KR20170065172A - Method and apparatus for generating certificate of vehicle in vehicular ad-hoc network - Google Patents

Method and apparatus for generating certificate of vehicle in vehicular ad-hoc network Download PDF

Info

Publication number
KR20170065172A
KR20170065172A KR1020150171285A KR20150171285A KR20170065172A KR 20170065172 A KR20170065172 A KR 20170065172A KR 1020150171285 A KR1020150171285 A KR 1020150171285A KR 20150171285 A KR20150171285 A KR 20150171285A KR 20170065172 A KR20170065172 A KR 20170065172A
Authority
KR
South Korea
Prior art keywords
vehicle
certificate
authentication
generating
authentication server
Prior art date
Application number
KR1020150171285A
Other languages
Korean (ko)
Other versions
KR101782483B1 (en
Inventor
정성훈
Original Assignee
현대오토에버 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 현대오토에버 주식회사 filed Critical 현대오토에버 주식회사
Priority to KR1020150171285A priority Critical patent/KR101782483B1/en
Publication of KR20170065172A publication Critical patent/KR20170065172A/en
Application granted granted Critical
Publication of KR101782483B1 publication Critical patent/KR101782483B1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

A method for generating a vehicle certificate in a vehicle ad hoc network (VANET) according to an embodiment of the present invention includes the steps of: (a) requesting a certificate issuing unit to issue a new certificate to an authentication server via an RS ; (b) generating an authentication key using the additional authentication device that is not physically replicable by the authentication server; And (c) generating, by the authentication server, a new certificate for the vehicle based on the authentication key and transmitting the generated new certificate to the vehicle via the roadside apparatus, : Physically Unclonable Function) and generates a certificate based on the generated authentication key, there is no need to store a separate authentication key in the authentication server, and there is no possibility that the authentication key is leaked, A certificate can be generated and provided.

Figure P1020150171285

Description

METHOD AND APPARATUS FOR GENERATING CERTIFICATE OF VEHICLE IN VEHICULAR AD-HOC NETWORK [0002]

The present invention relates to a method and apparatus for generating vehicle certificates in a vehicular ad hoc network.

Vehicle Ad-hoc Network (VANET) is a wireless network technology for vehicle-to-vehicle or vehicle-to-infrastructure wireless communication with an on-board unit (OBU) It is a technology that can provide various services such as traffic problem solving or car accident prevention.

Because VANETs exchange information between vehicles or between vehicles and infrastructure through wireless communication, there is a security problem due to unauthorized vehicle security threats.

As a method for solving such a security problem, there is a method of generating and issuing a certificate for a vehicle to be authenticated based on a public key infrastructure (PKI).

FIG. 1 illustrates a VANET environment in which a certificate is generated and issued based on a general PKI scheme.

The authentication server A 100 is responsible for area A and the authentication server B 102 is responsible for area B to generate and provide a certificate for the vehicle. When the vehicle 104 requests the issuance of the certificate through the RSU1 to RSU4 in the area, the authentication server A 100 or the authentication server 102 generates an authentication key based on the PKI scheme for the corresponding vehicle Generates a certificate based on the generated authentication key, and provides the generated certificate to the vehicle 104 via the roadside apparatuses RSU1 to RSU4.

Currently, the technology for generating and operating the authentication key of the VANET authentication server is not standardized, and the generation and operation of the authentication key is a technology field specific to each company by country.

Authentication and security in the VANET requires enterprise-level data center security when considering the risk of accidents.

1, the authentication server A 100 is connected to the first and second RSE1 and RSU2 and the authentication server B 102 is connected to the third and fourth RSE3 and RSU4. And it is assumed that the vehicle 104 is moving from the area A to the area B.

Since the area A and the area B are overlapped with each other in the intermediate area between the second RSE2 and the third RSE3, the overlapping area is a certificate received from the authentication server A 100 and the authentication server B 102 But because the authentication ancillaries for certificate validation differ from those of authentication servers in area A and area B, when the authentication server moves the vehicle to another area, It is impossible to verify the certificate for. The trust anchor is used to verify the certificate in the certificate chain as a certificate that is published in place of the root certificate for certificate verification.

Therefore, it is required to define the generation, renewal, and discarding of the certificate caused by the movement of the vehicle between the regions.

In addition, the authentication server A 100 and the authentication server B 102 must store a considerable amount of separate authentication keys allocated to their respective regions, respectively, in the storage device, and these authentication keys are at risk of being leaked by hacking There is a problem that it is vulnerable to security and an initial investment cost for establishing an authentication server increases.

 User Authentication Technique in VANET Environment, Journal of the Korean Institute of Communication Computing, Vol.

A problem to be solved by the present invention is to generate an authentication key using a physical unclonable function (PUF) and generate a certificate based on the generated authentication key so that it is not necessary to store a separate authentication key in the authentication server The present invention provides a method of generating a vehicle certificate in a vehicle ad hoc network having a very strong security strength because there is no possibility that an authentication key is leaked.

A problem to be solved by the present invention is to generate an authentication key using a physical unclonable function (PUF) and generate a certificate based on the generated authentication key so that it is not necessary to store a separate authentication key in the authentication server There is no possibility that the authentication key will be leaked, and a vehicle certificate generating device in a vehicle ad hoc network having a very strong security strength is provided.

According to an aspect of the present invention, there is provided a method of generating a vehicle certificate in a vehicle ad hoc network (VANET), the method including generating an On Board Unit (OBU) (RSU) for relaying communication between the vehicle and the authentication server, which is installed in the vicinity of the road and that is installed in the vicinity of the road, A method for generating a vehicle certificate in a network (VANET: Vehicular Ad-hoc Network)

(a) requesting the certification subject vehicle to issue a new certificate to the authentication server via the roadside apparatus;

(b) generating an authentication key using the additional authentication device that is not physically replicable by the authentication server; And

(c) the authentication server generates a new certificate for the vehicle based on the authentication key and transmits the generated new certificate to the vehicle via the roadside apparatus.

In the method of generating a vehicle certificate in a vehicle ad hoc network (VANET) according to an embodiment of the present invention, the additional authentication device may physically And a physical unclonable function (PUF) module that outputs non-replicating output values.

In the method of generating a vehicle certificate in a vehicle ad hoc network (VANET) according to an embodiment of the present invention, in the step (a), the vehicle to be authenticated is moved from the first area to the second area The vehicle to be authenticated may request issuance of a new certificate to the authentication server of the second area.

In addition, in the method of generating a vehicle certificate in a vehicle ad hoc network (VANET) according to an embodiment of the present invention, in the step (a) When requesting issuance, the vehicle to be authenticated transmits its vehicle identification information to the authentication server through the RSE,

The step (b)

(b-1) generating an initial vector used by the authentication server only for a predetermined period of time;

(b-2) the authentication server performs an XOR operation on the initial vector and the identification information of the vehicle; And

(b-3) the authentication server inputs the result of the exclusive-OR operation as an input value of the physical unclonable function module (PUF), and uses an output value output from the physical copy protection function as an authentication key And generating a new certificate for the vehicle.

In addition, the method of generating a vehicle certificate in a vehicle ad hoc network (VANET) according to an embodiment of the present invention may further include: (d) after the step (c) And discarding the existing certificate.

According to another aspect of the present invention, there is provided an apparatus for generating a vehicle certificate in a vehicle ad hoc network (VANET)

A control unit for receiving the vehicle identification information and generating a new certificate when the vehicle to be authenticated transmits its own vehicle identification information and requests a new certificate issuance; And

And an additional authentication device for outputting an output value that is not physically replicable according to an input value,

Wherein,

An initial vector generating unit for generating an initial vector used only for a predetermined period;

An exclusive OR operation unit that performs an exclusive OR operation on the initial vector and the vehicle identification information to provide the input vector to the additional authentication apparatus as an input value; And

And a certificate generating unit for generating a new certificate for the vehicle using the output value of the additional authentication device as an authentication key.

In an apparatus for generating a vehicle certificate in a vehicle ad hoc network (VANET) according to an embodiment of the present invention,

The additional authentication apparatus may include a physical unclonable function (PUF) module for outputting an output value that is physically non-replicable according to input values using inherent hardware characteristics.

In addition, in a vehicle certificate generating apparatus in a vehicle ad hoc network (VANET) according to an embodiment of the present invention,

The control unit may further include a controller for controlling operations of the initial vector generation unit, the exclusive-OR computation unit, and the certificate generation unit.

According to the method and apparatus for generating a vehicle certificate in a vehicular ad hoc network according to an embodiment of the present invention, an authentication key is generated using a physical unlockable function (PUF), and based on the generated authentication key, It is not necessary to store a separate authentication key in the authentication server and there is no possibility that the authentication key will be leaked, so that a certificate having a very strong security strength can be generated and provided.

1 illustrates a VANET environment for generating and issuing certificates based on a general PKI scheme.
2 is a view for explaining a method and apparatus for generating a vehicle certificate in a vehicle ad hoc network according to an embodiment of the present invention;
3 is a flowchart of a method of generating a vehicle certificate in a vehicle ad hoc network according to an embodiment of the present invention.
4 is a block diagram of an apparatus for generating a vehicle certificate in a vehicle ad hoc network according to an embodiment of the present invention.

BRIEF DESCRIPTION OF THE DRAWINGS The objectives, specific advantages and novel features of the present invention will become more apparent from the following detailed description taken in conjunction with the accompanying drawings, in which: FIG.

Prior to that, terms and words used in the present specification and claims should not be construed in a conventional and dictionary sense, and the inventor may properly define the concept of the term in order to best explain its invention Should be construed in accordance with the principles and the meanings and concepts consistent with the technical idea of the present invention.

It should be noted that, in the present specification, the reference numerals are added to the constituent elements of the drawings, and the same constituent elements are assigned the same number as much as possible even if they are displayed on different drawings.

Also, the terms "first", "second", "one side", "other side", etc. are used to distinguish one element from another, It is not.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS In the following description of the present invention, a detailed description of known arts which may unnecessarily obscure the gist of the present invention will be omitted.

Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

2 is a view for explaining a method and apparatus for generating a vehicle certificate in a vehicle ad hoc network according to an embodiment of the present invention.

It is assumed in FIG. 2 that the vehicle 224 is moving from region A to region B.

When the vehicle 224 detects the movement from the area A to the area B (S200), the vehicle 224 searches the authentication server B 222, which is the authentication server of area B, through the third RSE 3, (S202) a certificate issuance request (not shown) requesting authentication server B 222 with its vehicle identification information (VID) and a new certificate via RSU3.

When the authentication server B 222 receives vehicle identification information (VID) and a new certificate issuance request (not shown) from the vehicle 224 via the third roadside apparatus RSU3, (VID) and the initial vector, and outputs the exclusive OR operation result of the vehicle identification information (VID) and the initial vector to the physical copy protection function (PUF ) Module 226 (S204). An authentication key is output as an output value through the physical copy protection function (PUF) module 226 (S206).

The authentication server B 222 generates a certificate for the vehicle 224 based on the authentication key output through the physical copy protection function module 226 (S208).

The newly generated certificate is transmitted to the vehicle 224 via the third RSU 3 and the vehicle 224 receives the new certificate and discards the certificate that it had previously, The update of the certificate is completed (S210).

The physical copy protection function (PUF) module 226 included in the authentication server B 222 may be physically controlled according to an input value by using unique hardware characteristics of a specific device, It is an additional authentication device that generates an output value that can not be copied.

A physical copy protection module (PUF) module may be included in every authentication server present in the vehicle ad hoc network for authentication key generation.

As described above, since the authentication server B 222 generates the authentication key using the physical copy protection function module 226, there is no need to separately store the authentication key in the authentication server B 220, It has a very strong security strength.

As described above, since the authentication server B 222 does not need to separately store the authentication key, the separate software or database for storing and managing the authentication key can be minimized, so that the initial investment cost for establishing the authentication server can be reduced have.

Further, according to an embodiment of the present invention, when the certificate is updated and discarded due to the local movement of the vehicle, it can be processed quickly without complicated procedures.

3 is a flowchart of a method of generating a vehicle certificate in a vehicle ad hoc network according to an embodiment of the present invention.

Referring to FIGS. 2 and 3, in step S300, the vehicle to be authenticated 224 senses the movement from area A to area B.

In the next step S302, the vehicle 224 searches the authentication server B 222, which is the authentication server in the area B, via the third RSE 3, and the authentication server B 222 via the third RSE 3, (VID) and a certificate issuance request (not shown) requesting a new certificate to the authentication server B (222).

When the authentication server B 222 receives the vehicle identification information (VID) and a new certificate issuing request (not shown) from the vehicle 224 via the third side road RSU3, in step S304, the authentication server B 222 ) Generates an initial vector.

In the next step S306, the authentication server B 222 performs an exclusive-OR operation on the vehicle identification information (VID) and the initial vector.

In step S308, the authentication server B 222 inputs the exclusive OR of the vehicle identification information (VID) and the initial vector as an input value of the physical copy protection function (PUF) module 226, And generates an authentication key used as a public key of the PKI-based authentication method through the authentication key generation unit 226.

In a next step S310, the authentication server B 222 generates a certificate for the vehicle 224 using the output value output through the physical copy protection function (PUF) module 226 as an authentication key.

In the next step S312, the authentication server B 222 transmits the generated certificate to the vehicle 224 via the third RSU3.

In the next step S314, the vehicle 224 receives the new certificate and discards the existing certificate.

4 is a block diagram of an apparatus for generating a vehicle certificate in a vehicle ad hoc network according to an embodiment of the present invention.

The certificate generating apparatus shown in FIG. 4 is a certificate generating apparatus included in the authentication server A 220 or the authentication server B 222 shown in FIG.

Referring to FIG. 4, a vehicle certificate generating apparatus in a vehicle ad hoc network (VANET) according to an embodiment of the present invention is configured so that the vehicle to be authenticated 224 has its own vehicle identification information (VID) A control unit 400 receiving the vehicle identification information (VID) and generating a new certificate when it transmits a request for issuing a new certificate, and a physical authentication unit 400 for outputting a physical value And a PUF (Physically Unclonable Function) module 402.

The control unit 400 includes an initial vector generation unit 406 for generating an initial vector IV used only for a predetermined period of time, an exclusive OR operation unit for calculating the exclusive OR of the initial vector and the vehicle identification information VID, (PUF) module 402 as an input value, an exclusive OR operation unit 404 for providing a new certificate for the vehicle 224 using the output value of the physical copy protection function (PUF) And a controller 410 for controlling operations of the initial vector generation unit, the exclusive-OR operation unit, and the certificate generation unit.

The controller 400 may be implemented in the form of hardware or software.

When the vehicle identification information (VID) and the new certificate issue request are received from the vehicle 224, the controller 410 generates an initial vector used only for a predetermined period using the initial vector generator 406, The vehicle ID information (VID) and the initial vector are subjected to exclusive OR operation using the arithmetic unit 404 and input to the physical copy protection function module 402 as an input value.

The physical copy protection function (PUF) module 402 generates an output value that is not physically replicable according to an input value, for example, using a hardware characteristic inherent to a specific device, such as a semiconductor process deviation, Output.

The controller 410 generates a certificate for the vehicle 224 based on the authentication key output from the physical copy protection function module 402 using the certificate generation unit 408. [

The apparatus for generating a vehicle certificate in a vehicle ad hoc network (VANET) according to an embodiment of the present invention shown in FIG. 4 generates an authentication key using the physical copy protection function module 402 Therefore, there is no need to separately store the authentication key in the authentication servers 220 and 220, and accordingly, the authentication key is not likely to be leaked, resulting in a very strong security strength.

As described above, the authentication servers 220 and 222 including the vehicle certificate generating device in the vehicle ad hoc network (VANET) according to the embodiment of the present invention do not need to separately store the authentication key A separate software or database for storing and managing the authentication key can be minimized, so that the initial investment cost for establishing the authentication server can be reduced.

According to an embodiment of the present invention, when a certificate is renewed and discarded due to inter-area movement of a vehicle, it can be processed quickly without complicated procedures.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. It is clear that the present invention can be modified or improved.

It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

100, 220: authentication server A 102, 222: authentication server B
104, 224: vehicle 226: physical copy protection function
400: control unit 402: PUF module
404: Exclusive OR operation unit 406: Initial vector generating unit
408: Certificate generation unit 410:
IV: initial vector RSU1 to RSU4:
VID: vehicle identification information

Claims (8)

An authentication target vehicle equipped with an on-board unit (OBU: On Board Unit) for supporting wireless communication, an authentication server for authenticating the authentication target vehicle, and an authentication server provided around the road for relaying communication between the vehicle and the authentication server A method for generating a vehicle certificate in a Vehicular Ad-hoc Network (VANET) including a Road Side Unit (RSU)
(a) requesting the certification subject vehicle to issue a new certificate to the authentication server via the roadside apparatus;
(b) generating an authentication key using the additional authentication device that is not physically replicable by the authentication server; And
(c) generating, by the authentication server, a new certificate for the vehicle based on the authentication key and transmitting the generated new certificate to the vehicle via the roadside apparatus. A Vehicle Certificate Generation Method in Vehicular Ad-hoc Network.
The method according to claim 1,
The additional authentication device includes a physical ad hoc network (VANET) module including a physical unclonable function (PUF) module for outputting an output value that is physically non-reproducible in accordance with an input value using inherent hardware characteristics. Ad-hoc Network).
The method of claim 2,
In the step (a)
(VANET: Vehicular Ad-hoc Network (VANET)) requesting issuance of a new certificate to the authentication server of the second area when the vehicle to be authenticated detects movement from the first area to the second area. hoc Network).
The method according to claim 1,
In the step (a), when the authentication subject vehicle requests a new certificate issuance to the authentication server, the authentication subject vehicle transmits its vehicle identification information to the authentication server through the roadside apparatus,
The step (b)
(b-1) generating an initial vector used by the authentication server only for a predetermined period of time;
(b-2) the authentication server performs an XOR operation on the initial vector and the identification information of the vehicle; And
(b-3) the authentication server inputs the result of the exclusive-OR operation as an input value of the physical unclonable function module (PUF), and uses an output value output from the physical copy protection function as an authentication key And generating a new certificate for the vehicle. ≪ Desc / Clms Page number 20 >
The method of claim 4,
After the step (c)
(d) the vehicle further receiving the new certificate and discarding the existing certificate. < Desc / Clms Page number 20 >
1. A vehicle certificate generating apparatus in a vehicle ad hoc network (VANET)
A control unit for receiving the vehicle identification information and generating a new certificate when the vehicle to be authenticated transmits its own vehicle identification information and requests a new certificate issuance; And
And an additional authentication device for outputting an output value that is not physically replicable according to an input value,
Wherein,
An initial vector generating unit for generating an initial vector used only for a predetermined period;
An exclusive OR operation unit that performs an exclusive OR operation on the initial vector and the vehicle identification information to provide the input vector to the additional authentication apparatus as an input value; And
And a certificate generating unit for generating a new certificate for the vehicle using the output value of the additional authentication device as an authentication key.
The method of claim 6,
The additional authentication device includes a physical ad hoc network (VANET) module including a physical unclonable function (PUF) module for outputting an output value that is physically non-reproducible in accordance with an input value using inherent hardware characteristics. Ad-hoc Network).
The method of claim 6,
Wherein the control unit further comprises a controller for controlling the operations of the initial vector generating unit, the exclusive-OR calculating unit, and the certificate generating unit. The vehicle certificate generating apparatus in a vehicle ad hoc network (VANET) .
KR1020150171285A 2015-12-03 2015-12-03 Method and apparatus for generating certificate of vehicle in vehicular ad-hoc network KR101782483B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150171285A KR101782483B1 (en) 2015-12-03 2015-12-03 Method and apparatus for generating certificate of vehicle in vehicular ad-hoc network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150171285A KR101782483B1 (en) 2015-12-03 2015-12-03 Method and apparatus for generating certificate of vehicle in vehicular ad-hoc network

Publications (2)

Publication Number Publication Date
KR20170065172A true KR20170065172A (en) 2017-06-13
KR101782483B1 KR101782483B1 (en) 2017-10-23

Family

ID=59218986

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150171285A KR101782483B1 (en) 2015-12-03 2015-12-03 Method and apparatus for generating certificate of vehicle in vehicular ad-hoc network

Country Status (1)

Country Link
KR (1) KR101782483B1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021172603A1 (en) * 2020-02-24 2021-09-02 엘지전자 주식회사 Method for protecting v2x communication using server in wireless communication system
US11218330B2 (en) 2019-03-25 2022-01-04 Micron Technology, Inc. Generating an identity for a computing device using a physical unclonable function
US11233650B2 (en) * 2019-03-25 2022-01-25 Micron Technology, Inc. Verifying identity of a vehicle entering a trust zone
US11323275B2 (en) 2019-03-25 2022-05-03 Micron Technology, Inc. Verification of identity using a secret key
US11361660B2 (en) 2019-03-25 2022-06-14 Micron Technology, Inc. Verifying identity of an emergency vehicle during operation
US11962701B2 (en) 2021-12-21 2024-04-16 Micron Technology, Inc. Verifying identity of a vehicle entering a trust zone

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015023307A (en) 2013-07-16 2015-02-02 株式会社デンソー Authentication device and authentication system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11218330B2 (en) 2019-03-25 2022-01-04 Micron Technology, Inc. Generating an identity for a computing device using a physical unclonable function
US11233650B2 (en) * 2019-03-25 2022-01-25 Micron Technology, Inc. Verifying identity of a vehicle entering a trust zone
US11323275B2 (en) 2019-03-25 2022-05-03 Micron Technology, Inc. Verification of identity using a secret key
US11361660B2 (en) 2019-03-25 2022-06-14 Micron Technology, Inc. Verifying identity of an emergency vehicle during operation
WO2021172603A1 (en) * 2020-02-24 2021-09-02 엘지전자 주식회사 Method for protecting v2x communication using server in wireless communication system
US11962701B2 (en) 2021-12-21 2024-04-16 Micron Technology, Inc. Verifying identity of a vehicle entering a trust zone

Also Published As

Publication number Publication date
KR101782483B1 (en) 2017-10-23

Similar Documents

Publication Publication Date Title
US9602290B2 (en) System and method for vehicle messaging using a public key infrastructure
JP6065113B2 (en) Data authentication apparatus and data authentication method
KR101782483B1 (en) Method and apparatus for generating certificate of vehicle in vehicular ad-hoc network
CN103731469A (en) In-vehicle communication system
US9608808B2 (en) Mobile terminal, control method thereof, onboard unit, control method thereof, backend server, and control method thereof
CN108141444B (en) Improved authentication method and authentication device
JP5380583B1 (en) Device authentication method and system
KR101829304B1 (en) Method of secure communications in vehicular cloud
CN104219663A (en) A method and system for certificating vehicle identity
CN113596778A (en) Vehicle networking node anonymous authentication method based on block chain
KR20200091689A (en) Security management system for vehicle communication and operating method thereof, messege processing method of vehicle communication service providing system having the same
CN104010302A (en) Vehicle-mounted self-organizing network traffic data trust evaluation method
CN104053149A (en) Method and system for realizing security mechanism of vehicle networking equipment
Fan et al. Strongly privacy-preserving communication protocol for VANETs
CN112448812A (en) Method for protected communication of a vehicle with an external server
CN108933665A (en) Lightweight V2I group communications identities indentification protocol applies the method in VANETs
Funderburg et al. Pairing-free signatures with insider-attack resistance for vehicular ad-hoc networks (VANETs)
Shawky et al. Efficient blockchain-based group key distribution for secure authentication in VANETs
Sakhreliya et al. PKI-SC: Public key infrastructure using symmetric key cryptography for authentication in VANETs
Suresh et al. A TPM-based architecture to secure VANET
AU2020220129A1 (en) Method of enrolling a device into a pki domain for certificate management using factory key provisioning
CN113923651B (en) Vehicle pseudonym replacement method, apparatus and computer-readable storage medium
Kleberger et al. Protecting vehicles against unauthorised diagnostics sessions using trusted third parties
Hathal et al. Token-based lightweight authentication scheme for vehicle to infrastructure communications
CN111656729B (en) System and method for computing escrow and private session keys for encoding digital communications between two devices

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant