshold.
Optionally, the method further comprises:
the second detection module is used for detecting whether each anonymous certificate of the preset certificate bank is expired;
and the processing module is used for carrying out expiration processing on any anonymous certificate when detecting that any anonymous certificate is expired.
Optionally, the generating module includes:
the generating unit is used for removing the extracted anonymous certificate from the certificate sequence and generating a certificate subsequence;
and the processing unit is used for carrying out disorder processing on the certificate subsequence so as to generate the new certificate sequence.
Optionally, after generating the new certificate sequence, the verification module further comprises:
and the updating unit is used for copying the new certificate sequence to the tail position of the preset certificate library and updating the preset certificate library.
An embodiment of a third aspect of the present application provides an electronic device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor executing the program to implement the V2X anonymous communication method described above.
A fourth aspect of the present application provides a computer-readable storage medium, on which a computer program is stored, the program being executed by a processor for implementing the above-mentioned V2X anonymous communication method.
Therefore, when the vehicle is detected to perform V2X communication, anonymous certificates are sequentially extracted from the head position of the certificate base based on the certificate sequence to generate a communication message, signature verification is performed, the available number of the unextracted anonymous certificates on the certificate sequence is detected, when the available number is smaller than a certain value, the extracted anonymous certificates are reordered, and the unextracted anonymous certificates are linked to generate a new certificate sequence, so that signature verification is performed based on the new certificate sequence, the problem that the anonymous certificates which are used repeatedly in the use process of the V2X service in the related technology are used for issuing, the risk of vehicle privacy disclosure is solved, and the safety of privacy is greatly improved.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a flowchart of a V2X anonymous communication method according to an embodiment of the present disclosure;
FIG. 2 is an exemplary diagram of certificate extraction starting from a certificate store home position according to one embodiment of the present application;
FIG. 3 is a diagram illustrating a number of remaining certificates in a sequence less than a threshold value according to one embodiment of the present application;
FIG. 4 is an exemplary diagram of generating a new sequence of credentials according to one embodiment of the present application;
FIG. 5 is an exemplary diagram of a starting certificate pointer pointing to a current certificate pointer, according to one embodiment of the present application;
FIG. 6 is an exemplary diagram of obtaining a new credential sequence according to one embodiment of the present application;
FIG. 7 is an exemplary diagram of updating a certificate store according to one embodiment of the present application;
FIG. 8 is an exemplary diagram of credential initialization according to one embodiment of the present application;
fig. 9 is a block diagram of an example of a V2X anonymous communication device in accordance with an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
The V2X anonymous communication method, apparatus, electronic device, and storage medium according to the embodiments of the present application are described below with reference to the drawings.
Before describing the anonymous communication method of V2X according to the embodiment of the present application, several methods in the related art will be briefly described.
In particular, in order to minimize the risk of possible vehicle privacy leakage, a reasonable certificate reuse mechanism needs to be defined. In a white paper "Position paper reporting personal data protection actions in C-ITS" issued by the inter-vehicle communication Consortium (C2C CC), four KPIs (Key Performance indicators) and four switching mechanisms are defined in total.
Four KPIs:
(1) the probability of using the same anonymous certificate in the first and last segments of the same trip cannot be greater than 2%.
(2) In the same trip, the probability that the anonymous certificate used in the first trip is reused in the middle section during driving or the anonymous certificate used in driving is used in the last route before the vehicle stops cannot be more than 20%.
(3) The probability that an anonymous certificate used in the first or last segment of a journey will be reused in the first or last segment of a new journey should be less than 40%.
(4) The probability that an anonymous credential used in the first or last segment of a journey will be reused in any intermediate segment (not the first or last segment) of a new journey should be less than 40%.
Based on the above 4 KPIs, C2C CC proposes four schemes:
scheme a: the anonymous credential used for the first leg of the journey must have never been used before and must not be used again; anonymous certificates that have been used in the last leg of the journey must not be used anymore.
Scheme B: the anonymous certificates are extracted from the certificate store with equal probability and can be replaced, i.e. the anonymous certificates are put in storage immediately after use and can be used again.
Scheme C: the anonymous certificates are extracted from the certificate bank with the same probability and are not replaced, namely the anonymous certificates are not put in storage immediately after one anonymous certificate is used, the used anonymous certificates are not put in storage until the certificate bank is reinitialized, and the anonymous certificates in the certificate bank are randomly disordered again after the certificate bank is reinitialized. The reinitialization may have the following two triggering conditions:
firstly, after one stroke is finished;
and secondly, all certificates in the certificate base are used and moved out, so that no available certificate exists in the certificate base.
Scheme D: anonymous certificates are extracted from the certificate store in a Sequential Round-Robin fashion, and after all anonymous certificates in the certificate store have been used once, the starting position of the certificate store is reinitialized and anonymous certificates in the store are reused in the same order. The following two triggering conditions are used for reinitializing the initial position of the certificate library:
firstly, after one stroke is finished;
and secondly, all certificates in the certificate library are used after the last initialization, and when no unused certificate exists in the certificate library.
Based on the analysis of C2C CC, scenario C2 has better randomness and more even certificate usage on KPI-1, KPI-2 and KPI-3, with the same number of anonymous certificates (60) in the certificate repository.
However, in the scheme a, part of the certificates can only be used once, which results in the waste of the certificates and increases the certificate management cost of the background certificate system;
in the scheme B, because the certificates are randomly extracted from the same certificate bank each time, although the number of the required anonymous certificates can be effectively reduced, because the same use probability of different certificates cannot be ensured, part of the certificates are frequently used and part of the certificates are not used;
although the scheme C has better randomness in the use times of the certificates, the used certificates cannot be directly returned to the certificate bank, along with the gradual reduction of the available certificates in the certificate bank, the time interval for reusing the certificates is smaller and smaller, and in extreme cases, the last certificate in the certificate bank is possibly extracted first after the certificate bank is initialized, so that the situation that the vehicle continuously uses two identical anonymous certificates occurs;
the scheme D can ensure that each anonymous certificate in the certificate base can obtain the same use probability, and simultaneously can completely avoid the situation that the certificate is continuously used, but the certificate is easily predicted and forms privacy security risk due to the solidification of the use sequence of the certificate.
In order to effectively protect the privacy information of the vehicle and the user and prevent the leakage of information such as the position and the route of the user during the use of the V2X service, a plurality of simultaneously valid anonymous certificates (PC105) are generally used to issue a V2X message (BSM 201) according to a certain mechanism, so as to prevent an attacker from associating different anonymous certificates with the same specific vehicle. In order to directly obtain the best balance between the certificate management cost and the safety of the vehicle privacy, the vehicle-mounted device can only accommodate the limited anonymous certificate (PC105) to form a certificate library, the reuse of the anonymous certificate (PC105) is inevitably caused in the use process of the vehicle V2X business, and the safety and reliability reuse mechanism is particularly important for buffering the safety risk because the reuse of the certificate can cause the leakage of the safety privacy of the vehicle to a certain extent.
The application provides a V2X anonymous communication method based on the above problems, in which when it is detected that a vehicle performs V2X communication, anonymous certificates are sequentially extracted from the head position of a certificate base based on a certificate sequence to generate a communication message, signature verification is performed, the available number of unextracted anonymous certificates on the certificate sequence is detected, and when the available number is less than a certain value, the extracted anonymous certificates are reordered, and linking is performed in combination with the unextracted anonymous certificates to generate a new certificate sequence, so as to perform signature verification based on the new certificate sequence, thereby solving the problem that in the related art, the issued anonymous certificates which are used repeatedly in the use process of the V2X service cause the risk of vehicle privacy disclosure.
Specifically, fig. 1 is a schematic flowchart of a V2X anonymous communication method, apparatus, electronic device, and storage medium according to an embodiment of the present disclosure.
As shown in fig. 1, the V2X anonymous communication method, apparatus, electronic device and storage medium includes the following steps:
in step S101, it is detected whether the vehicle performs V2X communication.
The manner of detecting whether the vehicle performs V2X communication may be the same as that in the related art, and details are not described herein to avoid redundancy.
In step S102, when it is detected that the vehicle performs V2X communication, anonymous certificates are sequentially extracted from the head position of a preset certificate library based on the certificate sequence to generate a communication message, and signature verification is performed.
Specifically, as shown in fig. 2, in the initial state, assuming that the number of anonymous certificates (PC105) contained in the anonymous certificate repository (PC _ POOL201) of the in-vehicle V2X device is L, the certificate repository (PC _ POOL201) manages the certificates in a serial manner. When the vehicle starts to use the V2X service, the system starts to extract the anonymous certificate (PC105) from the head position of the certificate repository (PC _ POOL _ S202), when the start position pointer (PC _ POOL _ S202) and the current position pointer (PC _ POOL _ C203) both point to the anonymous certificate PC _1 with sequence number 1 and the end position pointer (PC _ POOL _ E204) points to the anonymous certificate PC _ L with sequence number L.
As the vehicle draws in a round robin order during V2X service usage, the mechanism for vehicle extraction draws anonymous certificates (PC105) from the unused certificate repository for BSM message issuance. The definition of the trigger condition for certificate extraction is consistent with that of C2C CC, namely, the vehicle extracts a new anonymous certificate (PC105) for issuing a subsequent V2X message (BSM 201) every 800-1000 m +2 min.
In step S103, the available number of the anonymous certificates that are not extracted in the certificate sequence is detected, and when the available number is smaller than a preset threshold, the extracted anonymous certificates are reordered and linked with the anonymous certificates that are not extracted, so as to generate a new certificate sequence, and signature verification is performed based on the new certificate sequence.
It should be appreciated that as shown in fig. 3, as the number of certificate extractions increases, the current position pointer (PC _ POOL _ C203) continues to increase until the number of certificates between the current position pointer and the ending position pointer (PC _ POOL _ E204) is less than n.
Optionally, in some embodiments, reordering the extracted anonymous credentials comprises: acquiring last extraction time of a current anonymous certificate; calculating a time interval according to the last extraction time and the current time; the current anonymous credentials are allowed to reorder when the time interval is greater than the credential reuse time security interval.
That is, to avoid predictability of anonymous certificates (PC105) caused by re-sequential reading after all certificates are sequentially read, an initialization operation is required for the current certificate POOL (PC _ POOL201) to reorder.
Optionally, in some embodiments, the certificate reuse time security interval is a time required for switching of anonymous certificates of a preset threshold.
That is, the embodiment of the present application may set a minimum security interval between two reuses of the same certificate, and assume that this interval threshold is the time required for switching n certificates.
Optionally, in some embodiments, sequentially extracting anonymous certificates from a head position of a preset certificate library based on a certificate sequence includes: removing the extracted anonymous certificate from the certificate sequence to generate a certificate subsequence; the certificate sub-sequences are scrambled for generating a new certificate sequence.
Specifically, as shown in fig. 4, the certificate that has been read, i.e. the certificate between the starting certificate pointer (C _ POOL _ S202) and the current certificate pointer (PC _ POOL _ C203) (without the anonymous certificate pointed by the current certificate pointer), is moved out of the certificate sequence to form a certificate subsequence (PC _ POOL _ SUB 208);
further, as shown in fig. 5, the starting certificate pointer (C _ POOL _ S202) of the current certificate POOL (PC _ POOL201) is pointed to the current certificate pointer (PC _ POOL _ C203);
further, as shown in fig. 6, the certificate subsequence (PC _ POOL _ SUB 208) is subjected to an out-of-order operation (Shuffle401) to obtain a new anonymous certificate sequence.
Optionally, in some embodiments, after generating the new certificate sequence, the method further includes: copying the new certificate sequence to the end position of the preset certificate library and updating the preset certificate library
That is, as shown in fig. 7, the present embodiment may copy a NEW anonymous certificate sequence (PC _ POOL _ NEW _ SUB209) to the end of the current certificate POOL (PC _ POOL201), and update the current certificate POOL (PC _ POOL 201).
Optionally, in some embodiments, the method further comprises: detecting whether each anonymous certificate of a preset certificate bank is expired or not; and if any anonymous certificate is detected to be expired, carrying out expiration processing on any anonymous certificate.
Further, as shown in fig. 8, in the embodiment of the present application, the ending position pointer (PC _ POOL _204) may point to the ending position of the updated current certificate library (PC _ POOL201), and the reinitialization of the current certificate library (PC _ POOL201) is completed.
After initialization is complete, the system continues to extract certificates one by one from the certificate store starting location (PC _ POOL _ S202) and updates the current certificate location (PC _ POOL _ C203) in a round robin order extraction. When the number of certificates between the current certificate position (PC _ POOL _ C203) and the end certificate position (PC _ POOL _ E204) is less than n, a new round of initialization operation of the certificate bank is triggered until the certificates in the current certificate bank expire.
Therefore, on the premise of meeting four safety indexes proposed by C2C-CC, each certificate in the certificate base is ensured to obtain the same use opportunity as much as possible, meanwhile, enough safety buffering is provided at the reuse interval of the same certificate, the anonymous certificate extraction mechanism is effectively optimized, the anonymous certificate in the certificate base is ensured to obtain the same use opportunity, meanwhile, the sufficient safety buffering is provided between two uses of the same certificate through setting the certificate reuse time safety interval, and the privacy protection capability of the vehicle in V2X service use can be further strengthened on the basis of meeting the C2C-CC privacy protection KPI through properly planning the size of the certificate base.
According to the V2X anonymous communication method provided by the embodiment of the application, when a vehicle is detected to perform V2X communication, anonymous certificates are sequentially extracted from the head position of a certificate library based on a certificate sequence to generate a communication message, signature verification is performed, the available number of the unextracted anonymous certificates on the certificate sequence is detected, when the available number is smaller than a certain value, the extracted anonymous certificates are reordered, and linking is performed by combining the unextracted anonymous certificates to generate a new certificate sequence, so that signature verification is performed based on the new certificate sequence, the problem that in the related technology, the used anonymous certificates are repeatedly used for issuing in the use process of V2X service, the risk of vehicle privacy disclosure is caused, and the privacy security of the vehicle is greatly improved.
Next, a V2X anonymous communication device proposed according to an embodiment of the present application is described with reference to the drawings.
Fig. 9 is a block diagram of a V2X anonymous communication device according to an embodiment of the present application.
As shown in fig. 9, the V2X anonymous communication device 10 includes: a first detection module 100, a generation module 200 and a verification module 300.
The first detection module 100 is used for detecting whether the vehicle performs V2X communication;
the generation module 200 is configured to, when it is detected that a vehicle performs V2X communication, sequentially extract anonymous certificates from a head position of a preset certificate repository based on a certificate sequence to generate a communication message, and perform signature verification; and
the verification module 300 is configured to detect an available number of unextracted anonymous certificates in the certificate sequence, and when the available number is smaller than a preset threshold, reorder the extracted anonymous certificates, and link the unextracted anonymous certificates to generate a new certificate sequence, so as to perform signature verification based on the new certificate sequence.
Optionally, in some embodiments, the verification module 300 comprises:
the acquisition unit is used for acquiring the last extraction time of the current anonymous certificate;
a calculating unit for calculating a time interval according to the last extraction time and the current time;
and the sequencing unit is used for allowing the current anonymous certificate to be reordered when the time interval is greater than the certificate reuse time safety interval. Optionally, the certificate reuse time security interval is a time required for switching of anonymous certificates with a preset threshold.
Optionally, in some embodiments, the method further comprises:
the second detection module is used for detecting whether each anonymous certificate of a preset certificate bank is expired;
and the processing module is used for carrying out expiration processing on any anonymous certificate when detecting that any anonymous certificate is expired.
Optionally, in some embodiments, the generating module 200 comprises:
the generating unit is used for removing the extracted anonymous certificate from the certificate sequence and generating a certificate subsequence;
and the processing unit is used for carrying out disorder processing on the certificate subsequence so as to generate a new certificate sequence.
Optionally, in some embodiments, after generating the new sequence of credentials, the verification module further comprises:
and the updating unit is used for copying the new certificate sequence to the tail position of the preset certificate library and updating the preset certificate library.
It should be noted that the foregoing explanation of the embodiment of the anonymous communication method of V2X is also applicable to the anonymous communication apparatus of V2X of this embodiment, and details are not repeated here.
According to the V2X anonymous communication device provided by the embodiment of the application, when a vehicle is detected to perform V2X communication, anonymous certificates are sequentially extracted from the head position of a certificate library based on a certificate sequence to generate a communication message, signature verification is performed, the available number of the unextracted anonymous certificates on the certificate sequence is detected, and when the available number is smaller than a certain value, the extracted anonymous certificates are reordered and linked in combination with the unextracted anonymous certificates to generate a new certificate sequence, so that signature verification is performed based on the new certificate sequence, the problem that in the related technology, the used anonymous certificates are repeatedly used for signing and issuing in the use process of a V2X service, the risk of vehicle privacy leakage is caused, and the privacy safety is greatly improved.
An embodiment of the present application further provides an electronic device, including: a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor executing the program to implement the V2X anonymous communication method described above.
Embodiments of the present application also propose a computer-readable storage medium having stored thereon a computer program, which is executed by a processor, for implementing the above-mentioned V2X anonymous communication method.
In the description of the present specification, reference to the description of "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or N embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one of the feature. In the description of the present application, "N" means at least two, e.g., two, three, etc., unless explicitly defined otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more N executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of implementing the embodiments of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the N steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are well known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried out in the method of implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and the program, when executed, includes one or a combination of the steps of the method embodiments.

Claims (10)

1. A method of anonymous communication of V2X, comprising the steps of:
detecting whether the vehicle carries out V2X communication;
when the vehicle is detected to carry out V2X communication, sequentially extracting anonymous certificates from the head position of a preset certificate library based on a certificate sequence to generate a communication message, and carrying out signature verification; and
detecting the available number of the unextracted anonymous certificates in the certificate sequence, and when the available number is smaller than a preset threshold value, reordering the extracted anonymous certificates, and linking the extracted anonymous certificates with the unextracted anonymous certificates to generate a new certificate sequence so as to perform signature verification based on the new certificate sequence.
2. The method of claim 1, wherein the reordering of the extracted anonymous certificates comprises:
acquiring last extraction time of a current anonymous certificate;
calculating a time interval according to the last extraction time and the current time;
allowing the current anonymous credential to be reordered when the time interval is greater than a credential reuse time security interval.
3. The method of claim 2, wherein the certificate reuse time security interval is a time required for switching of anonymous certificates for the preset threshold.
4. The method of claim 1, further comprising:
detecting whether each anonymous certificate of the preset certificate bank is expired;
and if any anonymous certificate is detected to be expired, carrying out expiration processing on any anonymous certificate.
5. The method according to claim 1, wherein the extracting anonymous certificates from the head position of the preset certificate library in sequence based on the certificate sequence comprises:
removing the extracted anonymous certificate from the certificate sequence to generate a certificate subsequence;
and carrying out disorder processing on the certificate subsequence so as to generate the new certificate sequence.
6. The method according to claim 1 or 5, further comprising, after generating the new sequence of credentials:
and copying the new certificate sequence to the tail position of the preset certificate library, and updating the preset certificate library.
7. A V2X anonymous communication device, comprising:
the device comprises a first detection module, a second detection module and a control module, wherein the first detection module is used for detecting whether the vehicle carries out V2X communication;
the generating module is used for sequentially extracting anonymous certificates from the head position of a preset certificate library based on the certificate sequence to generate a communication message and carry out signature verification when the vehicle is detected to carry out V2X communication; and
and the verification module is used for detecting the available number of the anonymous certificates which are not extracted in the certificate sequence, and when the available number is smaller than a preset threshold value, reordering the extracted anonymous certificates, and generating a new certificate sequence by combining the anonymous certificates which are not extracted, so as to perform signature verification based on the new certificate sequence.
8. The apparatus of claim 7, wherein the verification module comprises:
the acquisition unit is used for acquiring the last extraction time of the current anonymous certificate;
the calculating unit is used for calculating a time interval according to the last extraction time and the current time;
a sorting unit to allow the current anonymous credential to be reordered when the time interval is greater than a credential reuse time security interval.
9. An electronic device, comprising: memory, a processor and a computer program stored on the memory and executable on the processor, the processor executing the program to implement the V2X anonymous communication method of any of claims 1-6.
10. A computer-readable storage medium, having stored thereon a computer program, the program being executable by a processor for implementing the V2X anonymous communication method according to any one of claims 1-6.
CN202110334541.8A 2021-03-29 2021-03-29 V2X anonymous communication method, device, electronic equipment and storage medium Active CN113207105B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110334541.8A CN113207105B (en) 2021-03-29 2021-03-29 V2X anonymous communication method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110334541.8A CN113207105B (en) 2021-03-29 2021-03-29 V2X anonymous communication method, device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113207105A CN113207105A (en) 2021-08-03
CN113207105B true CN113207105B (en) 2022-07-26

Family

ID=77025816

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110334541.8A Active CN113207105B (en) 2021-03-29 2021-03-29 V2X anonymous communication method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113207105B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115706953A (en) * 2021-08-05 2023-02-17 中兴通讯股份有限公司 Certificate application method and device based on vehicle-road cooperation, computer equipment and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105704245A (en) * 2016-04-12 2016-06-22 成都景博信息技术有限公司 IOV (Internet of Vehicles) based mass data processing method
CN109412816A (en) * 2018-12-20 2019-03-01 东北大学 A kind of vehicle-mounted net anonymous communication system and method based on ring signatures
CN111182497A (en) * 2019-12-27 2020-05-19 国家计算机网络与信息安全管理中心 V2X anonymous authentication method, device and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008115984A1 (en) * 2007-03-19 2008-09-25 Telcordia Technologies, Inc. Vehicle segment certificate management using shared certificate schemes
CA2955277C (en) * 2016-01-28 2020-07-07 TrustPoint Innovation Technologies, Ltd. System and method for certificate selection in vehicle-to-vehicle applications to enhance privacy
US11223605B2 (en) * 2018-02-05 2022-01-11 Onboard Security, Inc. Method and system for connected vehicle communication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105704245A (en) * 2016-04-12 2016-06-22 成都景博信息技术有限公司 IOV (Internet of Vehicles) based mass data processing method
CN109412816A (en) * 2018-12-20 2019-03-01 东北大学 A kind of vehicle-mounted net anonymous communication system and method based on ring signatures
CN111182497A (en) * 2019-12-27 2020-05-19 国家计算机网络与信息安全管理中心 V2X anonymous authentication method, device and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SECURING VEHICULAR COMMUNICATIONS;Maxim Raya等;《IEEE Wireless Communications 》;20061031;第13卷(第5期);全文 *
车联网信息安全与隐私保护机制研究;刘瑞琴;《中国优秀博硕士学位论文全文数据库(硕士) 工程科技Ⅱ辑 (月刊) 2018年第08期》;20180815;全文 *

Also Published As

Publication number Publication date
CN113207105A (en) 2021-08-03

Similar Documents

Publication Publication Date Title
CN108681565B (en) Block chain data parallel processing method, device, equipment and storage medium
CN108092881A (en) A kind of intelligence based on wechat small routine moves vehicle Notification Method
CN106384143B (en) Dynamic electronic two-dimensional code generation method and identification method
CN109934593B (en) Design method and device for realizing block chain system supporting multiple signatures
CN110826111B (en) Test supervision method, device, equipment and storage medium
CN107329741A (en) A kind of software distribution upgrade method and device based on fingerprint recognition
CN109873804A (en) Service identification method, device, equipment and the readable storage medium storing program for executing of Behavior-based control
US10423401B2 (en) Method for updating software of a control device of a vehicle
CN108805565B (en) Block chain based commitment presence proving method, device and readable storage medium
CN109391645A (en) Block chain light-weight technologg method, block chain node and storage medium
CN104092544B (en) The services signatures method and apparatus of compatible Android application
CN113207105B (en) V2X anonymous communication method, device, electronic equipment and storage medium
CN103562930A (en) Prevention of playback attacks using OTP memory
CN110943852B (en) Device and method for configuring DNS (Domain name Server), DNS and method for updating configuration of DNS
CN110929230B (en) Work management method, device, equipment and storage medium
CN109166199B (en) Password generation method, device and equipment
CN111126774A (en) Abnormal vehicle identification method and device and electronic equipment
CN109165712A (en) Distributed generation method, device and computer storage medium by stages number
CN111324645A (en) Data processing method and device for block chain
CN110020864A (en) Recognition methods, device and the equipment traded extremely under weak net environment
CN104660812A (en) Information processing method and electronic equipment
CN109347640B (en) Data processing method and terminal based on block chain dynamic intelligent contract
JP2021149506A (en) Information processor, information processing method and program
CN112990402B (en) Vehicle-mounted terminal exception handling method and vehicle-mounted terminal
JP7064219B1 (en) Private key type digital signature device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant