CN115623021A - Processing method and device for coordinates in Internet of vehicles and Internet of vehicles equipment - Google Patents
Processing method and device for coordinates in Internet of vehicles and Internet of vehicles equipment Download PDFInfo
- Publication number
- CN115623021A CN115623021A CN202110802996.8A CN202110802996A CN115623021A CN 115623021 A CN115623021 A CN 115623021A CN 202110802996 A CN202110802996 A CN 202110802996A CN 115623021 A CN115623021 A CN 115623021A
- Authority
- CN
- China
- Prior art keywords
- target message
- message
- processing
- data
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 9
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 63
- 230000006855 networking Effects 0.000 claims abstract description 48
- 238000000034 method Methods 0.000 claims description 48
- 230000007246 mechanism Effects 0.000 claims description 39
- 238000004590 computer program Methods 0.000 claims description 11
- 238000004364 calculation method Methods 0.000 description 34
- 230000005540 biological transmission Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000008859 change Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 238000000354 decomposition reaction Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000006798 recombination Effects 0.000 description 2
- 238000005215 recombination Methods 0.000 description 2
- 241000760358 Enodes Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a processing method of coordinates in a vehicle networking system, which is applied to first vehicle networking equipment, and comprises the following steps: determining an initial vector IV according to a target message to be subjected to coordinate encryption processing; encrypting the coordinate data in the target message using the IV and key as inputs to a block encryption algorithm. The scheme of the invention can realize the encryption of the coordinate data on the premise of not expanding the existing message set, and solves the problem that the IV value distribution cannot be carried out.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a method and a device for processing coordinates in a vehicle networking system and a vehicle networking device.
Background
The V2X (Vehicle-to-Everything) technology is continuously supported by the ecosystem, and the C-V2X (Cellular) is an internet of vehicles technology based on the Cellular network, which enables the vehicles to communicate with other vehicles and infrastructure around, shares real-time information of roads, and is a key to realize road traffic safety and access to automatic driving.
At present, when an OBU transmits data with an OBU, a RSU or a VRU of a vulnerable traffic participant, a direct link PC5 interface transmits messages such as BSM and the like in a broadcasting mode to perform coordinate transmission. The Longitude, the Latitude and the Elevation information Elevation coordinate data need to be encrypted. For example, when coordinate encryption is performed in a mode such as OFB/CFB in SM4, it is necessary that both the transmitter and the receiver have the same IV value as an input variable of the mode such as OFB/CFB in SM4, and block encryption is performed. However, during air interface transmission, the contents of the message set (e.g., BSM, MAP, RSM, RSI, PSM messages) are determined, and cannot carry IV value data, and if the implementation is forced, the existing message definition needs to be modified, the implementation process is complex, and the product needs to be redeveloped and tested. Therefore, there is a problem that the IV value data cannot be distributed without expanding the existing message set such as the BSM.
Disclosure of Invention
The invention provides a method and a device for processing coordinates in a vehicle networking system and vehicle networking equipment, which solve the problem that IV value data cannot be distributed on the premise of not expanding the existing message set.
In a first aspect, an embodiment of the present invention provides a method for processing coordinates in a vehicle networking system, where the method is applied to a first vehicle networking device, and the method includes:
determining an initial Vector (IV for short) according to a target message to be subjected to coordinate encryption processing;
encrypting the coordinate data in the target message using the IV and key as inputs to a block encryption algorithm.
Optionally, after encrypting the coordinate data in the target message by using the IV and the key as input of a packet encryption algorithm, the method further includes:
transmitting the target message including the encrypted coordinate data.
Optionally, the determining an initial vector IV according to the target message to be subjected to the coordinate encryption processing includes:
determining the initial vector IV according to at least one of optional fields and optional fields in the target message; or alternatively
And determining the initial vector IV according to at least one of the optional field and the optional field in the target message and the first data provided by the key distribution mechanism.
Optionally, the first data includes: a random code provided by the key distribution authority, and/or a weight parameter provided by the key distribution authority.
Optionally, the encrypting the coordinate data in the target message by using the IV and the key as input of a packet encryption algorithm includes:
carrying out Hash encryption processing on the IV, and disturbing the sequence of the IV values to obtain a processed value;
and encrypting the coordinate data in the target message by taking the processing value and the key as input of a packet encryption algorithm.
Optionally, the target message includes one of the following:
basic Safety Message (BSM);
MAP Message (MAP Message, MAP for short);
roadside Safety messages (RSM for short);
road Side Information (RSI for short);
personal Safety Message (PSM for short).
In a second aspect, an embodiment of the present invention provides a method for processing coordinates in an internet of vehicles, where the method is applied to a second internet of vehicles, and the method includes:
determining an initial vector IV according to a target message to be subjected to coordinate decryption processing;
and using the IV and the key as input of a packet encryption algorithm to decrypt the encrypted coordinate data in the target message.
Optionally, the determining an initial vector IV according to the target message to be subjected to the coordinate decryption processing, before, further includes:
and receiving a target message, wherein the target message comprises the encrypted coordinate data.
Optionally, the determining an initial vector IV according to the target message to be subjected to the coordinate encryption processing includes:
determining the initial vector IV according to at least one of optional fields and optional fields in the target message; or
And determining the initial vector IV according to at least one of the optional field and the optional field in the target message and the first data provided by the key distribution mechanism.
Optionally, the first data includes: a random code provided by the key distribution authority, and/or a weight parameter provided by the key distribution authority.
Optionally, the decrypting the coordinate data by using the IV and the key as input of a block encryption algorithm includes:
carrying out Hash encryption operation on the IV to obtain a processed value;
and using the processing value and the key as input of a packet encryption algorithm to decrypt the coordinate data.
Optionally, the target message includes one of the following:
a basic security message BSM;
MAP message MAP;
a road side safety message RSM;
road side information RSI;
individual security message PSM.
In a third aspect, an embodiment of the present invention provides a vehicle networking device, including: a transceiver, a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method for processing coordinates in a vehicle networking according to any one of the first or second aspects when executing the computer program.
In a fourth aspect, an embodiment of the present invention provides an apparatus for processing coordinates in a vehicle networking system, where the apparatus is applied to a first vehicle networking device, and the apparatus includes:
the first determining module is used for determining an initial vector IV according to a target message to be subjected to coordinate encryption processing;
and the encryption module is used for encrypting the coordinate data in the target message according to the IV.
In a fifth aspect, an embodiment of the present invention provides an apparatus for processing coordinates in an internet of vehicles, where the apparatus is applied to a second internet of vehicles device, and the apparatus includes:
the second determining module is used for determining an initial vector IV according to the target message to be subjected to coordinate decryption processing;
and the decryption module is used for decrypting the encrypted coordinate data in the target message according to the IV.
In a sixth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the processing method for coordinates in the internet of vehicles according to any one of the first aspect or the second aspect.
The technical scheme of the invention has the beneficial effects that:
according to the scheme, the first car networking device determines an initial vector IV according to a target message to be subjected to coordinate encryption processing; encrypting the coordinate data in the target message using the IV and a key as inputs to a block encryption algorithm; the second vehicle networking device serving as a receiving end can also determine an initial vector IV according to a target message to be subjected to coordinate decryption processing; and using the IV and the key as input of a block encryption algorithm to decrypt the encrypted coordinate data in the target message. Therefore, the encryption of the coordinate data can be realized on the premise of not expanding the existing message set, and the problem that the IV value distribution cannot be carried out in the prior art is solved.
Drawings
FIG. 1 is a flow chart of a method for processing coordinates in a vehicle networking system according to the present invention;
FIG. 2 shows one of the coordinate transmission diagrams of the present invention;
FIG. 3 is a second schematic diagram of coordinate transmission according to the present invention;
FIG. 4 is a third schematic diagram of coordinate transmission according to the present invention;
FIG. 5 illustrates a flow chart for determining the IV value according to the present invention;
FIG. 6 is a second flowchart of a coordinate processing method in the Internet of vehicles according to the present invention;
FIG. 7 is a block diagram of a coordinate processing device in the Internet of vehicles according to the present invention;
FIG. 8 is a second block diagram of the coordinate processing device in the Internet of vehicles according to the present invention;
FIG. 9 is a block diagram of one embodiment of a vehicle networking device of the present invention;
fig. 10 shows a second configuration block diagram of the car networking device of the present invention.
Detailed Description
To make the technical problems, technical solutions and advantages of the present invention more apparent, the following detailed description is given with reference to the accompanying drawings and specific embodiments. In the following description, specific details such as specific configurations and components are provided only to help the full understanding of the embodiments of the present invention. Thus, it will be apparent to those skilled in the art that various changes and modifications may be made to the embodiments described herein without departing from the scope and spirit of the invention. In addition, descriptions of well-known functions and constructions are omitted for clarity and conciseness.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
In various embodiments of the present invention, it should be understood that the sequence numbers of the following processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Additionally, the terms "system" and "network" are often used interchangeably herein.
In the embodiments provided herein, it should be understood that "B corresponding to a" means that B is associated with a from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may also be determined from a and/or other information.
In the embodiment of the present invention, the access network may be an access network including a Macro Base Station (Macro Base Station), a micro Base Station (Pico Base Station), a Node B (3G mobile Station), an enhanced Base Station (eNB), a Home enhanced Base Station (Femto eNB or Home eNode B or Home eNB or HeNB), a relay Station, an access point, a Remote Radio Unit (RRU), a Remote Radio Head (RRH), and the like. The user terminal may be a mobile phone (or handset), or other device capable of sending or receiving wireless signals, including user Equipment, a Personal Digital Assistant (PDA), a wireless modem, a wireless communicator, a handheld device, a laptop computer, a cordless phone, a Wireless Local Loop (WLL) station, a CPE (Customer premises Equipment) or a mobile smart hotspot capable of converting mobile signals into WiFi signals, a smart appliance, or other devices capable of autonomously communicating with a mobile communication network without human operation, etc.
Specifically, the embodiment of the invention provides a method and a device for processing coordinates in a vehicle networking system and a vehicle networking system device, which solve the problem that IV value data cannot be distributed on the premise of not expanding the existing BSM and other message sets.
First embodiment
As shown in fig. 1, an embodiment of the present invention provides a processing method for coordinates in a car networking system, which is applied to a first car networking device, where the first car networking device includes, but is not limited to: an On Board Unit (OBU), a Road Side Unit (RSU) and a vulnerable traffic participant VRU.
The method specifically comprises the following steps:
step 11: determining an initial vector IV according to a target message to be subjected to coordinate encryption processing;
in this step, the target message includes one of the following:
a basic security message BSM;
MAP message MAP;
a road side safety message RSM;
roadside information RSI;
individual security message PSM.
The coordinates to be encrypted in the target message include: longitude, latitude, elevation information Elevation.
For example, as shown in fig. 2, when the OBU and the OBU/RSU/VRU transmit data, the PC5 transmits a message such as BSM in a broadcast form to perform coordinate transmission. The BSM message includes coordinate information Position3D. Position3D asn.1 is encoded as follows:
the Longitude, the Latitude and the Elevation information Elevation need to be encrypted.
Illustratively, as shown in fig. 3, when the RSU and OBU/RSU/VRU transmit data, the PC5 transmits a message set (e.g., MAP, RSM, RSI message) for coordinate transmission by broadcasting. The MAP, RSM, RSI messages include coordinate information Position3D. Position3D asn.1 is encoded as follows:
the Longitude, the Latitude and the Elevation information Elevation need to be encrypted.
For example, as shown in fig. 4, currently, when the VRU and the OBU/RSU/VRU transmit data, the PC5 transmits a message such as PSM for coordinate transmission by broadcast. The PSM message contains coordinate information Position3D. Position3D asn.1 is encoded as follows:
the Longitude, the Latitude and the Elevation information Elevation need to be encrypted.
Step 12: encrypting the coordinate data in the target message using the IV and key as inputs to a block encryption algorithm.
In the step, the IV value is assigned to a block encryption algorithm, and the IV value is matched with a key to complete the encryption of the coordinate. The generation of the IV value is a random number generated by the block encryption algorithm in order to obtain different encryption results after the same data is subjected to the encryption algorithm.
In the embodiment, the first car networking device determines the initial vector IV according to the target message to be subjected to coordinate encryption processing; the IV and the secret key are used as the input of a block encryption algorithm to encrypt the coordinate data in the target message, and the second vehicle networking device is used as a receiving end and can also determine an initial vector IV according to the target message to be subjected to coordinate decryption processing; and using the IV and the key as input of a block encryption algorithm to decrypt the encrypted coordinate data in the target message. Therefore, the encryption of the coordinate data can be realized on the premise of not expanding the existing message set, and the problem that the distribution of the IV value cannot be carried out is solved.
In an embodiment, after step 12, the method further comprises:
transmitting the target message including the encrypted coordinate data.
In this embodiment, by sending the target message of the encrypted coordinate data, when the receiving end receives the target message, the receiving end may determine the IV value according to the target message, thereby completing the decryption operation of the coordinates.
In one embodiment, step 12 comprises:
determining the initial vector IV according to at least one of optional fields and optional fields in the target message; or
And determining the initial vector IV according to at least one of the optional field and the optional field in the target message and the first data provided by the key distribution mechanism.
Specifically, the first data includes: a random code provided by the key distribution authority, and/or a weight parameter provided by the key distribution authority.
Illustratively, the IV may be calculated based on data in some of the fields of interest in the target message, in combination with the weight parameter.
Taking the MAP message as an example, selecting the MsgCount field in the MAP message to calculate the IV value, wherein the IV value calculation formula is as follows:
IV=(α×MsgCount)mod128;
it should be noted that the MsgCount field is used to indicate that the sender is the same kind of message sent by itself, and the MsgCount field is numbered in sequence, and the number value is 0 to 127, and the MsgCount field is recycled. The data field is used for the receiver to monitor the continuous receiving of the same type of messages from the same sender and count the lost packets.
Taking the MAP message as an example, selecting MsgCount and NodeID (node ID) in the MAP message to calculate the IV value, wherein the IV value calculation formula is as follows:
IV=(α×MsgCount+γ×NodeID)mod128;
wherein, msgCount and NodeID are the fields which are necessary to be selected in the MAP message; α, γ are weight parameters, the weight parameters are provided by the key distribution mechanism along with the key, the weight parameter provided each time may be different from the last time, and the weight parameters are fixed or configurable.
Illustratively, the IV may be calculated based on data in some optional fields and data in some optional fields in the target message. Wherein if the optional data is not present, it is set to a predefined value (fixed or configurable). Taking the MAP message as an example, selecting three fields of MsgCount, minuteOfTheYear (the number of fields represents the current year, the total past minutes (UTC time)) and NodeID in the MAP message to calculate the IV value, wherein the IV value calculation formula is as follows:
IV=(MsgCount 3 +NodeID 4 +MinuteOfTheYear 2 )mod128;
wherein, msgCount and NodeID are necessary fields in the MAP message; minuteOfTheYear is an optional field in the MAP message. Note that if MinuteOfTheYear does not appear in the MAP message, it is set to a predefined value (fixed or configured) at the time of calculation.
Illustratively, the IV may be calculated from data in some of the fields of interest in the target message, in combination with a random code provided by the key distribution authority. Taking the MAP message as an example, the MsgCount, the NodeID field and the random code issued when the key distribution mechanism distributes are selected from the MAP, and the random code is generated and issued along with the encryption key each time. The IV value calculation formula is as follows:
IV=(MsgCount×NodeID×random_m)mod128;
wherein, msgCount and NodeID are the fields which are necessary to be selected in the MAP message; and random _ m is a random code issued when the key distribution mechanism distributes the random _ m.
Illustratively, the IV may be calculated based on data in some optional fields, data in some optional fields in the target message, in combination with a random code provided by the key distribution authority. If the optional data is not present, it is set to a predefined value (fixed or configurable). Taking the MAP message as an example, in the MAP selection message, the calculation formula of the IV values of MsgCount, nodeID, minuteOfTheYear is as follows:
IV=(2 56 ×MsgCount+2 36 ×MinuteOfTheYear+2 20 ×NodeID+
random_m)mod128;
wherein, msgCount and NodeID are the fields which are necessary to be selected in the MAP message; minuteOfTheYear is an optional field in the MAP message; and random _ m is a random code issued when the key distribution mechanism distributes the random _ m. If MinuteOfTheYear is not present in the MAP message, it is set to a predefined value (fixed or configured) at the time of calculation.
Illustratively, the IV may be calculated based on data in some mandatory fields, some optional fields in the target message, in combination with a random code and weight parameters provided by the key distribution authority. Taking the MAP message as an example, in the MAP selection message, the calculation formula of the IV values of MsgCount, nodeID, minuteOfTheYear is as follows:
IV = (α × MsgCount + β × minuteofthemean + γ × NodeID + δ × random _ m) mod128; or,
the IV value calculation formula is as follows:
IV=(MsgCount α ×NodeID γ ×MinuteOfTheYear β ×
random_m δ )mod128;
wherein, α, β, γ, δ are weight parameters, the weight parameters are provided by the key distribution mechanism along with the key, the weight parameters provided each time can be different from the last time, and the weight parameters are fixed or configurable; msgCount and NodeID are the fields which are necessary to be selected in the MAP message; minuteOfTheYear is an optional field in the MAP message; and the random _ m is a random code issued when the key distribution mechanism distributes the random code.
It should be noted that the above is only an exemplary description taking the MAP message as an example, the combination cases of the IV value calculation are not listed one by one, and the calculation formula is not limited thereto, and the calculation rule may be designed as required.
In one embodiment, said encrypting the coordinate data in the target message using the IV and the key as inputs to a block encryption algorithm comprises:
carrying out Hash encryption processing on the IV, and disturbing the sequence of the IV values to obtain a processed value;
and encrypting the coordinate data in the target message by taking the processing value and the key as input of a packet encryption algorithm.
In this embodiment, the IV value generated by the predefined rule is processed by the Hash operation of the SM3 algorithm again, and the calculation formula is: IV = Hash (IV).
Note that the lengths are l, l<2 64 The data is subjected to Hash encryption of an SM3 algorithm, the encrypted data is 256-bit data, and the 256-bit data mod is 128-bit and is used as an input IV value of modes such as OFB/CFB and the like in a later SM 4. The Hash encryption operation can increase the length of original data, disturb the variation range of the original data, and change data with unfixed bit length into fixed-length data. The IV value is more random, so that the safety of the IV value is improved, and the IV value which is changed into a fixed degree is more convenient for the calculation process of the encryption algorithm. It should be noted that the Hash Algorithm is not necessarily designated as SM3, and may also be an encryption Algorithm such as SHA (Secure Hash Algorithm), which is only an exemplary illustration and not a limitation.
Exemplary descriptions of the value ranges and applications for field selection of the MAP message, the BSM message, the RSM message, and the RSI message are provided below.
In particular, see table 1 below:
MAP message | MsgCount, minuteOfTheYeast, nodeID, mechanism generated number random _ m |
BSM messages | MsgCount, DSecond, speed, listening, mechanism generated number random _ b |
RSM messages | MsgCount, DSecond, speed, listening, mechanism generated number random _ rsm |
RSI messages | MsgCount, minuteOfTheYeast, mechanism generated number random _ r |
TABLE 1 summary table of variable selection in MAP, BSM, RSM, RSI messages
1. MAP selects fields of MsgCount, minuteOfTheYear and NodeID, and a key generation mechanism issues a random code random _ m. Wherein the values of MsgCount, minuteOfTheYeast, nodeID and random _ m are as follows:
MsgCount: = INTEREGER (0.. 127), msgCount is 2 in length 7 ;
MinuteOfTheYear: = INTEGER (0.. 527040), minuteOfTheYear is 2 in length 20 ;
NodeID = INTEGER (0.. 65535), and the NodeID length is 2 16 ;
random _ m = INTEGER (0.. 1048575), and random _ m has a length of 2 20 ;
Wherein random _ m has a length of 2 20 The reason for this is that the SM3 algorithm inputs data with a length of l, l<2 64 Random _ m length of 2 20 Then, the data length of MsgCount, minuteOfTheYeast, nodeID, random _ m is added to 2 63 The range of variation is greatest.
During operation, the MsgCount, minuteOfTheYeast and NodeID in the MAP message and the random code random _ m issued by the key distribution mechanism during distribution are selected. And generating and issuing random _ m along with the encryption key each time. The IV value calculation formula is as follows:
IV=α*MsgCount+β*MinuteOfTheYear+γ*NodeID+δ*random_m
the weighting parameters α, β, γ, δ may be issued (fixed or configurable) by the key distribution authority with the key, each issue may be different from the last. Wherein MsgCount, nodeID are optional fields, minuteOfTheYear are optional fields, and random _ m is data (fixed or configurable) issued by the key generation mechanism in the MAP message. An IV value is generated through a predefined rule, and the calculation formula is as follows through Hash operation of an SM3 algorithm: IV = Hash (IV);
length of l (l)<2 64 ) The data is subjected to Hash encryption of an SM3 algorithm, the encrypted data is 256-bit data, and the 256-bit data mod is 128-bit and is used as an input IV value of modes such as OFB/CFB and the like in a later SM 4. The Hash encryption operation can disturb the variation range of the original data and change the data with unfixed bit length into the fixed length data.
2. The BSM message selects MsgCount, DSecond (defining millisecond time within 1 minute) field, speed (Speed of vehicle or other traffic participant) field, heading (Heading angle of vehicle or traffic participant) field, and the key generation mechanism issues random _ b, wherein MsgCount, DSecond, speed, heading, and random _ b take on the following ranges:
MsgCount: = INTEREGER (0.. 127), and the MsgCount length is 2 7 ;
DSecond: = INTEGER (0.. 65535), and the DSecond length is 2 16 ;
Speed: = INTEGER (0.. 8191), speed length is 2 13 ;
Heading: = INTEGER (0.. 28800), and length of Heading is 2 15 ;
range _ b = INTEREGER (0.. 4095), and range _ b has a length of 2 12 ;
random _ b length is 2 12 The reason is that the input data length of SM3 algorithm is l, l<2 64 Random _ b length of 2 12 When the data length of MsgCount, DSecond, speed, heading and random _ b is added to 2 63 The range of variation is greatest.
During operation, msgCount, DSecond, speed and header in the BSM message and a random code random _ b issued by a key distribution mechanism during distribution are selected. And calculating by adding the weight parameter to generate an IV value. The calculation formula is as follows:
IV=α×MsgCount+β×DSecond+γ×Speed+δ×Heading+ε×random_b
wherein, alpha, beta, gamma, delta and epsilon are weight parameters, the weight parameters are provided by a key distribution mechanism along with a key, the weight parameters provided each time can be different from the last time, and the weight parameters are fixed or configurable; msgCount, DSecond, speed, and header are optional fields in the BSM message; and random _ m is a random code issued when the key distribution mechanism distributes the random code.
Further, the length is l (l)<2 64 ) The data is subjected to Hash encryption of an SM3 algorithm, the encrypted data is 256-bit data, and the 256-bit data mod is 128-bit and is used as an input IV value of modes such as OFB/CFB and the like in a later SM 4. The Hash encryption operation can disturb the variation range of the original data and change the data with unfixed bit length into the fixed length data.
3. The RSM selects four fields of MsgCount, DSeconD (defining millisecond time within 1 minute), speed and header, wherein the value ranges of the MsgCount, the DSecond, the Speed and the header are as follows:
MsgCount: = INTEREGER (0.. 127), and the MsgCount length is 2 7 ;
DSecond: = INTEGER (0.. 65535), and the DSecond length is 2 16 ;
Speed: = INTEGER (0.. 8191), speed length is 2 13 ;
Heading: = INTEGER (0.. 28800), and length of Heading is 2 15 ;
random _ rsm = INTEGER (0.. 4095), and random _ rsm has a length of 2 12 ;
random _ rsm length 2 12 The reason is that the input data length of SM3 algorithm is l, l<2 64 Random _ rsm length of 2 12 When the MsgCount, DSecond, speed, heading, random _ rsm data length are added to 2 63 The range of variation is greatest.
During operation, msgCount, DSeconnd, speed and header fields in the RSM message and a random code random _ RSM issued by a key distribution mechanism during distribution are selected, and the weight parameter is increased to perform operation to generate an IV value. The calculation formula is as follows:
IV=α×MsgCount+β×DSecond+γ×Speed+δ×Heading+ε×random_rs
the weighting parameters α, β, γ, δ, ε may be issued (fixed or configurable) by the key distribution authority with the key, each issue may be different from the last. MsgCount, DSecond, speed and header in the RSM message are all optional fields, and random _ RSM is data (data fixed or configurable) issued by a key generation mechanism. An IV value is generated through a predefined rule, and the calculation formula is as follows through Hash operation of an SM3 algorithm: IV = Hash (IV);
length l (l)<2 64 ) The data is subjected to Hash encryption of an SM3 algorithm, the encrypted data is 256-bit data, and the 256-bit data mod is 128-bit and is used as an input IV value of modes such as OFB/CFB and the like in a later SM 4. The Hash encryption operation can disturb the variation range of the original data and change the data with unfixed bit length into the fixed length data.
4. The RSI selects MsgCount, minuteOfTheYeast and random code random _ r issued during distribution of the key distribution mechanism, wherein the parameters of MsgCount, minuteOfTheYeast and random _ r are as follows:
MsgCount: = INTEREGER (0.. 127), and the MsgCount length is 2 7
MinuteOfTheYeast:: = INTEGER (0.. 527040), and has a length of 2 20
random_r::= INTEGER (0.. 68719476735), random _ r length 2 36
random _ r length is 2 36 The reason is that the SM3 algorithm input data has the length of l (l)<2 64 ) Random _ r length of 2 36 Then, the data length of MsgCount, minuteOfTheYear and random _ r is added to 2 63 The range of variation is greatest.
The OFB/CFB mode and the like under SM4 is a grouping algorithm, the grouping length is 128 bits, and the key length is 128 bits. The IV value is the same as the packet length and is 128 bits.
During operation, the MsgCount, minuteOfTheYear and the random code random _ r issued by the key distribution mechanism during distribution are selected from the RSI message. And generating and issuing random _ r along with the encryption key each time. The IV value calculation formula is as follows:
IV=α×MsgCount+β×MinuteOfTheYear+γ×random_r
the weighting parameters α, β, γ, δ may be issued (fixed or configurable) by the key distribution authority with the key, each issue may be different from the last. Wherein MsgCount in the RSI message is a mandatory field, minuteOfTheYear is an optional field, and random _ r is issued by the key generation mechanism (data fixed or configurable). An IV value is generated through a predefined rule, and the calculation formula is as follows through Hash operation of an SM3 algorithm: IV = Hash (IV);
length l (l)<2 64 ) The data is subjected to Hash encryption of an SM3 algorithm, the encrypted data is 256-bit data, and the 256-bit data mod is 128-bit and is used as an input IV value of modes such as OFB/CFB and the like in a later SM 4. The Hash encryption operation can disturb the variation range of the original data and change the data with unfixed bit length into the fixed length data.
It should be noted that the Hash Algorithm is not necessarily specified as SM3, and may also be an encryption Algorithm such as SHA (Secure Hash Algorithm), which is only an exemplary description and not limited thereto.
As shown in fig. 5, in the above scheme, when the OBU, RSU, VRU communicate via the PC5, a message set is generated, and data in the message set is divided into mandatory data (data in mandatory fields) and optional data (data in optional fields). When the PC5 generates an IV value by communication, the same IV value is generated by combining both transmitting and receiving ends according to data in a message set (for example, BSM, MAP, RSM, RSI, PSM messages) during OBU, RSU, VRU communication and a certain calculation rule, and the IV value is input to OFB/CFB mode or the like under SM4 as a random number to encrypt coordinate data in the message, in accordance with the data provided by the key generation mechanism. Thus, the distribution of the IV value and the encryption of the coordinate data can be completed without expanding the existing message set.
Second embodiment
As shown in fig. 6, a second embodiment of the present invention provides a processing method for coordinates in an internet of vehicles, which is applied to a second internet of vehicles device, including but not limited to: OBU, RSU, VRU. The method specifically comprises the following steps:
step 61: determining an initial vector IV according to a target message to be subjected to coordinate decryption processing;
in this step, the target message includes one of the following:
a basic security message BSM;
MAP message MAP;
a roadside safety message RSM;
roadside information RSI;
individual security message PSM.
The coordinates to be decrypted in the target message include: longitude, latitude, elevation information Elevation. For a specific example of the encoding of the coordinate information Position3D asn.1, reference may be made to the first embodiment, which is not described herein again.
Step 62: and using the IV and the key as input of a packet encryption algorithm to decrypt the encrypted coordinate data in the target message.
In the step, the IV value is assigned to a block encryption algorithm, and the IV value is matched with the secret key to finish the decryption of the coordinate.
In the above embodiment, the second car networking device serves as a receiving end, and after the target message is obtained, the initial vector IV can be determined according to the target message to be subjected to coordinate decryption processing; and using the IV and the key as input of a packet encryption algorithm to decrypt the encrypted coordinate data in the target message. Therefore, the coordinate data can be decrypted on the premise of not expanding the existing message set, and the problem that the IV value cannot be distributed is solved.
In an embodiment, before the step 61, the method further includes:
and receiving a target message, wherein the target message comprises the encrypted coordinate data.
In this step, the encrypted coordinate data in the target message includes: longitude, latitude, elevation information Elevation.
In an embodiment, the determining an initial vector IV according to a target message to be subjected to coordinate decryption processing includes:
determining the initial vector IV according to at least one of optional fields and optional fields in the target message; or alternatively
Determining the initial vector IV according to at least one of optional fields and optional fields in the target message and first data provided by a key distribution mechanism.
Specifically, the first data includes: a random code provided by the key distribution authority, and/or a weight parameter provided by the key distribution authority.
Illustratively, the IV may be calculated based on data in some of the mandatory fields in the target message, in conjunction with the weight parameter. Taking the MAP message as an example, selecting the MsgCount field in the MAP message to calculate the IV value, wherein the IV value calculation formula is as follows:
IV=(α×MsgCount)mod128;
taking the MAP message as an example, selecting MsgCount and NodeID in the MAP message to calculate the IV value, wherein the IV value calculation formula is as follows:
IV=(α×MsgCount+γ×NodeID)mod128;
wherein, msgCount and NodeID are necessary fields in the MAP message; α, γ are weight parameters, the weight parameters are provided by the key distribution mechanism along with the key, the weight parameter provided each time may be different from the last time, and the weight parameters are fixed or configurable.
Illustratively, the IV may be calculated based on data in some of the mandatory fields and some of the optional fields in the target message. Wherein if the data of the optional field is not present, the optional field is set to a predefined value (fixed or configurable). Taking the MAP message as an example, selecting MsgCount, minuteOfTheYear and NodeID in the MAP message, and calculating the IV value, wherein the IV value calculation formula is as follows:
IV=(MsgCount 3 +NodeID 4 +MinuteOfTheYear 2 )mod128;
wherein, msgCount and NodeID are necessary fields in the MAP message; minuteOfTheYear is an optional field in the MAP message. Note that if MinuteOfTheYear is not present in the MAP message, it is set to a predefined value (fixed or configured) at the time of calculation.
Illustratively, the IV may be calculated based on data in some of the fields of interest in the target message, in combination with a random code provided by the key distribution authority. Taking the MAP message as an example, the MsgCount, the NodeID and the random code issued when the key distribution mechanism distributes are selected from the MAP message, and the random code is generated and issued along with the encryption key each time. The IV value calculation formula is as follows:
IV=(MsgCount×NodeID×random_m)mod128;
wherein, msgCount and NodeID are the fields which are necessary to be selected in the MAP message; and the random _ m is a random code issued when the key distribution mechanism distributes the key.
Illustratively, the IV may be calculated based on data in some optional fields, data in some optional fields in the target message, in combination with a random code provided by the key distribution authority. If the optional data is not present, it is set to a predefined value (fixed or configurable). Taking the MAP message as an example, in the MAP selection message, the calculation formula of the IV values of MsgCount, nodeID, minuteOfTheYear is as follows:
IV=(2 56 ×MsgCount+2 36 ×MinuteOfTheYear+2 20 ×NodeID+
random_m)mod128;
wherein, msgCount and NodeID are the fields which are necessary to be selected in the MAP message; minuteOfTheYear is an optional field in the MAP message; and the random _ m is a random code issued when the key distribution mechanism distributes the key. If MinuteOfTheYeast is not present in the MAP message, it is set to a predefined value (fixed or configured) at the time of calculation.
Illustratively, the IV may be calculated based on data in some optional fields, data in some optional fields in the target message, in combination with a random code and weight parameters provided by the key distribution authority. Taking the MAP message as an example, in the MAP selection message, the calculation formula of the IV values of MsgCount, nodeID, minuteOfTheYear is as follows:
IV = (α × MsgCount + β × minuteofthemean + γ × NodeID + δ × random _ m) mod128; or,
the IV value calculation formula is as follows:
IV=(MsgCount α ×NodeID γ ×MinuteOfTheYear β ×random_m δ )mod128;
wherein, alpha, beta, gamma and delta are weight parameters, the weight parameters are provided by a key distribution mechanism along with a key, the weight parameters provided each time can be different from the last time, and the weight parameters are fixed or configurable; msgCount and NodeID are the fields which are necessary to be selected in the MAP message; minuteOfTheYear is an optional field in the MAP message; and the random _ m is a random code issued when the key distribution mechanism distributes the random code.
It should be noted that the above is only an exemplary description taking the MAP message as an example, the combination cases of the IV value calculation are not listed one by one, and the calculation formula is not limited to this, and the calculation rule may be set as required.
In one embodiment, the step 62 includes:
carrying out Hash encryption operation on the IV to obtain a processed value;
and using the processing value and the key as input of a packet encryption algorithm to decrypt the coordinate data.
In this embodiment, on the premise that the first car networking device performs the hash encryption operation on the IV value, the second car networking device also performs the hash encryption processing on the IV value to obtain the same IV value as the first car networking device, and then can complete the coordinate data decryption.
Third embodiment
As shown in fig. 7, an embodiment of the present invention provides a processing apparatus 700 for coordinates in an internet of vehicles, where the apparatus 700 is applied to a first internet of vehicles, and includes:
a first determining module 701, configured to determine an initial vector IV according to a target message to be subjected to coordinate encryption processing;
an encryption module 702, configured to encrypt the coordinate data in the target message using the IV and the key as inputs to a block encryption algorithm.
Optionally, the apparatus 700 further includes:
a sending module for sending the target message including the encrypted coordinate data.
Optionally, the first determining module 701 includes:
a first determining submodule, configured to determine the initial vector IV according to at least one of an optional field and a mandatory field in the target message; or alternatively
And the second determining submodule is used for determining the initial vector IV according to at least one of the optional field and the optional field in the target message and the first data provided by the key distribution mechanism.
Optionally, the first data includes: a random code provided by the key distribution authority, and/or a weight parameter provided by the key distribution authority.
Optionally, the encryption module 702 includes:
the first encryption submodule is used for carrying out Hash encryption processing on the IV and disturbing the sequence of the IV values to obtain a processed value;
and the second encryption submodule is used for taking the processing value and the key as the input of a block encryption algorithm and encrypting the coordinate data in the target message.
Optionally, the target message includes one of the following:
a basic security message BSM;
a MAP message MAP;
a roadside safety message RSM;
road side information RSI;
individual security message PSM.
The third embodiment of the present invention corresponds to the method of the first embodiment, and all the implementation means in the first embodiment are applied to the embodiment of the processing apparatus for coordinates in the internet of vehicles, and the same technical effects can be achieved.
Fourth embodiment
As shown in fig. 8, an apparatus 800 for processing coordinates in an internet of vehicles according to an embodiment of the present invention is applied to a second internet of vehicles, and the apparatus includes:
a second determining module 801, configured to determine an initial vector IV according to a target message to be subjected to coordinate decryption processing;
a decryption module 802, configured to use the IV and the key as input of a block encryption algorithm to decrypt the encrypted coordinate data in the target message.
Optionally, the apparatus 800 further includes:
and receiving a target message, wherein the target message comprises the encrypted coordinate data.
Optionally, the second determining module 801 includes:
a third determining submodule, configured to determine the initial vector IV according to at least one of an optional field and a mandatory field in the target message; or alternatively
And the fourth determining submodule is used for determining the initial vector IV according to at least one of the optional field and the optional field in the target message and the first data provided by the key distribution mechanism.
Optionally, the first data includes: a random code provided by the key distribution authority, and/or a weight parameter provided by the key distribution authority.
Optionally, the decryption module 802 includes:
the first decryption submodule is used for carrying out Hash encryption operation on the IV to obtain a processed value;
and the second decryption submodule is used for decrypting the coordinate data by taking the processing value and the key as the input of a block encryption algorithm.
Optionally, the target message includes one of the following:
a basic security message BSM;
a MAP message MAP;
a road side safety message RSM;
roadside information RSI;
individual security message PSM.
The processing apparatus 800 for coordinates in a car networking is an apparatus corresponding to the method in the second embodiment, and all implementation means in the method embodiment are applied to the embodiment of the processing apparatus for coordinates in a car networking, and the same technical effect can be achieved.
Fifth embodiment
In order to better achieve the above object, as shown in fig. 9, a fifth embodiment of the present invention further provides a vehicle networking device, specifically a first vehicle networking device, including:
a processor 900; and a memory 920 connected to the processor 900 through a bus interface, wherein the memory 920 is used for storing programs and data used by the processor 900 when executing operations, and the processor 900 calls and executes the programs and data stored in the memory 920.
Wherein, the transceiver 910 is connected with the bus interface, for receiving and transmitting data under the control of the processor 900; the processor 900 is used to read programs from the memory 920.
Specifically, the processor 900 is configured to determine an initial vector IV according to a target message to be subjected to coordinate encryption processing; encrypting the coordinate data in the target message using the IV and key as inputs to a block encryption algorithm.
In fig. 9, among other things, the bus architecture may include any number of interconnected buses and bridges, with one or more processors, represented by processor 900, and various circuits, represented by memory 920, being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 910 may be a number of elements, including a transmitter and a transceiver, providing a means for communicating with various other apparatus over a transmission medium. For different terminals, the user interface 930 may also be an interface capable of interfacing with a desired device, including but not limited to a keypad, display, speaker, microphone, joystick, etc. The processor 900 is responsible for managing the bus architecture and general processing, and the memory 920 may store data used by the processor 900 in performing operations.
Optionally, the transceiver 910 is configured to transmit the target message including the encrypted coordinate data.
Optionally, the processor 900 is specifically configured to determine the initial vector IV according to at least one of an optional field and a mandatory field in the target message; or alternatively
And determining the initial vector IV according to at least one of the optional field and the optional field in the target message and the first data provided by the key distribution mechanism.
Optionally, the first data includes: a random code provided by the key distribution authority, and/or a weight parameter provided by the key distribution authority.
Optionally, the processor 900 is further specifically configured to perform Hash encryption processing on the IV, and disturb the order of the IV values to obtain a processed value;
and encrypting the coordinate data in the target message by taking the processing value and the key as input of a packet encryption algorithm.
Optionally, the target message includes one of the following:
a basic security message BSM;
MAP message MAP;
a road side safety message RSM;
roadside information RSI;
individual security message PSM.
According to the scheme provided by the invention, the first vehicle networking equipment determines an initial vector IV according to a target message to be subjected to coordinate encryption processing; the IV and the secret key are used as the input of a block encryption algorithm to encrypt the coordinate data in the target message, and the second vehicle networking device is used as a receiving end and can also determine an initial vector IV according to the target message to be subjected to coordinate decryption processing; and using the IV and the key as input of a packet encryption algorithm to decrypt the encrypted coordinate data in the target message. Therefore, the encryption of the coordinate data can be realized on the premise of not expanding the existing message set, and the problem that the IV value distribution cannot be carried out is solved.
Fifth embodiment
In order to better achieve the above object, as shown in fig. 10, a fifth embodiment of the present invention further provides a vehicle networking device, specifically a second vehicle networking device, including:
a processor 1000; and a memory 1020 connected to the processor 1000 through a bus interface, wherein the memory 1020 is used for storing programs and data used by the processor 1000 when executing operations, and the processor 1000 calls and executes the programs and data stored in the memory 1020.
The transceiver 1010 is connected to the bus interface, and is configured to receive and transmit data under the control of the processor 1000; the processor 1000 is used to read programs in the memory 1020.
Specifically, the processor 1000 is configured to determine an initial vector IV according to a target message to be subjected to coordinate decryption processing;
and using the IV and the key as input of a block encryption algorithm to decrypt the encrypted coordinate data in the target message.
Where in fig. 10, the bus architecture may include any number of interconnected buses and bridges, with various circuits being linked together, particularly one or more processors represented by processor 1000 and memory represented by memory 1020. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 1010 may be a number of elements, including a transmitter and a transceiver, providing a means for communicating with various other apparatus over a transmission medium. For different terminals, the user interface 1030 may also be an interface capable of interfacing with a desired device, including but not limited to a keypad, display, speaker, microphone, joystick, etc. The processor 1000 is responsible for managing the bus architecture and general processing, and the memory 1020 may store data used by the processor 1000 in performing operations.
Optionally, the transceiver 1010 is configured to receive a target message, where the target message includes encrypted coordinate data.
Optionally, the processor 1000 is specifically configured to determine the initial vector IV according to at least one of an optional field and a mandatory field in the target message; or alternatively
Determining the initial vector IV according to at least one of optional fields and optional fields in the target message and first data provided by a key distribution mechanism.
Optionally, the first data includes: a random code provided by the key distribution authority, and/or a weight parameter provided by the key distribution authority.
Optionally, the processor 1000 is further specifically configured to perform a Hash encryption operation on the IV to obtain a processed value;
and using the processing value and the key as input of a packet encryption algorithm to decrypt the coordinate data.
Optionally, the target message includes one of the following:
a basic security message BSM;
MAP message MAP;
a road side safety message RSM;
roadside information RSI;
individual security message PSM.
According to the scheme provided by the invention, the second vehicle networking device serves as a receiving end, and an initial vector IV can be determined according to the target message to be subjected to coordinate decryption after the target message is obtained; and using the IV and the key as input of a block encryption algorithm to decrypt the encrypted coordinate data in the target message. Therefore, the coordinate data can be decrypted on the premise of not expanding the existing message set, and the problem that the IV value cannot be distributed is solved.
Those skilled in the art will understand that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a computer program instructing relevant hardware, where the computer program includes instructions for executing all or part of the steps of the above methods; and the computer program may be stored in a readable storage medium, which may be any form of storage medium.
In addition, the present invention provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of the method in the first embodiment or the second embodiment described above. And the same technical effect can be achieved, and in order to avoid repetition, the description is omitted here.
Furthermore, it is to be noted that in the device and method of the invention, it is obvious that the individual components or steps can be decomposed and/or recombined. These decompositions and/or recombinations are to be regarded as equivalents of the present invention. Also, the steps of performing the series of processes described above may naturally be performed chronologically in the order described, but need not necessarily be performed chronologically, and some steps may be performed in parallel or independently of each other. It will be understood by those skilled in the art that all or any of the steps or elements of the method and apparatus of the present invention may be implemented in any computing device (including processor, storage medium, etc.) or network of computing devices, in hardware, firmware, software, or any combination thereof, which can be implemented by those skilled in the art using their basic programming skills after reading the description of the present invention.
The object of the invention is thus also achieved by a program or a set of programs running on any computing device. The computing device may be a general purpose device as is well known. The object of the invention is thus also achieved solely by providing a program product comprising program code for implementing the method or the apparatus. That is, such a program product also constitutes the present invention, and a storage medium storing such a program product also constitutes the present invention. It is to be understood that such storage media can be any known storage media or any storage media developed in the future. It is further noted that in the apparatus and method of the present invention, it is apparent that each component or step can be decomposed and/or recombined. These decompositions and/or recombinations are to be regarded as equivalents of the present invention. Also, the steps of executing the series of processes described above may naturally be executed chronologically in the order described, but need not necessarily be executed chronologically. Some steps may be performed in parallel or independently of each other.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (16)
1. A processing method for coordinates in a vehicle networking system is applied to a first vehicle networking device, and the method comprises the following steps:
determining an initial vector IV according to a target message to be subjected to coordinate encryption processing;
encrypting the coordinate data in the target message using the IV and key as inputs to a block encryption algorithm.
2. The method for processing coordinates in internet of vehicles according to claim 1, wherein after encrypting the coordinate data in the target message using the IV and the key as input of a block encryption algorithm, the method further comprises:
transmitting the target message including the encrypted coordinate data.
3. The method for processing coordinates in the internet of vehicles according to claim 1, wherein the determining an initial vector IV according to the target message to be subjected to the coordinate encryption processing comprises:
determining the initial vector IV according to at least one of optional fields and optional fields in the target message; or
Determining the initial vector IV according to at least one of optional fields and optional fields in the target message and first data provided by a key distribution mechanism.
4. The method for processing coordinates in the internet of vehicles according to claim 3, wherein the first data comprises: a random code provided by the key distribution authority, and/or a weight parameter provided by the key distribution authority.
5. The method for processing coordinates in the internet of vehicles according to claim 1, wherein the encrypting the coordinate data in the target message by using the IV and the secret key as input of a block encryption algorithm comprises:
carrying out Hash encryption processing on the IV, and disturbing the sequence of the IV values to obtain a processed value;
and encrypting the coordinate data in the target message by taking the processing value and the key as input of a packet encryption algorithm.
6. The method for processing coordinates in the Internet of vehicles according to claim 1, wherein the target message comprises one of the following:
a basic security message BSM;
MAP message MAP;
a road side safety message RSM;
road side information RSI;
individual security message PSM.
7. A processing method for coordinates in a vehicle networking system is applied to a second vehicle networking device, and the method comprises the following steps:
determining an initial vector IV according to a target message to be subjected to coordinate decryption processing;
and using the IV and the key as input of a block encryption algorithm to decrypt the encrypted coordinate data in the target message.
8. The method for processing coordinates in the internet of vehicles according to claim 7, wherein before determining the initial vector IV according to the target message to be subjected to coordinate decryption, the method further comprises:
and receiving a target message, wherein the target message comprises the encrypted coordinate data.
9. The method for processing coordinates in the internet of vehicles according to claim 7, wherein the determining an initial vector IV according to the target message to be coordinate decrypted comprises:
determining the initial vector IV according to at least one of optional fields and optional fields in the target message; or
Determining the initial vector IV according to at least one of optional fields and optional fields in the target message and first data provided by a key distribution mechanism.
10. The method for processing coordinates in the internet of vehicles according to claim 9, wherein the first data comprises: a random code provided by the key distribution authority, and/or a weight parameter provided by the key distribution authority.
11. The method for processing coordinates in the internet of vehicles according to claim 7, wherein the decrypting the coordinate data by using the IV and the key as the input of the block encryption algorithm comprises:
carrying out Hash encryption operation on the IV to obtain a processed value;
and using the processing value and the key as input of a block encryption algorithm to decrypt the coordinate data.
12. The method for processing coordinates in the Internet of vehicles according to claim 7, wherein the target message comprises one of the following:
a basic security message BSM;
MAP message MAP;
a road side safety message RSM;
road side information RSI;
individual security message PSM.
13. A vehicle networking device comprising: transceiver, memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method for processing coordinates in a vehicle networking according to any of claims 1 to 12 when executing the computer program.
14. An apparatus for processing coordinates in a vehicle networking system, applied to a first vehicle networking device, the apparatus comprising:
the first determining module is used for determining an initial vector IV according to a target message to be subjected to coordinate encryption processing;
and the encryption module is used for taking the IV and the key as the input of a block encryption algorithm to encrypt the coordinate data in the target message.
15. A processing device for coordinates in a vehicle networking system is applied to a second vehicle networking device, and the device comprises:
the second determining module is used for determining an initial vector IV according to the target message to be subjected to coordinate decryption processing;
and the decryption module is used for taking the IV and the key as the input of a block encryption algorithm and decrypting the encrypted coordinate data in the target message.
16. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for processing coordinates in a vehicle networking according to any of claims 1 to 12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110802996.8A CN115623021A (en) | 2021-07-15 | 2021-07-15 | Processing method and device for coordinates in Internet of vehicles and Internet of vehicles equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110802996.8A CN115623021A (en) | 2021-07-15 | 2021-07-15 | Processing method and device for coordinates in Internet of vehicles and Internet of vehicles equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115623021A true CN115623021A (en) | 2023-01-17 |
Family
ID=84855200
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110802996.8A Pending CN115623021A (en) | 2021-07-15 | 2021-07-15 | Processing method and device for coordinates in Internet of vehicles and Internet of vehicles equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115623021A (en) |
-
2021
- 2021-07-15 CN CN202110802996.8A patent/CN115623021A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109995513B (en) | Low-delay quantum key mobile service method | |
EP0841770B1 (en) | Method for sending a secure message in a telecommunications system | |
CN101103586B (en) | Apparatus and method for ciphering/deciphering a signal in a communication system | |
CN110401527B (en) | Data encryption and decryption method and device and storage medium | |
CN101523796B (en) | Method and system for enhancing cryptographic capabilities of wireless device using broadcasted random noise | |
CN111465008B (en) | Initialization vector generation for performing encryption and authentication in wireless communication | |
CN101287277B (en) | Method and system for providing service to customer's terminal in wireless personal area network | |
CN103402198B (en) | A kind of method that radio communication terminal encryption parameter transmits | |
CN101170404B (en) | Method for secret key configuration based on specified group | |
EP2320691B1 (en) | Method for enhancing the security of the multicast or broadcast system | |
CN105407109A (en) | Data secure transmission method between Bluetooth devices | |
CN101980557B (en) | Method for generating random number in cognitive radio network and communication key generation method | |
KR20180096189A (en) | LPWA Module performing Encrypted Communication and method thereof | |
CN105847001A (en) | Device, system and method for digital microwave communication based on quantum encryption | |
CN114584969A (en) | Information processing method and device based on associated encryption | |
Cencioni et al. | A mechanism to enforce privacy in vehicle-to-infrastructure communication | |
CN114365522A (en) | Method and communication device for data security processing | |
CN115623021A (en) | Processing method and device for coordinates in Internet of vehicles and Internet of vehicles equipment | |
JP2007053612A (en) | Communication device and communication method | |
CN111404674A (en) | Method and equipment for generating and receiving session key | |
JP2000059352A (en) | Encryption communication system | |
CN115885496B (en) | Communication method and related device | |
JP2007507146A (en) | Data encryption method and apparatus | |
JP2951311B1 (en) | Mobile communication dynamic secure grouping communication method | |
CN215734303U (en) | Internet of things system and internet of things safety box |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |