CN116390084A - Pseudonym changing method based on neighbor density in Internet of vehicles environment - Google Patents
Pseudonym changing method based on neighbor density in Internet of vehicles environment Download PDFInfo
- Publication number
- CN116390084A CN116390084A CN202310366083.5A CN202310366083A CN116390084A CN 116390084 A CN116390084 A CN 116390084A CN 202310366083 A CN202310366083 A CN 202310366083A CN 116390084 A CN116390084 A CN 116390084A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- pseudonym
- density
- neighbor
- vehicles
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000006855 networking Effects 0.000 claims abstract description 8
- 238000012986 modification Methods 0.000 claims abstract description 6
- 230000004048 modification Effects 0.000 claims abstract description 6
- 235000016496 Panda oleosa Nutrition 0.000 claims description 22
- 240000000220 Panda oleosa Species 0.000 claims description 22
- 238000004364 calculation method Methods 0.000 claims description 10
- 238000012795 verification Methods 0.000 claims description 3
- 230000008859 change Effects 0.000 description 7
- 230000006854 communication Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000030279 gene silencing Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000003094 perturbing effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
- H04W12/64—Location-dependent; Proximity-dependent using geofenced areas
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Traffic Control Systems (AREA)
Abstract
The invention provides a vehicle networking position privacy protection method based on neighbor density, which comprises the following implementation steps: initializing a vehicle networking system; the central authority generates a key and a pseudonym for each vehicle and signs the pseudonym; judging the density of the neighbor area of each vehicle; vehicles exchange pseudonyms in high density areas; and acquiring a pseudonym modification result of the low-density area vehicle. According to the method, the area where the vehicle is located is divided into a high-density area and a low-density area according to the density of the neighbor area where the vehicle is located when the pseudonym is about to expire each time, different pseudonym updating strategies are formulated for the two areas, neglect of the prior art on privacy protection of the vehicle position in a non-hot-spot area is made up, the privacy of the vehicle position is effectively improved, the cost of pseudonym application and management is properly reduced in a high-density pseudonym exchange mode, the pseudonym confusion degree and unlinked performance are improved, and the vehicle position privacy protection capability of the system is further improved.
Description
Technical Field
The invention belongs to the field of privacy calculation, relates to a pseudonym changing method in an Internet of vehicles environment, and particularly relates to a pseudonym changing method based on neighbor density in an Internet of vehicles environment.
Background
The Internet of vehicles is an integrated network which is formed by the evolution of the traditional vehicle-mounted self-organizing network under the rapid development of the Internet of things and wireless communication technology and can realize intelligent traffic management, intelligent dynamic information service and intelligent control of vehicles. The internet of vehicles mainly completes communication between vehicles and infrastructure through a short-range wireless communication technology, and vehicles can periodically broadcast basic safety messages comprising important information such as identity, position and direction of the vehicles in the communication process. However, the broadcast form of the plaintext and the openness of the wireless communication channel become potential threats to vehicle privacy and security.
In order to solve the problem of location privacy disclosure in the internet of vehicles caused by the clear text broadcasting of basic security messages, corser et al in 2016 proposed a K-anonymity method that requires at least K records of the same quasi-identifier, making it impossible for an observer to connect the records through the quasi-identifier, aiming at perturbing the identity of the vehicle and thus protecting the location privacy. The pseudonym modification is based on the idea of K-anonymity, and K pseudonyms are given to each vehicle with only one true identity, and the K pseudonyms are not associated, so that the vehicle confuses the adversary by constantly replacing the pseudonyms, and cannot associate all the pseudonyms with the true identity of the vehicle and steal the privacy of the vehicle. The protection of the position privacy in the internet of vehicles based on the kana change is one of the most common solutions, but eavesdropping adversaries often link vehicles before and after the kana change through two common attack modes of semantic link and grammar link, and further steal the position information and other sensitive information in the internet of vehicles, so that the simple kana change mode is insufficient for resisting the link attack of the adversary, and still has limited applicable scenes, can only resist certain link attack or generate security problems and the like. In the process of protecting the privacy of the Internet of vehicles position based on the pseudonym change mode, how to realize the protection of the privacy of the Internet of vehicles position which can resist two link attacks simultaneously, contains more changed scenes, has higher safety and privacy, and is a problem to be solved urgently.
For example, patent application with application publication number CN 114222304A, entitled "a kana changing method based on silence and broadcasting period in a car networking environment", discloses a kana changing method based on silence period and broadcasting period, the main steps of the method are as follows: (1) Collecting previous vehicle track data, and screening longitude and latitude coordinates which stay at the same position for more than a certain time to obtain a stay point; (2) Respectively using a Mean Shift clustering method for the stay points of different categories, and obtaining a cluster according to the density of the stay points; (3) Obtaining a stay point area and deploying the area based on the average value of the stay point density; (4) The RSU applies a pseudonym set to the TA according to the number of the covered stay point areas, and each stay point area executes corresponding silence and broadcasting periods; (5) The RSU distributes pseudonyms for vehicles entering the stay point area and prescribes the life cycle of the vehicles, and all the vehicles entering the stay point area circularly use the pseudonyms of the stay point area pseudonym pool; (6) The vehicle is silent and the kana distributed by the RSU is replaced until the silence period is over, and the next kana in the own kana pool is replaced to continue running; and (7) the vehicle resumes normal broadcasting and running. The method has the following defects: the screened stay point areas are generally areas with density exceeding an average density value, namely, the vehicle density is large enough to enter the stay point areas and exchange the pseudonyms, privacy problems when the vehicle is exposed to a vehicle flow sparse area, namely, a low density area for a long time are not considered, in addition, the pseudonym set in the stay point areas is additionally applied to a trusted authority TA by an RSU and is recycled, a certain pseudonym application cost is generated, an attacker is easily caused to pay important attention to the stay point areas, the position of the vehicle is predicted by utilizing the front-back relation of the pseudonyms, and privacy protection performance of a scheme is weakened.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a pseudonym changing method based on neighbor density in an Internet of vehicles environment, which is used for solving the technical problem of weaker privacy protection capability in the prior art.
In order to achieve the above purpose, the technical scheme adopted by the invention comprises the following steps:
(1) Initializing an Internet of vehicles system:
the initialization includes a central authority CA, I vehicles v= { V 1 ,v 2 ,…,v i ,…v I M roadside units r= { R 1 ,r 2 ,…,r m ,…r M A car networking system; initializing each vehicle v i Submitting the authority CA with the true identity ID i Registration request of req { ID } i Time interval between two pseudonym changes isThe minimum settling time of the pseudonym is τ, R i Circular area D of radius i For vehicles v i Neighbor region D of (2) i The dynamic set of vehicle kana to be exchanged is the pre-exchange kana set +.>Density threshold ρ 0 Wherein I is greater than or equal to 2, M is greater than or equal to 2, v i Represents the ith vehicle, r m Representing the m-th roadside unit,
(2) The central authority generates a key and a pseudonym for each vehicle and signs the pseudonym:
the central authority CA passes each vehicle v i Registration request req { ID } i Pair v i After verification of the identity of (a), for each vehicle v i Generating public key PK i Private key SK i And the kana at the current timeAnd uses its own private key SK CA For kana->Signing to obtain a pseudonymous certificate +.>
(3) Judging the density of the neighbor areas of each vehicle:
each vehicle v i Pseudonyms used during drivingSatisfy->In this case, according to the route from the nearest road side unit r d Acquiring neighbor area at current moment->Number of vehicles in the vehicle>Calculation of v i Neighbor Density of->And judge->Whether or not it is true, if so, then->Is a high density region and will be pseudonymized +.>Put into the pre-exchange kana set +.>After that, step (4) is performed, otherwise, +.>Is a low density region and step (5) is performed, wherein d e M;
(4) Vehicles exchange pseudonyms in high density areas:
(4a) When collectingWhen the number of elements in the vehicle is greater than 1, each vehicle v with high neighbor density n Select->The pseudonym in->Vehicle v of (2) m The method comprises the steps of carrying out a first treatment on the surface of the Vehicle v n Using private key SK n For pseudonym certificate->Signing to obtain signature result sigma n ' and attached with a time stamp t n ' re-use vehicle v m Public key PK of (2) m Information->Encryption to generate message omega n ' concurrent send to v m Wherein n is not equal to m, and readyflag is a pre-exchange label;
(4b) Vehicle v m Using private key SK m Decrypting omega n ' get delta n ' public key PK is reused n Verifying signature sigma n 'A'; if v m Consent to vehicle v n Collaboration, v m Using private key SK m For pseudonym certificatesSigning to obtain signature result sigma m ' and attached with a time stamp t m ' then using the vehicle v n Public key PK of (2) n Information->Encryption to generate message omega m ' concurrent send to v n ;
(4c) Vehicle v n Using private key SK n Decrypting omega m ' get delta m ' public key PK is reused m Verifying signature sigma m ′;v n Using private key SK n For kanaAnd certificate->Signing to obtain signature result sigma n "and attached with a time stamp t n ", then use vehicle v m Public key PK of (2) m Information->Encryption is carried out to obtain a message omega n "and send to v m ;
(4d)v m Using private key SK m Decrypting omega n "get delta n "reuse of public key PK n Verifying signature sigma n ", and the obtained v n Is a pseudonym of (2)Changing the pseudonym into the pseudonym of the user; v m Using private key SK m For kana->And certificate->Signing to obtain signature result sigma m "and attached with a time stamp t m ", then use vehicle v n Public key PK of (2) n Information->Encryption is carried out to obtain a message omega m "and send to v n ;
(4e) Vehicle v n Using private key SK n Decrypting omega m "get delta m "reuse of public key PK n Verifying signature sigma m ", and the obtained v m Is a pseudonym of (2)Is changed into a pseudonym of the self and cooperates with the vehicle v m Meanwhile, a section of silence period epsilon is approached;
(5) Obtaining a pseudonym modification result of the low-density area vehicle:
(5a) Each vehicle v with low neighbor density h For random result x generated using SRNG random algorithm s+1 Performing modulo-two operation, judging whether the selection scheme number g obtained by the modulo-two operation meets g=0, and if yes, obtaining a pseudonymChanging to the pseudonym +.>Otherwise, executing the step (5 b);
(5b) Vehicle v h Generating random result x using SRNG random algorithm s+2 Then for the random result x s+2 Performing modulo three operation, adding one to obtain random silence period gamma, entering silence period with period gamma, and adding pseudonymChanging to the pseudonym +.>
Compared with the prior art, the invention has the following advantages:
1. according to the method, each vehicle divides the neighbor area into a high-density area and a low-density area according to the density of the neighbor area of each vehicle when the pseudonym is about to expire, in the high-density area, the vehicle selects opponents willing to cooperate to exchange the pseudonym with the vehicle, in the low-density area, the vehicle adopts a random algorithm to select to directly change the pseudonym at the next moment or change the pseudonym at the next moment after silencing for a period of time, and the pseudonym changing method based on the neighbor density avoids the influence of the long-term exposure of the vehicle to the vehicle flow sparse area on the privacy protection of the vehicle position in the prior art, and effectively improves the privacy of the vehicle position.
2. According to the invention, the pseudonyms are changed in a pseudonym exchange mode between vehicles in a high-density area, and unlike the method for applying a pseudonym pool for a stay point area by using an RSU in the prior art, the pseudonym exchange can reduce the cost of pseudonym application and management, meanwhile, the confusion degree and unlinkability of the pseudonyms are improved, and the position privacy protection capability of the Internet of vehicles is further improved.
Drawings
FIG. 1 is a flow chart of an implementation of the present invention.
Fig. 2 is a flow chart showing the high-density pseudonym exchange according to the present invention.
FIG. 3 is a flow chart of a low density random pseudonym modification in accordance with the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and the specific examples.
Referring to fig. 1, the present invention includes the steps of:
step 1) initializing an internet of vehicles system:
the initialization includes a central authority CA, I vehicles v= { V 1 ,v 2 ,…,v i ,…v I M roadside units r= { R 1 ,r 2 ,…,r m ,…r M A car networking system;initializing each vehicle v i Submitting the authority CA with the true identity ID i Registration request of req { ID } i Time interval between two pseudonym changes isThe minimum settling time of the pseudonym is τ, R i Circular area D of radius i For vehicles v i Neighbor region D of (2) i The dynamic set of vehicle kana to be exchanged is the pre-exchange kana set +.>Density threshold ρ 0 Wherein I is greater than or equal to 2, M is greater than or equal to 2, v i Represents the ith vehicle, r m Representing the m-th roadside unit,in this embodiment, i=100, m=5, τ=30, r i =50,ρ 0 =0.15。
Step 2) the central authority generates a key and a pseudonym for each vehicle and signs the pseudonym:
the central authority CA passes each vehicle v i Registration request req { ID } i Pair v i After verification of the identity of (a), for each vehicle v i Generating public key PK i Private key SK i And the kana at the current timeAnd uses its own private key SK CA For kana->Signing to obtain a pseudonymous certificate +.>
The present embodiment accomplishes registration of the vehicle based on the conventional public key infrastructure PKI technology described in the vehicle security standards IEEE1609.2 and ETSI 102941-v1.1.1,specifically, each vehicle v i Initially provided with a basic identifier ID distributed by the vehicle management sector i As a primary content of a vehicle registration with a CA, the CA generates a public key PK for the vehicle i Private key SK i PseudonymsAnd providing each pseudonym with a certificate comprising an asymmetric RSA signature +.>And then the information is encrypted by RSA and then sent to the vehicle. Before V2V communicates and sends a message, the vehicle passes the pseudonym +.>Corresponding private key SK i RSA digital signature is carried out on the message. In order to be able to verify the messages, each transmitted message is accompanied by the pseudonym +.>Corresponding certificate->The receiving vehicle must use the CA public key PK CA Check->Checking +.>Whether a valid pseudonym.
Step 3) judging the density of the neighbor areas of each vehicle:
each vehicle v i Pseudonyms used during drivingSatisfy->In this case, according to the route from the nearest road side unit r d Acquiring neighbor area at current moment->Number of vehicles in the vehicle>Calculation of v i Neighbor Density of->And judge->Whether or not it is true, if so, then->Is a high density region and will be pseudonymized +.>Put into the pre-exchange kana set +.>After that, step (4) is performed, otherwise, +.>Is a low density region and step (5) is performed, wherein d e M;
based on vehicle v i Neighbor density of (2)Dividing the areas, and further selecting a pseudonym changing scheme suitable for each area, wherein the design is suitable for not only scenes with larger vehicle density, but also the privacy protection of the vehicle position in the low-density scenes; in addition, according to the characteristic of dense vehicles in the high-density area, a set of willing to change kana is established +.>And select partner among them to carry out the pseudonym exchange, can reduce the application cost to the pseudonym, improve the pseudonym confusion degree simultaneously, and then improve the position privacy protection ability in high density region, according to the sparse characteristics of low density region vehicle, in step 5) vehicle self can use SRNG random algorithm to select one of two kinds of schemes to carry out, also can reach the effect that improves the pseudonym confusion degree, and then improve the position privacy protection ability in low density region.
Step 4) the vehicle exchanges pseudonyms in the high density area:
step 4 a) when collectingWhen the number of elements in the vehicle is greater than 1, each vehicle v with high neighbor density n Select->The pseudonym in->Vehicle v of (2) m The method comprises the steps of carrying out a first treatment on the surface of the Vehicle v n Using private key SK n For pseudonym certificate->Signing to obtain signature result sigma n ' and attached with a time stamp t n ' re-use vehicle v m Public key PK of (2) m Information->Encryption to generate message omega n ' concurrent send to v m Wherein n is not equal to m, and readyflag is a pre-exchange label;
in this step, not all are in the vehicle v i Vehicles in the neighborhood will be willing to exchange kana, thus using setsThe vehicles willing to exchange are preloaded, and the readyflag tag is attached to the communication message to ensure that both parties are in a handshake phase and prepare to exchange pseudonyms.
Step 4 b) vehicle v m Using private key SK m Decrypting omega n ' get delta n ' public key PK is reused n Verifying signature sigma n 'A'; if v m Consent to vehicle v n Collaboration, v m Using private key SK m For pseudonym certificatesSigning to obtain signature result sigma m ' and attached with a time stamp t m ' then using the vehicle v n Public key PK of (2) n Information->Encryption to generate message omega m ' concurrent send to v n ;
In this step, the vehicle v m Using private key SK m For certificatesRSA signature is performed with a timestamp t attached m ' for the receiver vehicle v n Can verify from sender v m Whether or not the certificate information of (a) is accurate, authentic, and not tampered with, but for information delta m ' RSA encryption is used to provide a secure communication channel for parties to cooperate against malicious adversaries eavesdropping on the message.
Step 4 c) vehicle v n Using private key SK n Decrypting omega m ' get delta m ' reuse of common peopleKey PK m Verifying signature sigma m ′;v n Using private key SK n For kanaAnd certificate->Signing to obtain signature result sigma n "and attached with a time stamp t n ", then use vehicle v m Public key PK of (2) m Information->Encryption is carried out to obtain a message omega n "and send to v m ;
In this step, step 4 b) vehicle v n Adopts the mode of firstly RSA digital signature and then RSA encryption to ensure the accuracy and safety of transmission information, and the final purpose of attaching a pseudonym is to the vehicle v i Take v j Is a pseudonym of (2)Vehicle v j Take v i Is->
Step 4 d) v m Using private key SK m Decrypting omega n "get delta n "reuse of public key PK n Verifying signature sigma n ", and the obtained v n Is a pseudonym of (2)Changing the pseudonym into the pseudonym of the user; v m Using private key SK m For kana->And certificate->Signing to obtain a signature resultσ m "and attached with a time stamp t m ", then use vehicle v n Public key PK of (2) n Information->Encryption is carried out to obtain a message omega m "and send to v n ;
Step 4 e) vehicle v n Using private key SK n Decrypting omega m "get delta m "reuse of public key PK n Verifying signature sigma m ", and the obtained v m Is a pseudonym of (2)Is changed into a pseudonym of the self and cooperates with the vehicle v m Meanwhile, a section of silence period epsilon is approached;
Step 5) obtaining a pseudonym modification result of the low-density area vehicle:
step 5 a) each vehicle v with a low neighbor density h For random result x generated using SRNG random algorithm s+1 Performing modulo-two operation, judging whether the selection scheme number g obtained by the modulo-two operation meets g=0, and if yes, obtaining a pseudonymChanging to the pseudonym +.>Otherwise, executing the step (5 b);
in this step, the result x is random s+1 And g, the calculation formulas are respectively as follows:
φ(x s )→x s+1
g=x s+1 mod2
wherein phi (·) is x as a result function of the SRNG algorithm s Is a secure random seed automatically generated by the SRNG algorithm.
Step 5 b) vehicle v h Generating random result x using SRNG random algorithm s+2 Then for the random result x s+2 Adding one to obtain random silence period gamma after modulo three operation, then entering a silence period with the period gamma, and then adding pseudonymChanging to the pseudonym +.>
In this step, the result x is random s+2 And gamma, the calculation formulas are respectively as follows:
φ(x s′ )→x s+2
γ=(x s+2 mod3)+1
wherein x is s′ Is a secure random seed automatically generated by the SRNG algorithm.
Claims (4)
1. A pseudonym changing method based on neighbor density in an Internet of vehicles environment is characterized by comprising the following steps:
(1) Initializing an Internet of vehicles system:
the initialization includes a central authority CA, I vehicles v= { V 1 ,v 2 ,…,v i ,…v I M roadside units r= { R 1 ,r 2 ,…,r m ,…r M A car networking system; initializing each vehicle v i To the authorityCA submissions with true identity ID i Registration request of req { ID } i Time interval between two pseudonym changes isThe minimum settling time of the pseudonym is τ, R i Circular area D of radius i For vehicles v i Neighbor region D of (2) i The dynamic set of vehicle kana to be exchanged is the pre-exchange kana set +.>Density threshold ρ 0 Wherein I is greater than or equal to 2, M is greater than or equal to 2, v i Represents the ith vehicle, r m Represents the mth road side unit, +.>
(2) The central authority generates a key and a pseudonym for each vehicle and signs the pseudonym:
the central authority CA passes each vehicle v i Registration request req { ID } i Pair v i After verification of the identity of (a), for each vehicle v i Generating public key PK i Private key SK i And the kana at the current timeAnd uses its own private key SK CA For kana->Signing to obtain a pseudonymous certificate +.>
(3) Judging the density of the neighbor areas of each vehicle:
each vehicle v i Pseudonyms used during drivingSatisfy->In this case, according to the route from the nearest road side unit r d Acquiring neighbor area at current moment->Number of vehicles in the vehicle>Calculation of v i Neighbor Density of->And judge->Whether or not it is true, if so, then->Is a high density region and will be pseudonymized +.>Put into the pre-exchange kana set +.>Rear …, executing step (4), otherwise, < ->Is a low density region and step (5) is performed, wherein d e M;
(4) Vehicles exchange pseudonyms in high density areas:
(4a) When collectingThe number of elements in (a) is greater than1, each vehicle v with a high neighbor density n Select->The pseudonym in->Vehicle v of (2) m The method comprises the steps of carrying out a first treatment on the surface of the Vehicle v n Using private key SK n For pseudonym certificate->Signing to obtain signature result sigma n ' and attached with a time stamp t n ' re-use vehicle v m Public key PK of (2) m Information->Encryption to generate message omega n ' concurrent send to v m Wherein n is not equal to m, and readyflag is a pre-exchange label;
(4b) Vehicle v m Using private key SK m Decrypting omega n ' get delta n ' public key PK is reused n Verifying signature sigma n 'A'; if v m Consent to vehicle v n Collaboration, v m Using private key SK m For pseudonym certificatesSigning to obtain signature result sigma m ' and attached with a time stamp t m ' then using the vehicle v n Public key PK of (2) n Information->Encryption to generate message omega m ' concurrent send to v n ;
(4c) Vehicle v n Using private key SK n Decrypting omega m ' get delta m ' public key PK is reused m Verifying signature sigma m ′;v n Using private key SK n For kanaAnd certificate->Signing to obtain signature result sigma n "and attached with a time stamp t n ", then use vehicle v m Public key PK of (2) m For informationEncryption is carried out to obtain a message omega n "and send to v m ;
(4d)v m Using private key SK m Decrypting omega n "get delta n "reuse of public key PK n Verifying signature sigma n ", and the obtained v n Is a pseudonym of (2)Changing the pseudonym into the pseudonym of the user; v m Using private key SK m For kana->And certificate->Signing to obtain signature result sigma m "and attached with a time stamp t m ", then use vehicle v n Public key PK of (2) n Information->Encryption is carried out to obtain a message omega m "and send to v n ;
(4e) Vehicle v n Using private key SK n Decrypting omega m "get delta m "reuse of public key PK n Verifying signature sigma m ", and the obtained v m Is a pseudonym of (2)Is changed into a pseudonym of the self and cooperates with the vehicle v m Meanwhile, a section of silence period epsilon is approached;
(5) Obtaining a pseudonym modification result of the low-density area vehicle:
(5a) Each vehicle v with low neighbor density h For random result x generated using SRNG random algorithm s+1 Performing modulo-two operation, judging whether the selection scheme number g obtained by the modulo-two operation meets g=0, and if yes, obtaining a pseudonymChanging to the pseudonym +.>Otherwise, executing the step (5 b);
3. the method for changing a pseudonym based on a neighbor density in a car networking environment according to claim 1, wherein the random result x in the step (5 a) s+1 And g, the calculation formulas are respectively as follows:
φ(x s )→x s+1
g=x s+1 mod2
wherein phi (·) is x as a result function of the SRNG algorithm s Is a safe random seed.
4. The method for changing a pseudonym based on a neighbor density in a car networking environment according to claim 1, wherein the random result x in the step (5 b) s+2 And gamma, the calculation formulas are respectively as follows:
φ(x s′ )→x s+2
γ=(x s+2 mod3)+1
wherein x is s′ Is a safe random seed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310366083.5A CN116390084A (en) | 2023-04-07 | 2023-04-07 | Pseudonym changing method based on neighbor density in Internet of vehicles environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310366083.5A CN116390084A (en) | 2023-04-07 | 2023-04-07 | Pseudonym changing method based on neighbor density in Internet of vehicles environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116390084A true CN116390084A (en) | 2023-07-04 |
Family
ID=86970672
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310366083.5A Pending CN116390084A (en) | 2023-04-07 | 2023-04-07 | Pseudonym changing method based on neighbor density in Internet of vehicles environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116390084A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116566623A (en) * | 2023-07-05 | 2023-08-08 | 北京天润基业科技发展股份有限公司 | Method, system and electronic equipment for acquiring anonymous digital certificate |
-
2023
- 2023-04-07 CN CN202310366083.5A patent/CN116390084A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116566623A (en) * | 2023-07-05 | 2023-08-08 | 北京天润基业科技发展股份有限公司 | Method, system and electronic equipment for acquiring anonymous digital certificate |
CN116566623B (en) * | 2023-07-05 | 2023-09-22 | 北京天润基业科技发展股份有限公司 | Method, system and electronic equipment for acquiring anonymous digital certificate |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11606216B2 (en) | Cryptographic methods and systems for managing digital certificates with linkage values | |
US11018877B2 (en) | Cryptographic methods and systems for managing digital certificates | |
Lei et al. | A blockchain based certificate revocation scheme for vehicular communication systems | |
US11184180B2 (en) | Cryptographic methods and systems using blinded activation codes for digital certificate revocation | |
Haas et al. | Design and analysis of a lightweight certificate revocation mechanism for VANET | |
Raya et al. | Efficient secure aggregation in VANETs | |
US11895250B2 (en) | Cryptographic methods and systems using activation codes for digital certificate revocation | |
JP2013513256A (en) | Method for public key infrastructure for automotive networks with a limited number of infrastructure servers | |
CN109362062B (en) | ID-based group signature-based VANETs anonymous authentication system and method | |
Al-Ani et al. | A survey on secure safety applications in vanet | |
CN116390084A (en) | Pseudonym changing method based on neighbor density in Internet of vehicles environment | |
Tiwari et al. | A novel secure authentication scheme for VANETs | |
Chikhaoui et al. | A ticket-based authentication scheme for vanets preserving privacy | |
Funderburg et al. | Efficient short group signatures for conditional privacy in vehicular ad hoc networks via ID caching and timed revocation | |
Sun et al. | NEHCM: A Novel and Efficient Hash-chain based Certificate Management scheme for vehicular communications | |
Biswas et al. | Prioritized WAVE-based Parking Assistance with Security and User Anonymity. | |
Khan et al. | Region Authority (RA) Collaborated Certificate Organization and Management in VANET | |
Zhang et al. | An Efficient Conditional Privacy-Preserving Authentication for VANETs | |
Myhsok et al. | Overview of extra-vehicular communication | |
CN118118901A (en) | Internet of vehicles condition privacy protection message authentication method based on grids | |
Meghana et al. | Expedite Message Authentication Protocol For VANETS | |
Haque et al. | Security of Vehicular Networks: A Comparative Study | |
Sasikumar et al. | TRANSFERRING SECURITY MESSAGE IN TAXI SERVICE IN VEHICULAR AD HOC NETWORK | |
KUMAR et al. | EFFICIENT SECRECY MAINTAINING CERTIFICATION SCHEME FOR VANET | |
Zhang | Department of Computer Engineering and Maths |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |