CN115002157A - Vehicle pseudonym transformation method and device, electronic equipment and storage medium - Google Patents

Vehicle pseudonym transformation method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115002157A
CN115002157A CN202210616877.8A CN202210616877A CN115002157A CN 115002157 A CN115002157 A CN 115002157A CN 202210616877 A CN202210616877 A CN 202210616877A CN 115002157 A CN115002157 A CN 115002157A
Authority
CN
China
Prior art keywords
identity information
vehicle
target vehicle
individual identity
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210616877.8A
Other languages
Chinese (zh)
Inventor
韩顺顺
孙伟
鲍献伟
陈芬
关义
关享
徐宇航
张驰
吕再冰
陈枫
王慧杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210616877.8A priority Critical patent/CN115002157A/en
Publication of CN115002157A publication Critical patent/CN115002157A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a vehicle pseudonym transformation method and device, electronic equipment and a storage medium, which can be applied to the field of big data or the field of finance, wherein the method comprises the following steps: when the target vehicle enters the coverage area of the roadside unit, sending a request for joining the vehicle group to the roadside unit; receiving group identity information distributed by a roadside unit; switching the communication identity information of the target vehicle from the current individual identity information to group identity information; broadcasting a pseudonymous exchange invitation for a target vehicle to each vehicle in a vehicle group of roadside units; after receiving invited response information sent by an invited vehicle, sending the current individual identity information of the target vehicle to the invited vehicle; receiving current individual identity information fed back by an invited vehicle after the invited vehicle verifies the received information, and verifying the information fed back by the invited vehicle; sending a pseudonym activation request of a target vehicle to a trusted center for identity information activation; and switching the communication identity information of the target vehicle back to the current individual identity information.

Description

Vehicle pseudonym transformation method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of vehicle communication technologies, and in particular, to a vehicle pseudonym transformation method and apparatus, an electronic device, and a storage medium.
Background
With the development of wireless communication technology, vehicles in vehicle-mounted ad hoc networks (VANETs) can communicate more conveniently, and meanwhile, the vehicles can also obtain some internet services through wireless communication during driving. Many of these services require the implementation of vehicle-based location information. And an external attacker can estimate the position information of the vehicle by eavesdropping the beacon information broadcasted by the vehicle and can further acquire other information of the driver.
Therefore, in order to ensure the position privacy of the vehicle, the current vehicle will communicate with the generated pseudonymous identity information. In addition, the used pseudonymous name identity information is replaced regularly in the communication process, so that an attacker cannot link new pseudonymous name identity information to the pseudonymous name identity information used by the vehicle before, the information of the vehicle cannot be continuously determined, and the position privacy of the vehicle is ensured.
However, in the conventional method, the vehicle pseudonymous identity information is changed at regular time, so that the vehicle may be changed with new pseudonymous identity information in an inappropriate scene, and an attacker can directly know the new pseudonymous identity information changed by the vehicle, so that the position privacy of the vehicle cannot be effectively ensured. For example, when a vehicle changes its own pseudonym, there are no other vehicles around the vehicle, so the new pseudonym identification information obviously changed is of the vehicle.
Disclosure of Invention
Based on the defects of the prior art, the application provides a vehicle pseudonym transformation method and device, electronic equipment and a storage medium, so as to solve the problem that the position privacy of a vehicle cannot be effectively guaranteed in the prior art.
In order to achieve the above object, the present application provides the following technical solutions:
the application provides a vehicle pseudonym transformation method, which comprises the following steps:
when a target vehicle enters the coverage area of any one roadside unit and receives a broadcast message of the roadside unit, sending a request for joining a vehicle group of the roadside unit to the roadside unit;
receiving the group identity information distributed by the roadside unit after the target vehicle is verified to meet the group entering condition;
switching the communication identity information of the target vehicle from the current individual identity information to the group identity information; wherein the target vehicle communicates using its communication identity information;
broadcasting a pseudonymous exchange invitation for the target vehicle to each vehicle in a vehicle group of the roadside unit;
after receiving invited response information sent by any invited vehicle, sending the current individual identity information of the target vehicle to the invited vehicle;
receiving current individual identity information of the invited vehicle fed back after the invited vehicle verifies the current individual identity information of the target vehicle, and verifying the current individual identity information of the invited vehicle;
sending a pseudonym activation request of the target vehicle to a trusted center so as to replace the current individual identity information of the target vehicle with the current individual identity information of the invited vehicle and activate the current individual identity information;
and switching the communication identity information of the target vehicle back to the current individual identity information of the target vehicle.
Optionally, in the method for converting a vehicle pseudonym, the method further includes:
when the target vehicle is accessed to a vehicle-mounted self-organizing network, registration information is sent to the trusted center;
receiving an individual identity information set fed back by the trusted center after the registration information is verified;
storing the set of individual identity information into a tamper-resistant device of the target vehicle;
selecting one individual identity information in the individual identity information set, and determining the individual identity information as the current individual identity information of the target vehicle;
and taking the current individual identity information of the target vehicle as the communication identity information of the target vehicle.
Optionally, in the above method for converting a vehicle pseudonym, after the step of using the current individual identification information of the target vehicle as the communication identification information of the target vehicle, the method further includes:
selecting one unused individual identification information from the individual identification information set when the target vehicle meets a pseudonym updating condition;
and updating the current individual identity information of the target vehicle by using the selected unused individual identity information.
Optionally, in the method for converting a vehicle pseudonym, the method further includes:
receiving exchange key information distributed by the roadside unit after verifying that the target vehicle identity is legal; wherein the exchange key information is used to generate pseudonym exchange invitation and invited response information.
Optionally, in the above method for vehicle pseudonym transformation, before sending the request for pseudonym activation of the target vehicle to the trust center, the method further includes:
monitoring whether the target vehicle is about to drive away from the coverage range of the roadside unit in real time; and when the target vehicle is monitored to be about to drive out of the coverage range of the roadside unit, executing the sending of the pseudonym activation request of the target vehicle to a trusted center.
A second aspect of the present application provides a vehicle pseudonym conversion apparatus, including:
the system comprises a group entering unit, a group selecting unit and a group sending unit, wherein the group entering unit is used for sending a request for joining a vehicle group of a roadside unit to the roadside unit when a target vehicle enters the coverage area of any roadside unit and receives a broadcast message of the roadside unit;
the first receiving unit is used for receiving the group identity information distributed by the roadside unit after the target vehicle is verified to meet the group entering condition;
the first switching unit is used for switching the communication identity information of the target vehicle from the current individual identity information to the group identity information; wherein the target vehicle communicates using its communication identity information;
an invitation unit for broadcasting a pseudonymous name exchange invitation of the target vehicle to each vehicle in a vehicle group of the roadside unit;
the system comprises a first sending unit, a second sending unit and a control unit, wherein the first sending unit is used for sending current individual identity information of a target vehicle to an invited vehicle after receiving invited response information sent by any invited vehicle;
the second receiving unit is used for receiving the current individual identity information of the invited vehicle fed back after the invited vehicle verifies the current individual identity information of the target vehicle, and verifying the current individual identity information of the invited vehicle;
the activation unit is used for sending a pseudonymous name activation request of the target vehicle to a trusted center so as to replace the current individual identity information of the target vehicle with the current individual identity information of the invited vehicle and activate the current individual identity information;
and the second switching unit is used for switching the communication identity information of the target vehicle back to the current individual identity information of the target vehicle.
Optionally, the vehicle pseudonym conversion device further includes:
the registration unit is used for sending registration information to the credible center when the target vehicle is accessed to the vehicle-mounted self-organizing network;
a third receiving unit, configured to receive an individual identity information set fed back by the trusted center after the registration information is verified;
a storage unit for storing the set of individual identity information into a tamper-resistant device of the target vehicle;
the first selecting unit is used for selecting one individual identity information in the individual identity information set and determining the individual identity information as the current individual identity information of the target vehicle;
and the determining unit is used for taking the current individual identity information of the target vehicle as the communication identity information of the target vehicle.
Optionally, in the above vehicle pseudonym conversion device, the device further includes:
a second selecting unit, configured to select one unused individual identification information from the individual identification information set whenever the target vehicle meets a pseudonym update condition;
and the updating unit is used for updating the current individual identity information of the target vehicle by using the selected unused individual identity information.
Optionally, the vehicle pseudonym conversion device further includes:
the fourth receiving unit is used for receiving the exchange key information distributed by the roadside unit after the target vehicle identity is verified to be legal; wherein the exchange key information is used to generate pseudonym exchange invitation and invited response information.
Optionally, the vehicle pseudonym conversion device further includes:
the monitoring unit is used for monitoring whether the target vehicle is about to drive away from the coverage range of the roadside unit in real time; wherein, when it is monitored that the target vehicle is about to drive out of the coverage of the roadside unit, the activation unit executes the pseudonym activation request of the target vehicle to be transmitted to a trusted center.
A third aspect of the present application provides an electronic device comprising:
a memory and a processor;
wherein the memory is used for storing programs;
the processor is configured to execute the program, and the program, when executed, is specifically configured to implement the method for converting a vehicle pseudonym as described in any one of the above.
A fourth aspect of the present application provides a computer storage medium storing a computer program for implementing a method of vehicle pseudonym transformation as defined in any one of the preceding claims when executed.
According to the vehicle pseudonym transformation method, when a target vehicle enters the coverage area of any one roadside unit and receives a broadcast message of the roadside unit, a request for joining a vehicle group of the roadside unit is sent to the roadside unit. The method can receive the group identity information distributed by the roadside unit after the target vehicle is verified to meet the group entering condition, and then the communication identity information of the target vehicle is switched from the current individual identity information to the group identity information so as to communicate with the group identity information before exchange, thereby avoiding the information that an attacker can be linked to the exchanged vehicle. Each vehicle in the vehicle group of the roadside unit then broadcasts a pseudonymization invitation for the target vehicle. After receiving the invited response information sent by any one invited vehicle, sending the current individual identity information of the target vehicle to the invited vehicle, receiving the current individual identity information of the invited vehicle fed back after the invited vehicle verifies the current individual identity information of the target vehicle, and verifying the current individual identity information of the invited vehicle, thereby completing the exchange of the pseudonyms of the two vehicles. And then sending a pseudonym activation request of the target vehicle to the trusted center so as to replace the current individual identity information of the target vehicle with the current individual identity information of the invited vehicle, and finally switching the communication identity information of the target vehicle back to the current individual identity information of the target vehicle so as to communicate with the pseudonym after benefit exchange. Therefore, the method for transforming the pseudonymous identity information can effectively ensure the processing of the position privacy.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flow chart of a vehicle pseudonym transformation method according to an embodiment of the present application;
fig. 2 is a schematic diagram of an architecture of a communication system of a vehicle according to an embodiment of the present application;
fig. 3 is a flowchart of an initialization method for vehicle identity information according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a vehicle pseudonym transformation device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In this application, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The embodiment of the application provides a vehicle pseudonym transformation method, as shown in fig. 1, comprising the following steps:
s101, when a target vehicle enters the coverage area of any roadside unit and receives the broadcast message of the roadside unit, sending a request for joining the vehicle group of the roadside unit to the roadside unit.
It should be noted that, in the embodiment of the present application, the communication system of the vehicle mainly includes, as shown in fig. 2, the vehicle, a trusted center (TA), a roadside unit (RSU), which may also be referred to as a roadside base station, and an application server (LBS) providing various services. The vehicles can communicate in vehicle-mounted self-organizing networks (VANETs) after being registered by the credible center, the vehicles can request services from the position server through roadside units during driving, and if no roadside base stations are available at the periphery, the vehicles can directly send requests to the position server through the Internet. The wireless communication in the model uses DSRC protocol, and the roadside unit is connected with the credible center and the application server through a safe link.
The target vehicle may be any vehicle that has already been registered.
Because the roadside unit has a certain coverage and broadcasts to the vehicles in the coverage, when the target vehicle enters the coverage of the roadside unit, the target vehicle receives the broadcast message of the roadside unit, and at this time, the target vehicle can determine that the target vehicle has entered the coverage of the roadside unit, so that the request for joining the vehicle group of the roadside unit is sent to the roadside unit, and specifically, the request for joining the vehicle group of the roadside unit can be sent based on the current individual identity information of the target vehicle and the certificate of the corresponding key. The request for joining the vehicle group may include a pseudonym and a corresponding certificate of the current individual identity information of the target vehicle, location information of the vehicle, a test, a current timestamp, and the like.
S102, group identity information distributed by the roadside unit after the target vehicle meets the group entering condition is received.
Specifically, after receiving a request sent by a target vehicle, the roadside unit verifies whether the target vehicle meets the group entry condition based on information in the request. Alternatively, the crowd-entering condition may be that the identity information is legitimate and that the vehicle is already within the coverage of the roadside unit.
When the roadside unit verifies that the target vehicle meets the group entry condition, group identity information, which may specifically include a group identity and a corresponding group private key and certificate, is distributed to the target vehicle. Since the public key is published, the group public key may be directly a uniform group public key.
S103, the communication identity information of the target vehicle is switched from the current individual identity information to the group identity information.
The target vehicle uses the communication identity information to communicate, namely which identity information is used as the communication identity information, and the target vehicle uses the pseudonym in which identity information to communicate.
It should be noted that after entering the vehicle group, the target vehicle may exchange identity information with other vehicles in the group, and in order to avoid attacking and tracking the exchanged identity information, after entering the vehicle group, the target vehicle switches its communication identity information from the current individual identity information to the group identity information, so as to perform communication through the group identity information.
The current individual identity information of the target vehicle is the identity information used by the target vehicle before entering the vehicle group, and may be obtained by initialization before or exchanged with other vehicles before.
Optionally, in another embodiment of the present application, a method for initializing vehicle identity information is provided, as shown in fig. 3, including the following steps:
s301, when the target vehicle is accessed to the vehicle-mounted self-organizing network, registration information is sent to the trusted center.
The registration information may include the real identity ID of the target vehicle, and the like.
S302, receiving an individual identity information set fed back by the trusted center after the registration information is verified.
Specifically, after verifying the real identity of the target vehicle, the trusted center generates a series of pseudonyms and corresponding public keys, private keys and public key certificates for the target vehicle, so as to form an individual identity information set, and feeds the individual identity information set back to the target vehicle.
S303, storing the individual identity information set into the anti-tampering device of the target vehicle.
To avoid tampering with the individual identity information by others, the target vehicle will store the set of individual identity information into a tamper-resistant device (TPD) of the vehicle.
S304, selecting one individual identity information in the individual identity information set, and determining the individual identity information as the current individual identity information of the target vehicle.
After the personal identity information set is obtained, one individual identity information needs to be selected for the current time, so that one individual identity information in the personal identity information set is selected and determined as the current individual identity information of the target vehicle.
S305, taking the current individual identity information of the target vehicle as the communication identity information of the target vehicle.
After the current individual identity information is selected, the current individual identity information is used as the communication identity information of the target vehicle for communication.
Optionally, in this embodiment of the present application, in order to effectively ensure the location of the target vehicle, considering that the target vehicle may not exchange identity information with other vehicles for a long time, before performing step S305, the method may further include:
and when the target vehicle meets the pseudonym updating condition, selecting one unused individual identity information from the individual identity information set, and updating the current individual identity information of the target vehicle by using the selected unused individual identity information.
In the embodiment of the present application, a condition for automatic pseudonym update is preset, for example, when the time of the current identity information reaches a preset threshold, an unused individual identity information is automatically selected from an individual identity information set generated during initialization, and is used as new current individual identity information for communication.
And S104, broadcasting the pseudonymous name exchange invitation of the target vehicle to each vehicle in the vehicle group of the roadside unit.
It should be noted that when the target vehicle needs to change the identity information, the kana exchange invitation of the target vehicle will be broadcast to each vehicle in the vehicle group of the roadside unit. The target vehicle can be determined whether the identity information needs to be replaced currently according to preset rules.
Optionally, in order to ensure the security during the exchange, in another embodiment of the present application, the method may further include:
and receiving the exchange key information distributed by the roadside unit after verifying that the identity of the target vehicle is legal.
Wherein the exchange key information may include a first public key, a first private key, and a first certificate for generating the pseudonym exchange invitation and invited response information.
That is, in the embodiment of the present application, when distributing the group identity information, the roadside unit also distributes the exchange key information that needs to be used in the exchange.
Specifically, a pseudonymous name exchange invitation of a target vehicle is broadcasted to each vehicle in a vehicle group of a roadside unit, the pseudonymous name exchange invitation is generated by using exchange key information, and then the pseudonymous name exchange invitation is broadcasted to vehicles in a vehicle right. The pseudonym exchange invitation may include the first public key of the target vehicle, the first certificate, the certificate in the group identity information, the current timestamp, and the like.
Any invited vehicle in the vehicle group which receives the invitation verifies the certificate in the group identity information of the target vehicle in the pseudonym exchange invitation after receiving the invitation request. If the vehicle is authenticated and the invited vehicle also has the requirement of changing identity information at present, the invited response information can be generated by using the corresponding exchange key information and fed back to the target vehicle. The invited response information may also include the first public key, the first certificate, the certificate in the group identity information, the current timestamp, and the like. The exchange key information may be used to generate pseudonym exchange invitation and invited response information.
Similarly, when the target vehicle needs to exchange the pseudonym, step S104 may be executed to invite another vehicle to exchange the pseudonym, or invite response information may be fed back to the other vehicle in response to an invitation from the other vehicle. Optionally, when the target vehicle needs to exchange the pseudonym, if receiving a pseudonym exchange invitation of another vehicle, directly responding to the invitation of the other vehicle, feeding back invited response information to the other vehicle, and not performing step S104. If the kana exchange invitation of the other vehicle is not received, step S104 is executed. Of course, this is only one of the alternatives, and other strategies may be used.
And S105, after receiving the invited response information sent by any invited vehicle, sending the current individual identity information of the target vehicle to the invited vehicle.
Specifically, the invited vehicle, upon receiving the pseudonym exchange invitation of the target vehicle, will verify the certificate of the target vehicle in the pseudonym exchange invitation. If the verification is passed and the pseudonym also needs to be exchanged currently, invited response information is generated and fed back to the target vehicle. After receiving the invited response message, the target vehicle encrypts the current individual identity information of the target vehicle by using the public key corresponding to the current individual identity information of the invited vehicle, and then sends the encrypted current individual identity information to the invited vehicle.
It should be noted that the target vehicle can only exchange the pseudonyms with one vehicle at a time. When there are multiple invited response messages, optionally, after receiving the first invited response message, other invited response messages will not be received unless the exchange fails. Other ways may of course be used, for example processing the first solicited response message, processing the second solicited message only if the transaction fails, etc.
And S106, receiving the current individual identity information of the invited vehicle fed back after the invited vehicle verifies the current individual identity information of the target vehicle, and verifying the current individual identity information of the invited vehicle.
Specifically, after receiving the current personal identity information of the target vehicle, the invited vehicle decrypts the current personal identity information by using its own private key, and then can verify the validity of the certificate in the current personal identity information of the target vehicle by using the secret key of the trusted center. After the certificate is verified to be valid, the invited vehicle encrypts the current individual identity information of the invited vehicle by using the public key of the target vehicle and feeds the encrypted current individual identity information back to the target vehicle. Similarly, after receiving the current individual identity information of the invited vehicle, the target vehicle also carries out decryption and verification.
It should be noted that only when both parties verify that the certificate in the received current individual identity information of the other party is valid, the exchange is determined to be successful.
And S107, sending a pseudonym activation request of the target vehicle to the credible center so as to replace the current individual identity information of the target vehicle with the current individual identity information of the invited vehicle and activate the current individual identity information.
It should be noted that, no matter the target vehicle or the invited vehicle, after exchanging the identity information, the activation by the trusted center is needed, otherwise, the identity information cannot be used in the VANETs, and the current individual identity information of the target vehicle can be really replaced by the current individual identity information of the invited vehicle after the activation.
Specifically, the target vehicle sends a pseudonym activation request of the target vehicle to the trust center, wherein pseudonyms of exchanged invited vehicles, certificates corresponding to the pseudonyms, exchanged certificates corresponding to encryption of the target vehicle, current timestamps and the like can be included. After verifying that the information in the pseudonym activation request passes, the trusted center allocates new key and corresponding certificate to the encryption exchanged by the target vehicle, so that the replacement of the current individual identity information of the target vehicle with the current individual identity information of the invited vehicle is completed, that is, the replacement of the two identity information is not direct and simple to replace all information but to replace the pseudonym, and the information such as the key and the certificate needs to be reallocated by the trusted center.
Optionally, in this embodiment of the application, before performing step S107, the method further includes:
and monitoring whether the target vehicle is about to drive away from the coverage area of the roadside unit in real time.
When it is detected that the target vehicle is about to drive away from the coverage area of the roadside unit, step S107 is performed.
Since in the embodiments of the present application, the right identity information is communicated within the coverage area of the roadside unit, the activation is selected to be performed just before the drive-off from the coverage area of the roadside unit.
Alternatively, it may be determined whether the target vehicle is about to travel away from the coverage of the roadside unit, together with the travel route, manner, and current distance from the boundary of the coverage of the roadside unit.
Of course, this is only an alternative way, and it may be activated after the exchange.
And S108, switching the communication identity information of the target vehicle back to the current individual identity information of the target vehicle.
After exchanging and exchanging the current individual identity information of the target vehicle, the communication identity information of the target vehicle can be switched back to the current individual identity information of the target vehicle, so as to communicate with the exchanged current individual identity information of the target vehicle.
The embodiment of the application provides a vehicle pseudonym transformation method, when a target vehicle enters the coverage range of any one roadside unit and receives a broadcast message of the roadside unit, a request for joining a vehicle group of the roadside unit is sent to the roadside unit. The method can receive the group identity information distributed by the roadside unit after the target vehicle is verified to meet the group entering condition, and then the communication identity information of the target vehicle is switched from the current individual identity information to the group identity information so as to communicate with the group identity information before exchange, thereby avoiding the information that an attacker can be linked to the exchanged vehicle. Each vehicle in the vehicle group of the roadside unit then broadcasts a pseudonymization invitation for the target vehicle. After receiving the invited response information sent by any one invited vehicle, sending the current individual identity information of the target vehicle to the invited vehicle, receiving the current individual identity information of the invited vehicle fed back after the invited vehicle verifies the current individual identity information of the target vehicle, and verifying the current individual identity information of the invited vehicle, thereby completing the exchange of the pseudonyms of the two vehicles. And then sending a pseudonym activation request of the target vehicle to the trusted center so as to replace the current individual identity information of the target vehicle with the current individual identity information of the invited vehicle, and finally switching the communication identity information of the target vehicle back to the current individual identity information of the target vehicle so as to communicate with the pseudonym after benefit exchange. Therefore, the method for transforming the pseudonymous identity information can effectively ensure the processing of the position privacy.
Another embodiment of the present application provides a vehicle pseudonym conversion apparatus, as shown in fig. 4, including:
the grouping unit 401 is configured to send a request for joining a vehicle group of roadside units to the roadside units when the target vehicle enters the coverage area of any one of the roadside units and receives the broadcast message from the roadside unit.
A first receiving unit 402, configured to receive group identity information distributed by a roadside unit after a verification target vehicle meets a group entry condition.
A first switching unit 403, configured to switch the communication identity information of the target vehicle from the current individual identity information to the group identity information.
Wherein the target vehicle communicates using its communication identity information.
An invitation unit 404 for broadcasting a pseudonymous exchange invitation of the target vehicle to each vehicle in the vehicle group of the roadside unit.
A first sending unit 405, configured to send the current individual identity information of the target vehicle to an invited vehicle after receiving the invited response information sent by any one of the invited vehicles.
A second receiving unit 406, configured to receive the current individual identity information of the invited vehicle, which is fed back after the invited vehicle verifies the current individual identity information of the target vehicle, and verify the current individual identity information of the invited vehicle.
An activating unit 407, configured to send a pseudonymous name activation request of the target vehicle to the trust center, so as to replace the current individual identity information of the target vehicle with the current individual identity information of the invited vehicle.
And a second switching unit 408, configured to switch the communication identity information of the target vehicle back to the current individual identity information of the target vehicle.
Optionally, in an apparatus for converting a vehicle pseudonym provided in another embodiment of the present application, the apparatus further includes:
and the registration unit is used for sending registration information to the trusted center when the target vehicle is accessed to the vehicle-mounted self-organizing network.
And the third receiving unit is used for receiving the individual identity information set fed back by the trusted center after the registration information is verified.
And the storage unit is used for storing the individual identity information set into the anti-tampering device of the target vehicle.
The first selecting unit is used for selecting one individual identity information in the individual identity information set and determining the individual identity information as the current individual identity information of the target vehicle.
And the determining unit is used for taking the current individual identity information of the target vehicle as the communication identity information of the target vehicle.
Optionally, in an apparatus for converting a vehicle pseudonym provided in another embodiment of the present application, the apparatus further includes:
and the second selection unit is used for selecting one unused individual identity information from the individual identity information set when the target vehicle meets the pseudonym updating condition.
And the updating unit is used for updating the current individual identity information of the target vehicle by using the selected unused individual identity information.
Optionally, in an apparatus for converting a vehicle pseudonym provided in another embodiment of the present application, the apparatus further includes:
and the fourth receiving unit is used for receiving the exchange key information distributed by the roadside unit after the target vehicle identity is verified to be legal. Wherein the exchange key information is used to generate pseudonym exchange invitation and invited response information.
Optionally, in an apparatus for converting a vehicle pseudonym provided in another embodiment of the present application, the apparatus further includes:
and the monitoring unit is used for monitoring whether the target vehicle is about to drive away from the coverage range of the roadside unit in real time.
When the situation that the target vehicle is about to drive out of the coverage range of the roadside unit is monitored, the activation unit executes a pseudonym activation request of the target vehicle to the credible center.
It should be noted that, for the specific working processes of each unit provided in the foregoing embodiments of the present application, corresponding steps in the foregoing method embodiments may be referred to accordingly, and are not described herein again.
Another embodiment of the present application provides an electronic device, as shown in fig. 5, including:
a memory 501 and a processor 502.
The memory 501 is used for storing programs.
The processor 502 is configured to execute the program stored in the memory 501, and when the program is executed, the program is specifically configured to implement the method for converting a vehicle pseudonym according to any one of the embodiments described above.
Another embodiment of the present application provides a computer storage medium for storing a computer program, which when executed, is used to implement the method for transforming a vehicle pseudonym as provided in any one of the above embodiments.
Computer storage media, including permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
The vehicle pseudonym transformation method and device, the electronic device and the storage medium provided by the invention can be used in the field of big data or the field of finance. The above description is only an example, and does not limit the application fields of the vehicle pseudonym transformation method and apparatus, the electronic device, and the storage medium provided by the present invention.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method for vehicle pseudonym conversion, comprising:
when a target vehicle enters the coverage area of any one roadside unit and receives a broadcast message of the roadside unit, sending a request for joining a vehicle group of the roadside unit to the roadside unit;
receiving group identity information distributed by the roadside unit after the target vehicle meets the group entering condition;
switching the communication identity information of the target vehicle from the current individual identity information to the group identity information; wherein the target vehicle communicates using its communication identity information;
broadcasting a pseudonymous exchange invitation for the target vehicle to each vehicle in a vehicle group of the roadside unit;
after receiving invited response information sent by any invited vehicle, sending the current individual identity information of the target vehicle to the invited vehicle;
receiving current individual identity information of the invited vehicle fed back after the invited vehicle verifies the current individual identity information of the target vehicle, and verifying the current individual identity information of the invited vehicle;
sending a pseudonym activation request of the target vehicle to a trusted center so as to replace the current individual identity information of the target vehicle with the current individual identity information of the invited vehicle and activate the current individual identity information;
and switching the communication identity information of the target vehicle back to the current individual identity information of the target vehicle.
2. The method of claim 1, further comprising:
when the target vehicle is accessed to a vehicle-mounted self-organizing network, registration information is sent to the trusted center;
receiving an individual identity information set fed back by the trusted center after the registration information is verified;
storing the set of individual identity information into a tamper-resistant device of the target vehicle;
selecting one individual identity information in the individual identity information set, and determining the individual identity information as the current individual identity information of the target vehicle;
and taking the current individual identity information of the target vehicle as the communication identity information of the target vehicle.
3. The method of claim 2, wherein the taking the current individual identity information of the target vehicle as the communication identity information of the target vehicle further comprises:
selecting one unused individual identification information from the individual identification information set when the target vehicle meets a pseudonym updating condition;
and updating the current individual identity information of the target vehicle by using the selected unused individual identity information.
4. The method of claim 1, further comprising:
receiving exchange key information distributed by the roadside unit after verifying that the target vehicle identity is legal; wherein the exchange key information is used to generate pseudonym exchange invitation and invited response information.
5. The method of claim 1, wherein prior to sending the request for pseudonym activation of the target vehicle to the trust center, further comprising:
monitoring whether the target vehicle is about to drive away from the coverage range of the roadside unit in real time; when the situation that the target vehicle is about to drive out of the coverage range of the roadside unit is monitored, the pseudonym activation request of the target vehicle is sent to a trusted center.
6. A vehicle pseudonym conversion apparatus, comprising:
the system comprises a grouping unit, a vehicle grouping unit and a vehicle grouping unit, wherein the grouping unit is used for sending a request for joining a vehicle group of a roadside unit to the roadside unit when a target vehicle enters the coverage area of any roadside unit and receives a broadcast message of the roadside unit;
the first receiving unit is used for receiving the group identity information distributed by the roadside unit after the target vehicle meets the group entering condition;
the first switching unit is used for switching the communication identity information of the target vehicle from the current individual identity information to the group identity information; wherein the target vehicle communicates using its communication identity information;
an invitation unit for broadcasting a pseudonymous name exchange invitation of the target vehicle to each vehicle in a vehicle group of the roadside unit;
the system comprises a first sending unit, a second sending unit and a control unit, wherein the first sending unit is used for sending current individual identity information of a target vehicle to an invited vehicle after receiving invited response information sent by any invited vehicle;
the second receiving unit is used for receiving the current individual identity information of the invited vehicle fed back after the invited vehicle verifies the current individual identity information of the target vehicle, and verifying the current individual identity information of the invited vehicle;
the activation unit is used for sending a pseudonymous name activation request of the target vehicle to a trusted center so as to replace the current individual identity information of the target vehicle with the current individual identity information of the invited vehicle and activate the current individual identity information;
and the second switching unit is used for switching the communication identity information of the target vehicle back to the current individual identity information of the target vehicle.
7. The apparatus of claim 6, further comprising:
the registration unit is used for sending registration information to the credible center when the target vehicle is accessed to the vehicle-mounted self-organizing network;
the third receiving unit is used for receiving an individual identity information set fed back by the trusted center after the registration information is verified;
a storage unit configured to store the set of individual identification information into a tamper-resistant device of the target vehicle;
the first selecting unit is used for selecting one individual identity information in the individual identity information set and determining the individual identity information as the current individual identity information of the target vehicle;
and the determining unit is used for taking the current individual identity information of the target vehicle as the communication identity information of the target vehicle.
8. The apparatus of claim 7, further comprising:
a second selecting unit, configured to select one unused individual identification information from the individual identification information set whenever the target vehicle meets a pseudonym update condition;
and the updating unit is used for updating the current individual identity information of the target vehicle by using the selected unused individual identity information.
9. An electronic device, comprising:
a memory and a processor;
wherein the memory is used for storing programs;
the processor is adapted to execute the program, which when executed is particularly adapted to implement the method of vehicle pseudonym transformation according to any of claims 1 to 5.
10. A computer storage medium for storing a computer program which, when executed, implements the method of vehicle pseudonym transformation of any of claims 1 to 5.
CN202210616877.8A 2022-06-01 2022-06-01 Vehicle pseudonym transformation method and device, electronic equipment and storage medium Pending CN115002157A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210616877.8A CN115002157A (en) 2022-06-01 2022-06-01 Vehicle pseudonym transformation method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210616877.8A CN115002157A (en) 2022-06-01 2022-06-01 Vehicle pseudonym transformation method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115002157A true CN115002157A (en) 2022-09-02

Family

ID=83030627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210616877.8A Pending CN115002157A (en) 2022-06-01 2022-06-01 Vehicle pseudonym transformation method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115002157A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106572088A (en) * 2016-10-20 2017-04-19 河南工业大学 Vehicle-mounted self-organizing network pseudonym conversion method based on virtual user
CN109561383A (en) * 2018-12-17 2019-04-02 昆明理工大学 A kind of location privacy protection method based on dynamic assumed name exchange area
CN110430567A (en) * 2019-07-31 2019-11-08 福建师范大学 A kind of car networking assumed name replacing options based on game theory analysis
CN112291186A (en) * 2019-07-25 2021-01-29 上海车景网络科技有限公司 Internet of vehicles privacy protection method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106572088A (en) * 2016-10-20 2017-04-19 河南工业大学 Vehicle-mounted self-organizing network pseudonym conversion method based on virtual user
CN109561383A (en) * 2018-12-17 2019-04-02 昆明理工大学 A kind of location privacy protection method based on dynamic assumed name exchange area
CN112291186A (en) * 2019-07-25 2021-01-29 上海车景网络科技有限公司 Internet of vehicles privacy protection method and system
CN110430567A (en) * 2019-07-31 2019-11-08 福建师范大学 A kind of car networking assumed name replacing options based on game theory analysis

Similar Documents

Publication Publication Date Title
Manivannan et al. Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
Mundhe et al. A comprehensive survey on authentication and privacy-preserving schemes in VANETs
Zhang et al. PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks
Petit et al. Pseudonym schemes in vehicular networks: A survey
CA2955277C (en) System and method for certificate selection in vehicle-to-vehicle applications to enhance privacy
US8397063B2 (en) Method for a public-key infrastructure for vehicular networks with limited number of infrastructure servers
CN106134232B (en) Certification in device-to-device discovery
Xiong et al. Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs
KR101837338B1 (en) Cloud-Assisted Conditional Privacy Preserving Authentication Method for VANET and System Therefor
CN107005844B (en) Communication method and related device
CN109756336B (en) Authentication method, V2X computing system and V2X computing node
CN115694891B (en) Road side equipment communication system and method based on central computing platform
Limbasiya et al. MComIoV: Secure and energy-efficient message communication protocols for Internet of vehicles
JP2019195229A (en) Roadside equipment, execution method for same, service provider device and mobile station
Weimerskirch et al. Data security in vehicular communication networks
US20050003814A1 (en) Wireless communication system, terminal, message sending method, and program for allowing terminal to execute the method
Shah et al. A dynamic privacy preserving authentication protocol in VANET using social network
CN112418850A (en) Transaction method and device based on block chain and electronic equipment
CN115002157A (en) Vehicle pseudonym transformation method and device, electronic equipment and storage medium
JP6715998B2 (en) Communication method and related device
Kumari et al. RFPM: A RSU‐aided framework for pseudonym management to preserve location privacy in IoV
Biswas et al. Prioritized WAVE-based Parking Assistance with Security and User Anonymity.
Basta et al. 5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System
EP4301009A1 (en) Improved communications within an intelligent transport system to detect misbehaving its stations
Karumanchi et al. Selective and confidential message exchange in vehicular ad hoc networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination