CN115665744A - Internet of vehicles interaction method, device, equipment and medium - Google Patents

Internet of vehicles interaction method, device, equipment and medium Download PDF

Info

Publication number
CN115665744A
CN115665744A CN202211452688.8A CN202211452688A CN115665744A CN 115665744 A CN115665744 A CN 115665744A CN 202211452688 A CN202211452688 A CN 202211452688A CN 115665744 A CN115665744 A CN 115665744A
Authority
CN
China
Prior art keywords
current
vehicle
mounted terminal
edge cloud
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211452688.8A
Other languages
Chinese (zh)
Other versions
CN115665744B (en
Inventor
毕敏
石元兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Westone Information Industry Inc
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN202211452688.8A priority Critical patent/CN115665744B/en
Publication of CN115665744A publication Critical patent/CN115665744A/en
Application granted granted Critical
Publication of CN115665744B publication Critical patent/CN115665744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application discloses car networking interaction method, device, equipment and medium, which relate to the technical field of mobile communication and comprise the following steps: determining a current edge cloud by using the acquired current position information of the first vehicle-mounted terminal, and configuring current virtual combined resources corresponding to the current service to the current edge cloud based on the network load state and the current service of the first vehicle-mounted terminal; triggering the current edge cloud to start current authentication preparation corresponding to the current service, and routing the current service to the current edge cloud so as to perform first identity authentication on the first vehicle-mounted terminal by the current edge cloud; judging whether the first vehicle-mounted terminal passes the first identity authentication or not, and if so, starting interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service; and judging whether the current first vehicle-mounted terminal meets a preset condition, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal. By the method, safer service interaction is realized.

Description

Internet of vehicles interaction method, device, equipment and medium
Technical Field
The invention relates to the technical field of mobile communication, in particular to a vehicle networking interaction method, device, equipment and medium.
Background
With the continuous advance of intellectualization and networking, the car networking under the 'everything interconnection' enables the car not to be a traditional relatively independent closed system any more, and the communication networks between cars and people, between cars and cars, between cars and roads, between cars and clouds, between cars and equipment and the like form a V2X (Vehicle-to-electronics) system under the intelligent networking. By means of the Internet of vehicles and the intelligent connection information thereof, the traffic efficiency is improved, the energy is saved, the emission is reduced, and even the life and property safety of people is protected. However, various network threats such as cyber attacks, trojan viruses, personal privacy disclosure, etc. have targeted this internet newness. The intelligent networked automobile directly concerns life safety of common people and national social security, and the safety of the intelligent networked automobile is more important than that of the mobile internet. The vehicles generate intelligence through interconnection, and potential safety hazards such as information leakage or virus attack may be generated due to the fact that fake nodes are accessed in the interconnection process. Therefore, the network element security credibility is the first step of security protection under the network topology dynamic change and multi-application-domain interaction scene of the internet of vehicles.
Each network element participating in the internet of vehicles is assigned an identity certificate, so in the prior art, different network elements need to perform identity authentication before performing first interaction, and if the identity certificate is not damaged, the period of the identity certificate runs through the whole using process, so that once the identity certificate is illegally cracked, the reliability of the identity certificate is greatly reduced.
In summary, how to improve the safety and reliability of the car networking interaction is a problem to be solved in the field.
Disclosure of Invention
In view of this, the present invention provides a method, an apparatus, a device and a medium for vehicle networking interaction, which can improve the safety and reliability of the vehicle networking interaction. The specific scheme is as follows:
in a first aspect, the application discloses a vehicle networking interaction method, which includes:
determining a current edge cloud by using the acquired current position information of the first vehicle-mounted terminal, and configuring a current virtual combined resource corresponding to a current service to the current edge cloud based on a network load state and the current service of the first vehicle-mounted terminal;
triggering the current edge cloud to start current authentication preparation corresponding to the current service, and routing the current service to the current edge cloud so that the current edge cloud can perform first identity authentication on the first vehicle-mounted terminal;
judging whether the first vehicle-mounted terminal passes the first identity authentication or not, and if so, starting interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service;
and judging whether the current first vehicle-mounted terminal meets a preset condition, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal.
Optionally, before determining the current edge cloud by using the obtained current location information of the first vehicle-mounted terminal, the method further includes:
and after the first vehicle-mounted terminal is started, initiating a network access request to a home network through the first vehicle-mounted terminal so that the home network can perform second identity authentication on the first vehicle-mounted terminal, and if the first vehicle-mounted terminal is judged to pass the second identity authentication, allowing the first vehicle-mounted terminal to access the home network.
Optionally, the determining, by using the obtained current location information of the first vehicle-mounted terminal, a current edge cloud, and configuring, based on a network load state and a current service of the first vehicle-mounted terminal, a current virtual combined resource corresponding to the current service to the current edge cloud includes:
acquiring a current target area corresponding to current position information of a first vehicle-mounted terminal and current network signal quality corresponding to the current position information, and determining a current edge cloud based on the current target area and the current network signal quality;
determining a current type of a current service of the first vehicle-mounted terminal, and configuring a current virtual combined resource corresponding to the current service to the current edge cloud based on a network load state and the current type of the current service.
Optionally, the determining whether the current first vehicle-mounted terminal meets a preset condition, and if yes, skipping to the step of determining the current edge cloud by using the obtained current position information of the first vehicle-mounted terminal again includes:
and judging whether the position of the current first vehicle-mounted terminal is located in a new position area, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal.
Optionally, the determining whether the current first vehicle-mounted terminal meets a preset condition, and if so, skipping to the step of determining the current edge cloud by using the obtained current position information of the first vehicle-mounted terminal again includes:
and judging whether the current service of the current first vehicle-mounted terminal is changed or not, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal.
Optionally, the car networking interaction method further includes:
when the first vehicle-mounted terminal detects a data interaction request initiated by a second vehicle-mounted terminal, the first vehicle-mounted terminal authenticates the identity of the second vehicle-mounted terminal;
and if the second vehicle-mounted terminal passes the identity authentication, performing corresponding data interaction with the second vehicle-mounted terminal through the first vehicle-mounted terminal.
Optionally, in the process of starting the interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service if the current service passes, the method further includes:
encrypting first interactive data based on a preset encryption algorithm corresponding to the current service through the first vehicle-mounted terminal to obtain encrypted first interactive data, and transmitting the encrypted first interactive data to the current edge cloud;
and encrypting second interactive data based on the preset encryption algorithm through the current edge cloud to obtain encrypted second interactive data, and transmitting the encrypted second interactive data to the first vehicle-mounted terminal.
In a second aspect, the application discloses a car networking interactive device includes:
the first resource configuration module is used for determining a current edge cloud by using the acquired current position information of the first vehicle-mounted terminal, and configuring current virtual combined resources corresponding to the current service to the current edge cloud based on a network load state and the current service of the first vehicle-mounted terminal;
the identity authentication module is used for triggering the current edge cloud to start current authentication preparation corresponding to the current service and routing the current service to the current edge cloud so that the current edge cloud can perform first identity authentication on the first vehicle-mounted terminal;
the interaction module is used for judging whether the first vehicle-mounted terminal passes the first identity authentication or not, and if the first vehicle-mounted terminal passes the first identity authentication, starting interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service;
and the judging module is used for judging whether the current first vehicle-mounted terminal meets a preset condition or not, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal.
In a third aspect, the present application discloses an electronic device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of the car networking interaction method disclosed in the foregoing.
In a fourth aspect, the present application discloses a computer readable storage medium for storing a computer program; wherein the computer program when executed by a processor implements the steps of the car networking interaction method disclosed in the foregoing.
The beneficial effect of this application does: firstly, determining a current edge cloud by using the acquired current position information of a first vehicle-mounted terminal, and configuring current virtual combined resources corresponding to a current service to the current edge cloud based on a network load state and the current service of the first vehicle-mounted terminal; triggering the current edge cloud to start current authentication preparation corresponding to the current service, and routing the current service to the current edge cloud so that the current edge cloud can perform first identity authentication on the first vehicle-mounted terminal; judging whether the first vehicle-mounted terminal passes the first identity authentication or not, and if so, starting interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service; and judging whether the current first vehicle-mounted terminal meets a preset condition, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal. Therefore, the current edge cloud is determined based on the current position information of the first vehicle-mounted terminal, so that the network is more stable during subsequent service interaction; when the first vehicle-mounted terminal meets the preset condition, the current edge cloud needs to be determined again based on the current position information, and the step of performing first identity authentication on the first vehicle-mounted terminal and the current edge cloud needs to be performed again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flowchart of a vehicle networking interaction method disclosed herein;
fig. 2 is a schematic diagram of a specific cloud-edge cooperative authentication system disclosed in the present application;
FIG. 3 is a flowchart of a specific Internet of vehicles interaction method disclosed herein;
FIG. 4 is a flowchart of a specific Internet of vehicles interaction method disclosed herein;
FIG. 5 is a schematic structural diagram of an Internet of vehicles interaction device disclosed in the present application;
fig. 6 is a block diagram of an electronic device disclosed in the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present invention, and not all embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Each network element participating in the internet of vehicles is assigned an identity certificate, so in the prior art, different network elements need to perform identity authentication before performing first interaction, and if the identity certificate is not damaged, the period of the identity certificate runs through the whole using process, so that once the identity certificate is illegally cracked, the reliability of the identity certificate is greatly reduced.
Therefore, the application correspondingly provides a car networking interaction scheme, and the safety and reliability of car networking interaction can be improved.
Referring to fig. 1, the embodiment of the application discloses a car networking interaction method, which comprises the following steps:
step S11: determining a current edge cloud by using the acquired current position information of the first vehicle-mounted terminal, and configuring current virtual combined resources corresponding to the current service to the current edge cloud based on a network load state and the current service of the first vehicle-mounted terminal.
In this embodiment, before determining the current edge cloud by using the obtained current location information of the first vehicle-mounted terminal, the method further includes: and after the first vehicle-mounted terminal is started, initiating a network access request to a home network through the first vehicle-mounted terminal so that the home network can perform second identity authentication on the first vehicle-mounted terminal, and if the first vehicle-mounted terminal is judged to pass the second identity authentication, allowing the first vehicle-mounted terminal to access the home network. It should be noted that the first vehicle-mounted terminal has both a mobile communication connection function and a function of connecting with other vehicle-mounted terminals in a near field, and the first vehicle-mounted terminal is started up, and only the home network stores the identity information of the authorized terminal, so that the terminal identity can be authenticated, and the vehicle-mounted terminal is subjected to access judgment, so that the security anchor point at this time is in the home network, and a network access request needs to be initiated to the home network. Although the distance from the home network to the first vehicle-mounted terminal may be very long, the service is not established at this time, and therefore the service delay problem does not need to be considered.
Step S12: and triggering the current edge cloud to start current authentication preparation corresponding to the current service, and routing the current service to the current edge cloud so that the current edge cloud can perform first identity authentication on the first vehicle-mounted terminal.
In the embodiment, if the IP address of the current edge cloud is detected to be different from the IP address of the last edge cloud or different services are processed, a repositioning command is triggered, the first vehicle-mounted terminal analyzes the safety requirement of the service to be performed by the current edge cloud according to the repositioning command and analyzes whether the first vehicle-mounted terminal can support the safety requirement, and if the first vehicle-mounted terminal supports the safety requirement, identity authentication based on the current edge cloud is initiated; if the first vehicle-mounted terminal does not initiate any access authentication action, the vehicle networking service interaction fails, the related network link is released, and a new current edge cloud is determined again, if each edge cloud is not suitable for performing the current service interaction with the first vehicle-mounted terminal, for example, a cloud-edge collaborative authentication system schematic diagram shown in fig. 2, the current virtual combination resource of the current service can also be distributed to a center cloud, so that the center cloud performs identity authentication with the first vehicle-mounted terminal, and when the current service interaction is performed after the identity authentication is passed, the first vehicle-mounted terminal mainly uses Software SDK (Software Development Kit) and a password chip to realize the identity encryption or decryption of the first vehicle-mounted terminal, the password application faces a single user, and the operation throughput is small; the edge cloud is a near-field convergence interface of data, the password authentication operation faces to multi-user and near-field application, the throughput is high, and the password authentication operation is realized by a password machine; the method is characterized in that a large number of applications and users are gathered at the far-field center cloud end, and cross-domain operation often occurs, so that the throughput of the identity authentication and authorization system based on the password is higher, the flow is more complex, the efficiency needs to be improved based on a micro-architecture mode, and the authentication is completed by adopting a password service platform.
Step S13: and judging whether the first vehicle-mounted terminal passes the first identity authentication or not, and if so, starting interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service.
In this embodiment, the method further includes: when the first vehicle-mounted terminal detects a data interaction request initiated by a second vehicle-mounted terminal, the first vehicle-mounted terminal authenticates the identity of the second vehicle-mounted terminal; and if the second vehicle-mounted terminal passes the identity authentication, performing corresponding data interaction with the second vehicle-mounted terminal through the first vehicle-mounted terminal. It should be noted that the second vehicle-mounted terminal does not have a mobile Communication link function, but has a function of connecting with other vehicle-mounted terminals in the near field, and the second vehicle-mounted terminal is close to the first vehicle-mounted terminal already residing in the mobile Communication network, and establishes a D2D Communication (Device to Device Communication) link with the first vehicle-mounted terminal through near field Communication between the first vehicle-mounted terminals to obtain related resources of the first vehicle-mounted terminal. It can be understood that, with different service states and mobile attributes of the first vehicle-mounted terminal, the identity authentication node of the internet of vehicles can be at the first vehicle-mounted terminal, the edge cloud node and the center cloud node, and an authentication method and system for vehicle-side-cloud authentication, safety and network combined arrangement and unified allocation under a set of high-speed mobile scenes are formed.
Step S14: and judging whether the current first vehicle-mounted terminal meets a preset condition, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal.
In this embodiment, whether the current first vehicle-mounted terminal meets the preset condition is judged, and it can be understood that the position information of the first vehicle-mounted terminal may also change along with the change of time, so that the position information of the first vehicle-mounted terminal is constantly monitored, an edge cloud performing vehicle networking service interaction with the first vehicle-mounted terminal is determined according to the position information of the first vehicle-mounted terminal, if the IP addresses of the current edge cloud and the next edge cloud are different, it is indicated that the edge cloud performing vehicle networking service interaction is changed, and then the next edge cloud and the first vehicle-mounted terminal need to perform identity authentication again; it should be noted that each vehicle network service has a corresponding number, if the IP addresses of the current edge cloud and the next edge cloud are the same, that is, the edge cloud performing the vehicle network service interaction is not replaced, but if the number of the current service is different from the number of the next service, it is indicated that a new service interaction is required, and then the current edge cloud and the first vehicle-mounted terminal also need to perform the identity authentication again. Therefore, it can be understood that when a new edge cloud is replaced or a new service is replaced, each network element needs to restart the identity authentication with the first vehicle-mounted terminal, and the history authorized identity cannot bear the new service interaction any more.
As can be seen, the method includes the steps that a current edge cloud is determined by means of acquired current position information of a first vehicle-mounted terminal, and current virtual combined resources corresponding to a current service are configured to the current edge cloud based on a network load state and the current service of the first vehicle-mounted terminal; triggering the current edge cloud to start current authentication preparation corresponding to the current service, and routing the current service to the current edge cloud so that the current edge cloud can perform first identity authentication on the first vehicle-mounted terminal; judging whether the first vehicle-mounted terminal passes the first identity authentication or not, and if so, starting interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service; and judging whether the current first vehicle-mounted terminal meets a preset condition, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal. Therefore, the current edge cloud is determined based on the current position information of the first vehicle-mounted terminal, so that the network is more stable during subsequent service interaction; when the first vehicle-mounted terminal meets the preset condition, the current edge cloud needs to be determined again based on the current position information, and the step of performing first identity authentication on the first vehicle-mounted terminal and the current edge cloud needs to be performed again.
Referring to fig. 3, the embodiment of the application discloses a specific car networking interaction method, which comprises the following steps:
step S21: determining a current edge cloud by using the acquired current position information of the first vehicle-mounted terminal, and configuring current virtual combined resources corresponding to the current service to the current edge cloud based on a network load state and the current service of the first vehicle-mounted terminal.
In this embodiment, the determining a current edge cloud by using the obtained current location information of the first vehicle-mounted terminal, and configuring, based on a network load state and a current service of the first vehicle-mounted terminal, a current virtual combined resource corresponding to the current service to the current edge cloud specifically includes: acquiring a current target area corresponding to current position information of a first vehicle-mounted terminal and current network signal quality corresponding to the current position information, and determining a current edge cloud based on the current target area and the current network signal quality; determining a current type of a current service of the first vehicle-mounted terminal, and configuring a current virtual combined resource corresponding to the current service to the current edge cloud based on a network load state and the current type of the current service. The first vehicle-mounted terminal judges whether the IP address of the next edge cloud is the same as the IP address of the current edge cloud or not, if the IP addresses are different, the new edge cloud is replaced to carry out vehicle networking service interaction, namely the virtual combined resource of the bearing service changes, and therefore the corresponding virtual combined resource is distributed to the next edge cloud again.
Step S22: and triggering the current edge cloud to start current authentication preparation corresponding to the current service, and routing the current service to the current edge cloud so that the current edge cloud can conveniently perform first identity authentication on the first vehicle-mounted terminal.
For more specific working process of the step S22, reference may be made to corresponding contents disclosed in the foregoing embodiments, and details are not repeated here.
Step S23: and judging whether the first vehicle-mounted terminal passes the first identity authentication or not, and if so, starting interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service.
In this embodiment, it can be understood that the authentication system performs security classification and authorization on a terminal, a network element, an application, and the like that are added to a network, and only the terminal, the network element, and the application whose security levels belong to the same level can form a sub-logic network of the application, and mutually interact to access and jointly undertake to complete a certain sub-service flow. Further, under the security authentication system architecture in the present application, the inter-network element communication is performed by performing identity authentication first, and the inter-network elements cannot interact unless the authentication is passed, and the inter-network elements of the same security level can communicate with each other, so that even if the network elements are allocated with corresponding virtual combined resources, the authentication system cannot authorize if the security levels are not compliant. It should be noted that the authorization of the authentication system has a life cycle management function, the life cycle corresponds to a certain virtual entity of a certain network element, when the network element authentication is started through the authorization management, and when the network element is cancelled, the authorization is invalid.
Step S24: and judging whether the current position of the first vehicle-mounted terminal is in a new position area, and if so, skipping to the step of determining the current edge cloud by using the obtained current position information of the first vehicle-mounted terminal.
In this embodiment, whether the current position of the first vehicle-mounted terminal is located in a new position area is determined, that is, the current position information of the first vehicle-mounted terminal is monitored in real time, and if the current position information of the current first vehicle-mounted terminal is located in the new position area, the step of determining the current edge cloud needs to be executed again.
Therefore, the identity authentication is firstly carried out between the vehicle and different clouds, service communication can be carried out only after the identity authentication is passed, interaction safety is improved, and when the position of the first vehicle-mounted terminal is located in a new position area, the current edge cloud is determined again, so that a communication network is more stable.
Referring to fig. 4, an embodiment of the present application discloses a specific car networking interaction method, including:
step S31: determining a current edge cloud by using the acquired current position information of the first vehicle-mounted terminal, and configuring current virtual combined resources corresponding to the current service to the current edge cloud based on a network load state and the current service of the first vehicle-mounted terminal.
Step S32: and triggering the current edge cloud to start current authentication preparation corresponding to the current service, and routing the current service to the current edge cloud so that the current edge cloud can perform first identity authentication on the first vehicle-mounted terminal.
Step S33: and judging whether the first vehicle-mounted terminal passes the first identity authentication or not, and if so, starting interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service.
In this embodiment, in the process of starting the interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service if the current service passes, the method further includes: encrypting first interactive data based on a preset encryption algorithm corresponding to the current service through the first vehicle-mounted terminal to obtain encrypted first interactive data, and transmitting the encrypted first interactive data to the current edge cloud; and encrypting second interactive data based on the preset encryption algorithm through the current edge cloud to obtain encrypted second interactive data, and transmitting the encrypted second interactive data to the first vehicle-mounted terminal. The application can support the 5G Network diversified Internet of vehicles application scene of SDN (Software Defined Network, namely Software Defined Network) or VNF (Virtual Network Architecture, namely Virtual Network Architecture), improves the authentication efficiency, and meets the differentiated application requirements.
Step S34: and judging whether the current service of the current first vehicle-mounted terminal is changed or not, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal.
In this embodiment, if the current first vehicle-mounted terminal changes the car networking service, or when the current edge cloud is required to execute a new service, the first vehicle-mounted terminal and the current edge cloud are required to perform identity authentication again, and interaction can be performed only through the identity authentication.
For more specific working processes of the steps S31 and S32, reference may be made to corresponding contents disclosed in the foregoing embodiments, and details are not repeated here.
Therefore, before service interaction is executed, if the service is changed, identity authentication needs to be carried out again, and therefore the identity authentication can be guaranteed to be updated timely and cannot be tracked, and the safety of service interaction of the Internet of vehicles is improved.
Referring to fig. 5, an embodiment of the present application discloses an internet of vehicles interaction device, including:
the first resource configuration module 11 is configured to determine a current edge cloud by using the obtained current location information of the first vehicle-mounted terminal, and configure, based on a network load state and a current service of the first vehicle-mounted terminal, a current virtual combined resource corresponding to the current service to the current edge cloud;
the identity authentication module 12 is configured to trigger the current edge cloud to start a current authentication preparation corresponding to the current service, and route the current service to the current edge cloud, so that the current edge cloud performs a first identity authentication on the first vehicle-mounted terminal;
the interaction module 13 is configured to determine whether the first vehicle-mounted terminal passes the first identity authentication, and if the first vehicle-mounted terminal passes the first identity authentication, start interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service;
the judging module 14 is configured to judge whether the current first vehicle-mounted terminal meets a preset condition, and if yes, skip to the step of determining the current edge cloud by using the obtained current position information of the first vehicle-mounted terminal.
As can be seen, the method includes the steps that a current edge cloud is determined by means of acquired current position information of a first vehicle-mounted terminal, and current virtual combined resources corresponding to a current service are configured to the current edge cloud based on a network load state and the current service of the first vehicle-mounted terminal; triggering the current edge cloud to start current authentication preparation corresponding to the current service, and routing the current service to the current edge cloud so that the current edge cloud can perform first identity authentication on the first vehicle-mounted terminal; judging whether the first vehicle-mounted terminal passes the first identity authentication or not, and if so, starting interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service; and judging whether the current first vehicle-mounted terminal meets a preset condition, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal. Therefore, the current edge cloud is determined based on the current position information of the first vehicle-mounted terminal, so that the network is more stable during subsequent service interaction; when the first vehicle-mounted terminal meets the preset condition, the current edge cloud needs to be determined again based on the current position information, and the step of performing first identity authentication on the first vehicle-mounted terminal and the current edge cloud needs to be performed again.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application. The method specifically comprises the following steps: at least one processor 21, at least one memory 22, a power supply 23, a communication interface 24, an input output interface 25, and a communication bus 26. The memory 22 is used for storing a computer program, and the computer program is loaded and executed by the processor 21 to implement the relevant steps in the car networking interaction method executed by an electronic device disclosed in any of the foregoing embodiments.
In this embodiment, the power supply 23 is configured to provide a working voltage for each hardware device on the electronic device; the communication interface 24 can create a data transmission channel between the electronic device and an external device, and a communication protocol followed by the communication interface is any communication protocol applicable to the technical solution of the present application, and is not specifically limited herein; the input/output interface 25 is configured to obtain external input data or output data to the outside, and a specific interface type thereof may be selected according to specific application requirements, which is not specifically limited herein.
The processor 21 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 21 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 21 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 21 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, the processor 21 may further include an AI (Artificial Intelligence) processor for processing a calculation operation related to machine learning.
In addition, the storage 22 is used as a carrier for storing resources, and may be a read-only memory, a random access memory, a magnetic disk or an optical disk, etc., the resources stored thereon include an operating system 221, a computer program 222, data 223, etc., and the storage may be a transient storage or a permanent storage.
The operating system 221 is used for managing and controlling hardware devices and computer programs 222 on the electronic device, so as to implement operations and processing of the mass data 223 in the memory 22 by the processor 21, and may be Windows, unix, linux, or the like. The computer program 222 may further include a computer program that can be used to perform other specific tasks in addition to the computer program that can be used to perform the car networking interaction method performed by the electronic device disclosed in any of the foregoing embodiments. The data 223 may include data received by the electronic device and transmitted from an external device, or may include data collected by the input/output interface 25 itself.
Further, an embodiment of the present application further discloses a computer-readable storage medium, where a computer program is stored in the storage medium, and when the computer program is loaded and executed by a processor, the method steps executed in the car networking interaction process disclosed in any of the foregoing embodiments are implemented.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
The car networking interaction method, device, equipment and medium provided by the invention are introduced in detail, specific examples are applied in the description to explain the principle and the implementation mode of the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A car networking interaction method is characterized by comprising the following steps:
determining a current edge cloud by using the acquired current position information of the first vehicle-mounted terminal, and configuring current virtual combined resources corresponding to the current service to the current edge cloud based on a network load state and the current service of the first vehicle-mounted terminal;
triggering the current edge cloud to start current authentication preparation corresponding to the current service, and routing the current service to the current edge cloud so that the current edge cloud can perform first identity authentication on the first vehicle-mounted terminal;
judging whether the first vehicle-mounted terminal passes the first identity authentication or not, and if so, starting interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service;
and judging whether the current first vehicle-mounted terminal meets a preset condition, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal.
2. The vehicle networking interaction method according to claim 1, wherein before determining the current edge cloud by using the acquired current location information of the first vehicle-mounted terminal, the method further comprises:
and after the first vehicle-mounted terminal is started, initiating a network access request to a home network through the first vehicle-mounted terminal so that the home network can perform second identity authentication on the first vehicle-mounted terminal, and if the first vehicle-mounted terminal is judged to pass the second identity authentication, allowing the first vehicle-mounted terminal to access the home network.
3. The vehicle networking interaction method according to claim 1, wherein the determining a current edge cloud by using the acquired current location information of the first vehicle-mounted terminal, and configuring a current virtual combined resource corresponding to a current service to the current edge cloud based on a network load state and the current service of the first vehicle-mounted terminal comprises:
acquiring a current target area corresponding to current position information of a first vehicle-mounted terminal and current network signal quality corresponding to the current position information, and determining a current edge cloud based on the current target area and the current network signal quality;
determining a current type of a current service of the first vehicle-mounted terminal, and configuring a current virtual combined resource corresponding to the current service to the current edge cloud based on a network load state and the current type of the current service.
4. The vehicle networking interaction method according to claim 1, wherein the step of judging whether the current first vehicle-mounted terminal meets a preset condition or not, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal again comprises the steps of:
and judging whether the current position of the first vehicle-mounted terminal is in a new position area, and if so, skipping to the step of determining the current edge cloud by using the obtained current position information of the first vehicle-mounted terminal.
5. The vehicle networking interaction method according to claim 1, wherein the step of judging whether the current first vehicle-mounted terminal meets a preset condition or not, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal again comprises the steps of:
and judging whether the current service of the current first vehicle-mounted terminal is changed or not, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal.
6. The internet-of-vehicles interaction method of claim 1, further comprising:
when the first vehicle-mounted terminal detects a data interaction request initiated by a second vehicle-mounted terminal, the first vehicle-mounted terminal authenticates the identity of the second vehicle-mounted terminal;
and if the second vehicle-mounted terminal passes the identity authentication, performing corresponding data interaction with the second vehicle-mounted terminal through the first vehicle-mounted terminal.
7. The Internet of vehicles interaction method of any one of claims 1 to 6, wherein the process of opening the interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service through the pass further comprises:
encrypting first interactive data based on a preset encryption algorithm corresponding to the current service through the first vehicle-mounted terminal to obtain encrypted first interactive data, and transmitting the encrypted first interactive data to the current edge cloud;
and encrypting second interactive data based on the preset encryption algorithm through the current edge cloud to obtain encrypted second interactive data, and transmitting the encrypted second interactive data to the first vehicle-mounted terminal.
8. An internet of vehicles interaction device, comprising:
the first resource configuration module is used for determining a current edge cloud by using the acquired current position information of the first vehicle-mounted terminal, and configuring current virtual combined resources corresponding to the current service to the current edge cloud based on a network load state and the current service of the first vehicle-mounted terminal;
the identity authentication module is used for triggering the current edge cloud to start current authentication preparation corresponding to the current service and routing the current service to the current edge cloud so that the current edge cloud can perform first identity authentication on the first vehicle-mounted terminal;
the interaction module is used for judging whether the first vehicle-mounted terminal passes the first identity authentication or not, and if the first vehicle-mounted terminal passes the first identity authentication, starting interaction between the first vehicle-mounted terminal and the current edge cloud based on the current service;
and the judging module is used for judging whether the current first vehicle-mounted terminal meets a preset condition or not, and if so, skipping to the step of determining the current edge cloud by using the acquired current position information of the first vehicle-mounted terminal.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of the car networking interaction method of any of claims 1 to 7.
10. A computer-readable storage medium for storing a computer program; wherein the computer program realizes the steps of the car networking interaction method according to any one of claims 1 to 7 when executed by a processor.
CN202211452688.8A 2022-11-21 2022-11-21 Internet of vehicles interaction method, device, equipment and medium Active CN115665744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211452688.8A CN115665744B (en) 2022-11-21 2022-11-21 Internet of vehicles interaction method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211452688.8A CN115665744B (en) 2022-11-21 2022-11-21 Internet of vehicles interaction method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN115665744A true CN115665744A (en) 2023-01-31
CN115665744B CN115665744B (en) 2023-05-23

Family

ID=85018718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211452688.8A Active CN115665744B (en) 2022-11-21 2022-11-21 Internet of vehicles interaction method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN115665744B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714421A (en) * 2018-12-28 2019-05-03 国汽(北京)智能网联汽车研究院有限公司 Intelligent network based on bus or train route collaboration joins automobilism system
CN110633144A (en) * 2019-08-23 2019-12-31 成都华为技术有限公司 Method and device for fusion management of edge cloud
US20210042160A1 (en) * 2019-04-05 2021-02-11 Mimik Technology Inc. Method and system for distributed edge cloud computing
CN113542201A (en) * 2020-04-20 2021-10-22 上海云盾信息技术有限公司 Access control method and device for Internet service
CN113839972A (en) * 2020-06-23 2021-12-24 中兴通讯股份有限公司 Load balancing method, device, equipment and storage medium
CN114257439A (en) * 2021-12-17 2022-03-29 中国联合网络通信集团有限公司 Service scheduling method, AAA server and service support system
CN114285900A (en) * 2021-12-09 2022-04-05 中国联合网络通信集团有限公司 Scheduling system, authentication method, scheduling method, apparatus, server, and medium
CN114513506A (en) * 2020-11-17 2022-05-17 中国联合网络通信集团有限公司 Service processing method, access edge cloud server and service processing system
CN114979243A (en) * 2021-02-24 2022-08-30 中国联合网络通信集团有限公司 Method and device for providing cloud terminal service

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714421A (en) * 2018-12-28 2019-05-03 国汽(北京)智能网联汽车研究院有限公司 Intelligent network based on bus or train route collaboration joins automobilism system
US20210042160A1 (en) * 2019-04-05 2021-02-11 Mimik Technology Inc. Method and system for distributed edge cloud computing
CN110633144A (en) * 2019-08-23 2019-12-31 成都华为技术有限公司 Method and device for fusion management of edge cloud
CN113542201A (en) * 2020-04-20 2021-10-22 上海云盾信息技术有限公司 Access control method and device for Internet service
CN113839972A (en) * 2020-06-23 2021-12-24 中兴通讯股份有限公司 Load balancing method, device, equipment and storage medium
CN114513506A (en) * 2020-11-17 2022-05-17 中国联合网络通信集团有限公司 Service processing method, access edge cloud server and service processing system
CN114979243A (en) * 2021-02-24 2022-08-30 中国联合网络通信集团有限公司 Method and device for providing cloud terminal service
CN114285900A (en) * 2021-12-09 2022-04-05 中国联合网络通信集团有限公司 Scheduling system, authentication method, scheduling method, apparatus, server, and medium
CN114257439A (en) * 2021-12-17 2022-03-29 中国联合网络通信集团有限公司 Service scheduling method, AAA server and service support system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHENG-YU CHENG等: "Attribute-Based Access Control for Vehicular Edge Cloud Computing" *
郄广;张岩;: "智能车与网联技术分析" *

Also Published As

Publication number Publication date
CN115665744B (en) 2023-05-23

Similar Documents

Publication Publication Date Title
Ferrazani Mattos et al. AuthFlow: authentication and access control mechanism for software defined networking
US8806608B2 (en) Authentication server and method for controlling mobile communication terminal access to virtual private network
US20150052595A1 (en) User, device, and app authentication implemented between a client device and vpn gateway
CN104335546A (en) Using neighbor discovery to create trust information for other applications
KR20150079740A (en) Hardware-based device authentication
CN109429272A (en) Shunt method and relevant device under a kind of roaming scence
KR20150074151A (en) Trusted container
CN103179560A (en) Revocable security system and method for wireless access points
CN109344628B (en) Method for managing trusted nodes in block chain network, nodes and storage medium
Conti et al. CENSOR: Cloud‐enabled secure IoT architecture over SDN paradigm
CN110933084B (en) Cross-domain shared login state method, device, terminal and storage medium
Aiash et al. A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR
Tomanek et al. Security and privacy of using AllJoyn IoT framework at home and beyond
Hallingstad et al. Protected core networking: an architectural approach to secure and flexible communications
Sah et al. A security management for cloud based applications and services with diameter-AAA
CN115665744B (en) Internet of vehicles interaction method, device, equipment and medium
Sahana et al. Secure authentication framework for sdn-iot network using keccak-256 and bliss-b algorithms
CN114726523B (en) Password application service system and quantum security capability open platform
KR102224454B1 (en) Method, apparatus, system and computer program for controlling network traffic
CN114884771B (en) Identity network construction method, device and system based on zero trust concept
CN115499177A (en) Cloud desktop access method, zero-trust gateway, cloud desktop client and server
Karthick et al. Formalization and analysis of a resource allocation security protocol for secure service migration
Sepczuk et al. Low-complexity access control scheme for MEC-based services
CN107295015B (en) Traffic signal machine communication method
CN109962831B (en) Virtual client terminal device, router, storage medium, and communication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant