CN104853351A - Internet of Vehicles distributed authentication method based on controllable privacy - Google Patents

Internet of Vehicles distributed authentication method based on controllable privacy Download PDF

Info

Publication number
CN104853351A
CN104853351A CN201510125985.5A CN201510125985A CN104853351A CN 104853351 A CN104853351 A CN 104853351A CN 201510125985 A CN201510125985 A CN 201510125985A CN 104853351 A CN104853351 A CN 104853351A
Authority
CN
China
Prior art keywords
vehicle
rsu
signature
message
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510125985.5A
Other languages
Chinese (zh)
Inventor
陆杰
徐宗保
周从华
王良民
刘志锋
施化吉
申屠浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu University
Original Assignee
Jiangsu University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu University filed Critical Jiangsu University
Priority to CN201510125985.5A priority Critical patent/CN104853351A/en
Publication of CN104853351A publication Critical patent/CN104853351A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an Internet of Vehicles distributed authentication method based on controllable privacy, relates to the field of vehicle network communication safety, and specifically relates to an Internet of Vehicles distributed authentication method based on controllable privacy. The method specifically includes five following steps: system initialization; private key update of fake names and a part of signatures; message signature; message authentication of signatures; and real identity tracking and revocation. According to the method, the double hash chain is employed to establish the fake names, the communication cost for invalidating a vehicle identity is irrelevant to the numbers of the fake names and a part of the signature private keys of the vehicle, a vehicle user can update multiple parts of signature private keys by the adoption of one authorization, and the burden of trusted authority (TA) and road-side units (RSU) is reduced; when a message with a controversial signature occurs, the TA can distinguish whether the signature is forged by the RSU according to re-signature of the message uploaded by the vehicle, and the problem of non-repudiation in the distributed environment is solved. According to the method, the security is high, the cost is low, and the method is applicable to node high-speed movement, topology structure volatility, and large-scale VANET network.

Description

A kind of networking of the car based on controlled privacy distributed authentication method
Technical field
The present invention relates to In-vehicle networking field of communication security, particularly a kind of networking of the car based on controlled privacy distributed authentication method.
Background technology
Vehicular ad hoc network is mobile ad hoc network and the sensor technology embody rule at field of traffic, and it can greatly reduce the generation of traffic safety accident, improves road efficiency and provides information service.Vehicular ad hoc network adopts Dedicated Short Range Communications, supports that the communication V2V between car and car and car and roadside unit intercom V2I two kinds of communication patterns mutually, build a self-organizing, distributed, dispose facilitate, the inter-vehicular communication network of structure opening.
The deployment of vehicle-mounted net and enforcement have huge Social and economic benef@, cause showing great attention to of industrial quarters and academia in recent years, create many important achievements in research.But the development of this technology is also faced with many challenges, while the integrality mainly guaranteeing message and confirmability, protect the privacy of driver and conductor and meet the requirement of process in real time.Forge message to meet the needs of oneself because lawless person and selfish personnel may utilize vehicle-mounted net to propagate, so data signature mechanism must be used to guarantee, the information transmitted comes from true and reliable vehicle; But these message generally include position, the direction and time etc. of vehicle, can threaten the privacy of driver and conductor, so will realize anonymous authentication by other people after being known; And in distributed identity authentication environment, realize occurring that the message traceability of dispute just must meet the non-repudiation of information signature.
In order to address these problems, there are many representational achievements in research.Raya M etc. advise adopting another name authentication mechanism in vehicular ad hoc network the earliest.Vehicle is applied for a large amount of certificate to CA and is stored onboard, and CA stores the relation of true identity and another name.Armknecht F etc. have studied the routing policy under another name mechanism, considers between protection privacy and maintenance routing stability.Fischer L etc. points out if assailant can invade CA, and another name mechanism just loses the effect of secret protection.For this reason, author advises that vehicle adopts Proxy Signature from multiple CA application another name, which greatly enhances the threshold of privacy leakage.But the program generates but alias expense is too large, and the another name of the malice vehicle that cannot singlely cancel.Above-mentioned another name mechanism is all concentrated authorization, namely once obtains a large amount of another name certificates.Like this, greatly increased the weight of the burden of Certificate Authority, and the certificate that the vehicle that cancels will be held all cancels, and this means sizable calcellation expense.
For another name mechanism, the another name number that minimizing vehicle carries is the effective ways reducing calcellation expense.The suggestion such as Bellur adopts distributed certificate management mode, allows vehicle to upgrade another name by RSU in normal traveling process.Whole Region dividing is become some subregions, and every alias certificate can only use in a sub regions.Certain member of such calcellation just only needs to notice it and has the subregion calling place.The ECPP scheme that Lu etc. propose decreases the radio transmission expense of calcellation list and the storage overhead of common vehicle.Wasef etc. propose vehicle can apply for certificate from RSU as required, and author reduces the reliability rating of RSU under study for action, think that RSU is half believable, but the deficiency of the program is that the cost recovering malice testing vehicle register is larger.Priya etc. propose GAP scheme, and the program uses group ranking and batch certification, but does not reach the non-repudiation under distributed bad border, and in the program, the vehicle RSU that can countercharge forges a signature.
Summary of the invention
The object of the invention is to a kind of car based on controlled privacy networking distributed authentication method, reduce RSU computing cost and communication overhead, alleviate the burden of TA and RSU, solve the undeniable sex chromosome mosaicism of transmit leg under distributed environment, thus realize the Distributed Anonymous certification of the safety and efficiently rate in vehicle-mounted net.
In order to solve above technical problem, the present invention adopts the signature scheme of the part signature private key of secret value and the RSU place acquisition of providing based on authoritative institution, and the concrete technical scheme of car networking distributed authentication method proposed based on controlled privacy is as follows:
Based on a car networking distributed authentication method for controlled privacy, it is characterized in that comprising following steps:
Step one, system initialization: authoritative institution chooses common parameter, for RSU and vehicle are registered;
Step 2, assumed name and part signature private key upgrade: the identity of certifying authority vehicle, and for part signature private key request certificate provided by vehicle, described vehicle obtains a collection of corresponding part signature private key according to part signature private key request certificate from RSU;
Step 3, information signature: the secret value that vehicle utilizes authoritative institution to provide and the part signature private key that RSU place obtains are signed to message, obtain the message of signing; Described information signature have employed the secret value of authoritative institution's granting and the part signature private key of RSU granting simultaneously;
Step 4, the message authentication of signature: vehicle sends the message of signature according to other vehicle received, carries out certification to the message of signature;
Step 5, the tracking of true identity with cancel: when disputing on appears in the message of signature, authoritative institution tracks the true identity of vehicle according to the message of signing, and is cancelled by described testing vehicle register.
Described step one is specially further:
Process one, a Big prime p selects in authoritative institution, selects two constant a, b ∈ Z pmake 4a 3+ 27b 2≠ 0 mod p, definition Z pon elliptic curve E:y 2=x 3+ ax+b by one based on congruence expression y 2=x 3disaggregation and an infinite point O of+ax+b mod p form, if P is that on E, rank are a point of prime number q, TA selects a random number as system master key, computing system PKI PK tA=SK tAp ∈ G, then select two Hash functions with the cryptographic algorithm Enc of a safety k(), last TA public address system parameter (q, P, G, H 1, H 2, Enc k());
Process two, when vehicle registration, TA is to vehicle V idistribute a true identity RID i∈ G, and the public private key pair that traditional wherein last TA is V iselect the seed of two hash chains with l is the number of the seed generation assumed name of two hash chains, and stores the mapping relations of true identity and hash chain seed;
Process three, TA is that each RSU selects a random number as the private key of RSU, and calculate as the PKI of RSU, finally by R i=(RSU i|| L i), with safe sends RSU to, wherein L ibe the positional information of RSU, thus obtain certificate Cert TA , R i = ( R i , PK R i , SIG SK TA ( R i , PK R i ) ) .
Described step 2 is specially following process further:
Process one, as vehicle V iwhen entering RSU, vehicle V iselect a random number r', then will by RSU send to TA, r' is used to prevent opponent from collecting information, thus obtains this vehicle through which RSU; TA decrypt X, checks RID iwhether cancelling in chained list; Vehicle V in each RSU ithe assumed name quantity upgraded once is needed to be fixing, at R ithe interior quantity upgraded that needs is
TA is vehicle generating portion signature private key request certificate: first TA is by searching memory cell, calculates vehicle V ithe assumed name quantity upgraded is m, and TA judges herein whether set up, if set up TA random selecting and calculate then will t stamp, with with use vehicle V iconventional public-key encryption generating messages Y = Enc PK V i ( U i 1 , t stamp , x V i , S V i 1 , m + 1 , S V i 2 , l - n R i - m + 1 , SIG SK TA ( U i 1 , t stamp , S V i 1 , m + 1 , S V i 2 , l - n R i - m + 1 ) ) , Y is sent to V by RSU i, otherwise TA is vehicle V iagain choose hash chain seed, TA will add self memory space and renewal tA chooses herein add part signature private key request certificate, object makes, when there is the message of controversial signature, can differentiate the source of the message of signature, reach non-repudiation;
Process two, vehicle V iafter receiving enciphered message Y, use vehicle V itraditional private key deciphering Y, obtain U 1, t stamp, with checking TA signature validity, if signature is effectively, V iwill with part signature private key request certificate Z = ( U i 1 , t stamp , S V i 1 , m + 1 , S V i 2 , l - m - n R i + 1 , SIG SK TA ( U i 1 , t stamp , S V i 1 , m + 1 , S V i 2 , l - m - n R i + 1 ) ) There is the memory space of self, V iwait for and obtain signature private key from RSU;
Process three, RSU broadcasts certificate termly if legal, vehicle V ichoose a random number and calculate symmetric key and decryption factor then, V isend a request message to RSU rSU calculates symmetric key and decipher W, then proving time stamp t stampfreshness, and signature validity; If the verification passes, RSU calculates assumed name PID i,j,
S V i 1 , m + j = h m + j ( SD V i 1 ) , S V i 2 , l - j - m + 1 = h l - j - m + 1 ( SD V i 2 ) , PID i , j = h ( S V i 1 , j + m ⊕ S V i 2 , l - j - m + 1 ) ( 1 ≤ j ≤ n R i ) . - - - ( 1 ) ,
Choose corresponding to each assumed name RSU calculate U i , j 2 = r i , j P , U i , j = U i 1 + U i , j 2 ; Order wherein Δ t i,jit is the time window that part signature private key uses; Calculate d PID i , j = r i , j + h i , j SK R i mod q , RSU handle Ψ = Enc φ ′ ( U i , j , d PID i , j , Δt i , j , ( 1 ≤ j ≤ n R i ) ) Send to vehicle V i, RSU will add the memory space of self;
Process four, vehicle V iafter receiving message Ψ, obtain U with after φ deciphering i,j, Δ t i,j, and calculate assumed name according to formula (1), finally store n riindividual four-tuple (PID i,j, U i,j, Δ t i,j) for information signature.
Described step 3 is specially following process further:
For message M ∈ { 0,1} *, vehicle signature is as follows:
Process one, random selecting calculate R i,j=k i,jp;
Process two, order e i , j = H 2 ( M i , PID i , j , PK R i , U i , j , R i , j ) ;
Process three, calculates v i , j = k i , j + e i , j ( d PID i , j + x V i ) ;
Then δ i=(U i,j, e i,j, v i,j) be exactly vehicle V iwith assumed name PID i,jto message M isignature.
Described step 4 is specially further:
Verification algorithm: once receive the message (PID of signature i,j, M i, Δ t i,j, δ i), verifier proceeds as follows:
Process one, calculates h i , j = H 1 ( PID i , j , PK R i , U i , j ) ;
Process two, calculates R i , j ′ = v i , j P - e i , j ( U i , j + h i , j PK R i ) ;
Process three, finally calculates e i , j ′ = H 2 ( M i , PID i , j , PK R i , U i , j , R i , j ′ ) ;
And if only if e ' i,j=e i,jtime, verifier accepts the message of signing.
Described step 5 is specially further:
When the message of an appearance controversial signature time, according to vehicle V iassumed name PID i,j, TA searches for the PID of storage from self memory space i,jcorresponding true identity, obtains vehicle V itrue identity RID i, TA is once obtain RID i, just can cancel V easily i, mainly comprise two processes;
Process one, by RID iadd and cancel chained list (CRL), V ican not obtain new part signature private key request certificate from TA, RSU is no longer vehicle V idistribution unit divides signature private key
Process two, first, cancels V ithe not yet expired assumed name obtained and part signature private key, TA is according to the memory space of self find Current vehicle V iobtain the RSU of assumed name and part signature private key; Then, TA will send to RSU, C is added that the signature of RSU is broadcast to all vehicle user of RSU region by RSU; Finally, third party is after receiving C, and third party calculates the effective assumed name PID cancelling vehicle and hold at present according to formula (1) i,j, third party is PID i,jbe added to time window Δ t i,jin interior local CRL.
The application has beneficial effect.Present applicant proposes a kind of car based on controlled privacy networking distributed authentication method, this application uses Double Hash chains to build assumed name, on the basis keeping anonymity, the assumed name that the communication overhead of a calcellation testing vehicle register and this car are held and part signature private key number have nothing to do, and user utilizes a mandate can upgrade multiple part signature private key, alleviates the burden of TA and RSU; Due to when the distribution of signature private key, RSU is according to part signature private key request certificates constructing part signature private key, so when having dispute message, TA can according to vehicle upload to this message again sign distinguish this signature whether be forged by RSU, solve the undeniable sex chromosome mosaicism under distributed environment.In addition, this application, no matter in the distribution of part signature private key, signature process and verification process do not need expensive to computing, and signature authentication only needs three dot products operations, has increased substantially certification speed, has been highly suitable for VANET network.
Accompanying drawing explanation
The flow chart of the networking of the car based on the controlled privacy distributed authentication method that Fig. 1 provides for the embodiment of the present invention.
The assumed name that Fig. 2 provides for the embodiment of the present invention and the flow chart that part signature private key upgrades.
The flow chart of the information signature that Fig. 3 provides for the embodiment of the present invention.
The flow chart of the message authentication that Fig. 4 provides for the embodiment of the present invention.
The flow chart that Fig. 5 cancels for the identity that the embodiment of the present invention provides.
Embodiment
As shown in Figure 1, the present invention has 5 steps, is respectively:
(1) system initialization: authoritative institution chooses common parameter, for RSU and vehicle are registered;
(2) assumed name and part signature private key upgrade: the identity of certifying authority vehicle, and for signature private key request certificate provided by vehicle, described vehicle obtains a collection of corresponding signature private key according to signature private key request certificate from RSU;
(3) information signature: the secret value that vehicle utilizes authoritative institution to provide and the signature private key that RSU place obtains are signed to message;
(4) message authentication of signing: vehicle sends the message of signature according to other vehicle received, carries out certification to the message of signature;
(5) true identity tracking with cancel: when disputing on appears in the message of signature, authoritative institution tracks the true identity of vehicle according to the message of signing, and is cancelled by described testing vehicle register.
Below in conjunction with specific embodiments and the drawings, the present invention is further described.
(1) initialization system: authoritative institution chooses common parameter, for RSU and vehicle are registered;
Step 1.1: described authoritative institution, selects a Big prime p, selects two constant a, b ∈ Z pmake 4a 3+ 27b 2≠ 0 mod p, definition Z pon elliptic curve E:y 2=x 3+ ax+b by one based on congruence expression y 2=x 3disaggregation and an infinite point O of+ax+b mod p form, if P is that on E, rank are a point of prime number q.
Step 1.2:TA selects a random number as system master key, computing system PKI PK tA=SK tAp ∈ G, then select two Hash functions with the cryptographic algorithm Enc of a safety k(), last TA public address system parameter (q, P, G, H 1, H 2, Enc k());
Step 1.3: when vehicle registration, TA is to vehicle V idistribute a true identity RID i∈ G, and the public private key pair that traditional wherein last TA is V iselect the seed of two hash chains with suppose that the seed of every two hash chains is used for generating l assumed name, and store the mapping relations of true identity and hash chain seed;
Step 1.4:TA is that each RSU selects a random number as the private key of RSU, and calculate as the PKI of RSU, finally by R i=(RSU i|| L i), with safe sends RSU to, wherein L ibe the positional information of RSU, can certificate be obtained Cert TA , R i = ( R i , PK R i , SIG SK TA ( R i , PK R i ) ) .
(2) assumed name and part signature private key upgrade: as shown in Figure 2, the identity of certifying authority vehicle, for signature private key request certificate provided by vehicle, described vehicle obtains a collection of corresponding signature private key according to signature private key request certificate from RSU, has 18 steps.
Step 2.1: as vehicle V iwhen entering RSU, vehicle V iselect a random number r', then will by RSU send to TA.
Step 2.2:TA decrypt X, checks RID iwhether cancelling in chained list; RID iif not cancelling in chained list, to step 2.3, otherwise to step 2.17.
Step 2.3:TA, by searching memory cell, calculates vehicle V ithe assumed name quantity upgraded is m, and TA judges herein whether set up, if set up to step 2.4, otherwise to step 2.5.
Step 2.4:TA random selecting and calculate tA generating messages Y = Enc PK V i ( U i 1 , t stamp , x V i , S V i 1 , m + 1 , S V i 2 , l - n R i - m + 1 , SIG SK TA ( U i 1 , t stamp , S V i 1 , m + 1 , S V i 2 , l - n R i - m + 1 ) ) , Y is sent to V by RSU i, to step 2.6.
Step 2.5:TA is vehicle V iagain hash chain seed is chosen, to step 2.3.
Step 2.6:TA will add self memory space and renewal ( R i , S V i 1 , m + n R i + 1 , S V i 2 , l - m - n R i + 1 ) .
Step 2.7: vehicle V iafter receiving enciphered message Y, use vehicle V itraditional private key deciphering Y, obtain U 1, t stamp, with checking TA signature validity, if TA signature valid till step 2.8.Otherwise to step 2.1.
Step 2.8:V istore secret value with part signature private key request certificate
Z = ( U i 1 , t stamp , S V i 1 , m + 1 , S V i 2 , l - m - n R i + 1 , SIG SK TA ( U i 1 , t stamp , S V i 1 , m + 1 , S V i 2 , l - m - n R i + 1 ) ) .
Step 2.9:RSU broadcasts certificate termly Cert TA , R i = ( R i , PK R i , SIG SK TA ( R i , PK R i ) ) .
Step 2.10:V ichecking it is legitimacy.If certificate is legal in step 2.11, otherwise to step 2.17.
Step 2.11: vehicle V ichoose a random number and calculate symmetric key and decryption factor then, V isend a request message to RSU
Step 2.12:RSU calculates symmetric key and decipher W, then proving time stamp t stampfreshness, and signature validity; If the verification passes, to step 2.13, otherwise to step 2.17.
Step 2.13:RSU calculates assumed name PID i,j,
S V i 1 , m + j = h m + j ( SD V i 1 ) , S V i 2 , l - j - m + 1 = h l - j - m + 1 ( SD V i 2 ) , PID i , j = h ( S V i 1 , j + m ⊕ S V i 2 , l - j - m + 1 ) ( 1 ≤ j ≤ n R i ) . - - - ( 1 ) ,
Step 2.14: choose corresponding to each assumed name RSU calculate U i , j = U i 1 + U i , j 2 ; Order h i , j = H 1 ( PID i , j , PK R i , Δt i , j , U i , j ) , Wherein Δ t i,jit is the time window that part signature private key uses; Calculate d PID i , j = r i , j + h i , j SK R i mod q .
Step 2.15:RSU handle Ψ = Enc φ ′ ( U i , j , d PID i , j , Δt i , j , ( 1 ≤ j ≤ n R i ) ) Send to vehicle V i, RSU incites somebody to action ( t stamp) add self memory space;
Step 2.16: vehicle V iafter receiving message Ψ, obtain U with after φ deciphering i,j, Δ t i, j, and according to the assumed name of formula (1) calculating above, finally store individual four-tuple (PID i,j, U i,j, Δ t i,j) for information signature.To step 2.18.
Step 2.17: protocol ends.
Step 2.18: assumed name and part signature private key upgrade and terminate.
So far assumed name and part signature private key upgrade and terminate, the message that in described Handshake Protocol, assailant is stolen by network monitoring, because do not decipher secret key can not decipher the content obtaining message, ensure that the confidentiality of message, with respective signature, each message ensure that message is not tampered.
(3) information signature: described information signature is characterised in that signature have employed the secret value of authoritative institution's granting and the signature private key of RSU granting simultaneously, as shown in Figure 3, has 3 steps.
For message M i∈ { 0,1} *, vehicle signature is as follows:
Step 3.1: vehicle random selecting calculate R i,j=k i,jp;
Step 3.2: vehicle makes e i , j = H 2 ( M i , PID i , j , PK R i , U i , j , R i , j ) ;
Step 3.3: vehicle calculates v i , j = k i , j + e i , j ( d PID i , j + x V i ) ;
Then δ i=(U i,j, e i,j, v i,j) be exactly vehicle V iwith assumed name PID i,jto message M isignature.
So far information signature terminates, and described endorsement method cannot be forged, because the signature of the method not only needs secret value but also need part signature private key.Even if after RSU is attacked, forge a signature, also can review the source of message, as long as vehicle produces two signatures to message, whether TA can decision message be just that RSU forges.And the practical assumed name communication of the method, assumed name just with once, reaches identity anonymous and track not trackability well at every turn.
(4) message authentication: as shown in Figure 4, vehicle sends the message of signature according to other vehicle received, and carries out certification to the message of signature;
Verification algorithm: once receive the message (PID of signature i,j, M i, Δ t i,j, δ i), verifier proceeds as follows:
Step 4.1: verifier calculates h i , j = H 1 ( PID i , j , PK R i , U i , j ) ;
Step 4.2: verifier calculates R i , j ′ = v i , j P - e i , j ( U i , j + h i , j PK R i ) ;
Step 4.3: last verifier calculates e i , j ′ = H 2 ( M i , PID i , j , PK R i , U i , j , R i , j ′ ) ;
Step 4.4: if e ' i,j=e i,jtime, verifier accepts the message of signing, otherwise abandons this message.
So far, the message authentication of signature terminates, described authentication method, only needs the time of three dot products, and do not need expensive to computing, authentication efficiency is very high.
(5) true identity tracking with cancel: as shown in Figure 5, when dispute appears in the message of signature, authoritative institution tracks the true identity of vehicle according to the message of signature, and is cancelled by described testing vehicle register.
Step 5.1:TA is by RID iadd and cancel chained list (CRL).
Step 5.2:TA is according to the memory space of self find Current vehicle V iobtain the RSU of assumed name and part signature private key.
Step 5.3:TA will send to RSU.
C is added that the signature of RSU is broadcast to all vehicle user of RSU region by step 5.4:RSU.
Step 5.5: third party is after receiving C, and third party can calculate according to formula (1) the effective assumed name PID cancelling vehicle and hold at present i,j, third party is PID i,jbe added to time window Δ t i,jin interior local CRL.

Claims (6)

1., based on a car networking distributed authentication method for controlled privacy, it is characterized in that comprising following steps:
Step one, system initialization: authoritative institution chooses common parameter, for RSU and vehicle are registered;
Step 2, assumed name and part signature private key upgrade: the identity of certifying authority vehicle, and for part signature private key request certificate provided by vehicle, described vehicle obtains a collection of corresponding part signature private key according to part signature private key request certificate from RSU;
Step 3, information signature: the secret value that vehicle utilizes authoritative institution to provide and the part signature private key that RSU place obtains are signed to message, obtain the message of signing; Described information signature have employed the secret value of authoritative institution's granting and the part signature private key of RSU granting simultaneously;
Step 4, the message authentication of signature: vehicle sends the message of signature according to other vehicle received, carries out certification to the message of signature;
Step 5, the tracking of true identity with cancel: when disputing on appears in the message of signature, authoritative institution tracks the true identity of vehicle according to the message of signing, and is cancelled by described testing vehicle register.
2. a kind of networking of the car based on controlled privacy distributed authentication method according to claim 1, is characterized in that described step one is specially further:
Process one, a Big prime p selects in authoritative institution, selects two constant a, b ∈ Z pmake 4a 3+ 27b 2≠ 0 mod p, definition Z pon elliptic curve E:y 2=x 3+ ax+b by one based on congruence expression y 2=x 3disaggregation and an infinite point O of+ax+b mod p form, if P is that on E, rank are a point of prime number q, TA selects a random number as system master key, computing system PKI PK tA=SK tAp ∈ G, then select two Hash functions with the cryptographic algorithm Enc of a safety k(), last TA public address system parameter (q, P, G, H 1, H 2, Enc k());
Process two, when vehicle registration, TA is to vehicle V idistribute a true identity RID i∈ G, and the public private key pair that traditional wherein last TA is V iselect the seed of two hash chains with l is the number of the seed generation assumed name of two hash chains, and stores the mapping relations of true identity and hash chain seed;
Process three, TA is that each RSU selects a random number as the private key of RSU, and calculate as the PKI of RSU, finally by R i=(RSU i|| L i), with safe sends RSU to, wherein L ibe the positional information of RSU, thus obtain certificate Cert TA , R i = ( R i , PK R i , SIG SK TA ( R i , PK R i ) ) .
3. a kind of networking of the car based on controlled privacy distributed authentication method according to claim 1, is characterized in that described step 2 is specially following process further:
Process one, as vehicle V iwhen entering RSU, vehicle V iselect a random number r', then will by RSU send to TA, r' is used to prevent opponent from collecting information, thus obtains this vehicle through which RSU; TA decrypt X, checks RID iwhether cancelling in chained list; Vehicle V in each RSU ithe assumed name quantity upgraded once is needed to be fixing, at R ithe interior quantity upgraded that needs is
TA is vehicle generating portion signature private key request certificate: first TA is by searching memory cell, calculates vehicle V ithe assumed name quantity upgraded is m, and TA judges herein whether set up, if set up TA random selecting and calculate then will t stamp, with with use vehicle V iconventional public-key encryption generating messages Y = Enc PK V i ( U i 1 , t stamp , x V i , S V i 1 , m + 1 , S V i 2 , l - n R i - m + 1 , SIG SK TA ( U i 1 , t stamp , S V i 1 , m + 1 , S V i 2 , l - n R i - m + 1 ) ) , Y is sent to V by RSU i, otherwise TA is vehicle V iagain choose hash chain seed, TA will add self memory space and renewal tA chooses herein add part signature private key request certificate, object makes, when there is the message of controversial signature, can differentiate the source of the message of signature, reach non-repudiation;
Process two, vehicle V iafter receiving enciphered message Y, use vehicle V itraditional private key deciphering Y, obtain U 1, with checking TA signature validity, if signature is effectively, V iwill with part signature private key request certificate Z = ( U i 1 , t stamp , S V i 1 , m + 1 , S V i 2 , l - m - n R i + 1 , SIG SK TA ( U i 1 , t stamp , S V i 1 , m + 1 , S V i 2 , l - m - n R i + 1 ) ) There is the memory space of self, V iwait for and obtain signature private key from RSU;
Process three, RSU broadcasts certificate termly if legal, vehicle V ichoose a random number and calculate symmetric key and decryption factor then, V isend a request message to RSU rSU calculates symmetric key and decipher W, then proving time stamp t stampfreshness, and signature validity; If the verification passes, RSU calculates assumed name PID i,j,
S V i 1 , m + j = h m + j ( SD V i 1 ) , S V i 2 , l - j - m + 1 = h l - j - m + 1 ( SD V i 2 ) , PID i , j = h ( S V i 1 , j + m ⊕ S V i 2 , l - j - m + 1 ) ( 1 ≤ j ≤ n R i ) . - - - ( 1 ) ,
Choose corresponding to each assumed name RSU calculate order wherein Δ t i,jit is the time window that part signature private key uses; Calculate d PID i , j = r i , j + h i , j SK R i mod q , RSU handle Ψ = Enc φ ′ ( U i , j , d PID i , j , Δt i , j , ( 1 ≤ j ≤ n R i ) ) Send to vehicle V i, RSU will add the memory space of self;
Process four, vehicle V iafter receiving message Ψ, obtain U with after φ deciphering i,j, Δ t i,j, and calculate assumed name according to formula (1), finally store individual four-tuple for information signature.
4. a kind of networking of the car based on controlled privacy distributed authentication method according to claim 1, is characterized in that described step 3 is specially following process further:
For message M i∈ { 0,1} *, vehicle signature is as follows:
Process one, random selecting calculate R i,j=k i,jp;
Process two, order e i , j = H 2 ( M i , PID i , j , PK R i , U i , j , R i , j ) ;
Process three, calculates v i , j = k i , j + e i , j ( d PID i , j + x V i ) ;
Then δ i=(U i,j, e i,j, v i,j) be exactly vehicle V iwith assumed name PID i,jto message M isignature.
5. a kind of networking of the car based on controlled privacy distributed authentication method according to claim 1, is characterized in that described step 4 is specially further:
Verification algorithm: once receive the message (PID of signature i,j, M i, Δ t i,j, δ i), verifier proceeds as follows:
Process one, calculates h i , j = H 1 ( PID i , j , PK R i , U i , j ) ;
Process two, calculates R i , j ′ = v i , j P - e i , j ( U i , j + h i , j PK R i ) ;
Process three, finally calculates e i , j ′ = H 2 ( M i , PID i , j , PK R i , U i , j , R i , j ′ ) ;
And if only if e ' i,j=e i,jtime, verifier accepts the message of signing.
6. a kind of networking of the car based on controlled privacy distributed authentication method according to claim 1, is characterized in that described step 5 is specially further:
When the message of an appearance controversial signature time, according to vehicle V iassumed name PID i,j, TA searches for the PID of storage from self memory space i,jcorresponding true identity, obtains vehicle V itrue identity RID i, TA is once obtain RID i, just can cancel V easily i, mainly comprise two processes;
Process one, by RID iadd and cancel chained list (CRL), V ican not obtain new part signature private key request certificate from TA, RSU is no longer vehicle V idistribution unit divides signature private key
Process two, first, cancels V ithe not yet expired assumed name obtained and part signature private key, TA is according to the memory space of self find Current vehicle V iobtain the RSU of assumed name and part signature private key; Then, TA will send to RSU, C is added that the signature of RSU is broadcast to all vehicle user of RSU region by RSU; Finally, third party is after receiving C, and third party calculates the effective assumed name PID cancelling vehicle and hold at present according to formula (1) i,j, third party is PID i,jbe added to time window Δ t i,jin the CRL (local CRL) of interior RSU region.
CN201510125985.5A 2015-03-20 2015-03-20 Internet of Vehicles distributed authentication method based on controllable privacy Pending CN104853351A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510125985.5A CN104853351A (en) 2015-03-20 2015-03-20 Internet of Vehicles distributed authentication method based on controllable privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510125985.5A CN104853351A (en) 2015-03-20 2015-03-20 Internet of Vehicles distributed authentication method based on controllable privacy

Publications (1)

Publication Number Publication Date
CN104853351A true CN104853351A (en) 2015-08-19

Family

ID=53852626

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510125985.5A Pending CN104853351A (en) 2015-03-20 2015-03-20 Internet of Vehicles distributed authentication method based on controllable privacy

Country Status (1)

Country Link
CN (1) CN104853351A (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105656634A (en) * 2016-01-12 2016-06-08 上海第二工业大学 Privacy protection batch authentication method without pairing operation in vehicular ad hoc network
CN105763558A (en) * 2016-01-20 2016-07-13 华东师范大学 Distributed aggregation authentication method having privacy protection function for vehicle-mounted self-organizing network
CN105871831A (en) * 2016-03-28 2016-08-17 江苏大学 Data fragmenting and downloading service method in vehicular network
CN106027519A (en) * 2016-05-18 2016-10-12 安徽大学 Efficient condition privacy protection and security authentication method in internet of vehicles
CN106657021A (en) * 2016-11-24 2017-05-10 北京洋浦伟业科技发展有限公司 Vehicle message authentication method and device in Internet of Vehicles
CN107040516A (en) * 2017-01-03 2017-08-11 东南大学 A kind of efficient pseudonym management and data integrity protection protocol
US9940142B2 (en) 2016-05-20 2018-04-10 At&T Mobility Ii Llc Connected car resource manager with associated applications control
CN107995262A (en) * 2017-11-16 2018-05-04 北京交通大学 Based on the vehicle-mounted cloud system to park cars and application method
CN108024206A (en) * 2017-11-30 2018-05-11 东北大学 With reference to the vehicle node location privacy protection system and method for PMIPv6 frameworks
CN108171511A (en) * 2017-12-26 2018-06-15 陈晶 A kind of block chain model with privacy protection function
CN108282757A (en) * 2018-01-24 2018-07-13 电子科技大学 VANET method for secret protection under a kind of mobile cloud service
CN108462948A (en) * 2017-01-05 2018-08-28 大众汽车有限公司 Method, apparatus for vehicle-to-vehicle communication and the computer readable storage medium including instruction
CN108965313A (en) * 2018-07-31 2018-12-07 安徽大学 Vehicle violation information publishing method, system and storage medium
CN108964919A (en) * 2018-05-02 2018-12-07 西南石油大学 The lightweight anonymous authentication method with secret protection based on car networking
CN109120409A (en) * 2018-03-26 2019-01-01 泰山学院 A kind of digital signature method for secure communication in Internet of Things
CN109194610A (en) * 2018-07-24 2019-01-11 北京交通大学 Vehicle-mounted mist data lightweight anonymous access authentication method based on block chain auxiliary
CN109561383A (en) * 2018-12-17 2019-04-02 昆明理工大学 A kind of location privacy protection method based on dynamic assumed name exchange area
CN109788482A (en) * 2019-02-26 2019-05-21 武汉大学 Message anonymous authentication method and system under a kind of car networking environment between vehicle
CN110008752A (en) * 2019-04-12 2019-07-12 北京理工大学 A kind of platooning's evaluation method based on secret protection
CN110071797A (en) * 2019-02-01 2019-07-30 湖州师范学院 The method of assumed name change car networking privacy-protection certification based on mixing context
CN110233724A (en) * 2019-05-15 2019-09-13 上海大学 Mist calculates the car networking private data guard method based on dual assumed name under environment
CN110446183A (en) * 2019-06-01 2019-11-12 西安邮电大学 Car networking system and working method based on block chain
CN111107071A (en) * 2019-12-10 2020-05-05 重庆邮电大学 Electric vehicle charging service method capable of protecting privacy
CN111885544A (en) * 2020-07-16 2020-11-03 暨南大学 Emergency message dissemination method and system with trust management and privacy protection functions in Internet of vehicles
CN112261078A (en) * 2020-09-11 2021-01-22 山东师范大学 Block chain-based road rescue privacy protection system and method in fog computing environment
CN113364598A (en) * 2021-06-04 2021-09-07 江苏大学 Batch authentication method for privacy protection in Internet of vehicles environment
CN113992388A (en) * 2021-10-26 2022-01-28 北京工业大学 Method for realizing vehicle identity condition privacy protection based on RSU

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219663A (en) * 2013-05-30 2014-12-17 江苏大学 A method and system for certificating vehicle identity
CN104394000A (en) * 2014-12-11 2015-03-04 江苏大学 Batched certification method based on pseudonym verification public key in vehicle-mounted network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219663A (en) * 2013-05-30 2014-12-17 江苏大学 A method and system for certificating vehicle identity
CN104394000A (en) * 2014-12-11 2015-03-04 江苏大学 Batched certification method based on pseudonym verification public key in vehicle-mounted network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YILIANG LIU: "Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks", 《IEEE XPLORE》 *
刘辉等: "《采用群组密钥管理的分布式车联网信息认证方案》", 《西安交通大学学报》 *

Cited By (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105656634B (en) * 2016-01-12 2019-07-02 上海第二工业大学 Secret protection batch authentication method without pairing operation in vehicular ad hoc network
CN105656634A (en) * 2016-01-12 2016-06-08 上海第二工业大学 Privacy protection batch authentication method without pairing operation in vehicular ad hoc network
CN105763558B (en) * 2016-01-20 2018-08-24 华东师范大学 Distributed polymerization authentication method with secret protection in vehicular ad hoc net
CN105763558A (en) * 2016-01-20 2016-07-13 华东师范大学 Distributed aggregation authentication method having privacy protection function for vehicle-mounted self-organizing network
CN105871831A (en) * 2016-03-28 2016-08-17 江苏大学 Data fragmenting and downloading service method in vehicular network
CN106027519A (en) * 2016-05-18 2016-10-12 安徽大学 Efficient condition privacy protection and security authentication method in internet of vehicles
CN106027519B (en) * 2016-05-18 2019-03-29 安徽大学 Efficient condition privacy protection and security authentication method in Internet of vehicles
US9940142B2 (en) 2016-05-20 2018-04-10 At&T Mobility Ii Llc Connected car resource manager with associated applications control
US11348383B2 (en) 2016-05-20 2022-05-31 At&T Mobility Ii Llc Connected car resource manager with associated applications control
US10679435B2 (en) 2016-05-20 2020-06-09 At&T Mobility Ii Llc Connected car resource manager with associated applications control
CN106657021A (en) * 2016-11-24 2017-05-10 北京洋浦伟业科技发展有限公司 Vehicle message authentication method and device in Internet of Vehicles
CN107040516A (en) * 2017-01-03 2017-08-11 东南大学 A kind of efficient pseudonym management and data integrity protection protocol
CN107040516B (en) * 2017-01-03 2021-06-11 东南大学 Efficient pseudonym management and data integrity protection protocol
CN108462948A (en) * 2017-01-05 2018-08-28 大众汽车有限公司 Method, apparatus for vehicle-to-vehicle communication and the computer readable storage medium including instruction
US10693831B2 (en) 2017-01-05 2020-06-23 Volkswagen Ag Method, apparatus, and computer readable storage medium comprising instructions for vehicle-to-vehicle communication
CN107995262A (en) * 2017-11-16 2018-05-04 北京交通大学 Based on the vehicle-mounted cloud system to park cars and application method
CN108024206B (en) * 2017-11-30 2020-07-14 东北大学 Vehicle node position privacy protection system and method combined with PMIPv6 architecture
CN108024206A (en) * 2017-11-30 2018-05-11 东北大学 With reference to the vehicle node location privacy protection system and method for PMIPv6 frameworks
CN108171511B (en) * 2017-12-26 2021-08-17 广东优世联合控股集团股份有限公司 Block chain system with privacy protection function
CN108171511A (en) * 2017-12-26 2018-06-15 陈晶 A kind of block chain model with privacy protection function
CN108282757A (en) * 2018-01-24 2018-07-13 电子科技大学 VANET method for secret protection under a kind of mobile cloud service
CN109120409A (en) * 2018-03-26 2019-01-01 泰山学院 A kind of digital signature method for secure communication in Internet of Things
CN109120409B (en) * 2018-03-26 2021-05-28 泰山学院 Digital signature method for secure communication in Internet of things
CN108964919A (en) * 2018-05-02 2018-12-07 西南石油大学 The lightweight anonymous authentication method with secret protection based on car networking
CN108964919B (en) * 2018-05-02 2021-01-26 西南石油大学 Lightweight anonymous authentication method with privacy protection based on Internet of vehicles
CN109194610A (en) * 2018-07-24 2019-01-11 北京交通大学 Vehicle-mounted mist data lightweight anonymous access authentication method based on block chain auxiliary
CN108965313A (en) * 2018-07-31 2018-12-07 安徽大学 Vehicle violation information publishing method, system and storage medium
CN109561383A (en) * 2018-12-17 2019-04-02 昆明理工大学 A kind of location privacy protection method based on dynamic assumed name exchange area
CN110071797A (en) * 2019-02-01 2019-07-30 湖州师范学院 The method of assumed name change car networking privacy-protection certification based on mixing context
CN110071797B (en) * 2019-02-01 2021-10-12 湖州师范学院 Method for changing privacy protection authentication of internet of vehicles based on pseudonymous names of mixed contexts
CN109788482B (en) * 2019-02-26 2021-09-03 武汉大学 Method and system for anonymous authentication of messages between vehicles in Internet of vehicles environment
CN109788482A (en) * 2019-02-26 2019-05-21 武汉大学 Message anonymous authentication method and system under a kind of car networking environment between vehicle
CN110008752A (en) * 2019-04-12 2019-07-12 北京理工大学 A kind of platooning's evaluation method based on secret protection
CN110008752B (en) * 2019-04-12 2020-10-09 北京理工大学 Vehicle formation evaluation method based on privacy protection
CN110233724B (en) * 2019-05-15 2021-10-12 上海大学 Vehicle networking private data protection method based on double pseudonyms in fog computing environment
CN110233724A (en) * 2019-05-15 2019-09-13 上海大学 Mist calculates the car networking private data guard method based on dual assumed name under environment
CN110446183A (en) * 2019-06-01 2019-11-12 西安邮电大学 Car networking system and working method based on block chain
CN110446183B (en) * 2019-06-01 2022-04-08 西安邮电大学 Vehicle networking system based on block chain and working method
CN111107071B (en) * 2019-12-10 2022-04-05 重庆邮电大学 Electric vehicle charging service method capable of protecting privacy
CN111107071A (en) * 2019-12-10 2020-05-05 重庆邮电大学 Electric vehicle charging service method capable of protecting privacy
CN111885544A (en) * 2020-07-16 2020-11-03 暨南大学 Emergency message dissemination method and system with trust management and privacy protection functions in Internet of vehicles
CN111885544B (en) * 2020-07-16 2023-12-29 暨南大学 Emergency message dissemination method and system for considering trust management and privacy protection in Internet of vehicles
CN112261078A (en) * 2020-09-11 2021-01-22 山东师范大学 Block chain-based road rescue privacy protection system and method in fog computing environment
CN112261078B (en) * 2020-09-11 2022-09-13 山东师范大学 Block chain-based road rescue privacy protection system and method in fog computing environment
CN113364598A (en) * 2021-06-04 2021-09-07 江苏大学 Batch authentication method for privacy protection in Internet of vehicles environment
CN113364598B (en) * 2021-06-04 2022-10-11 江苏大学 Batch authentication method for privacy protection in Internet of vehicles environment
CN113992388A (en) * 2021-10-26 2022-01-28 北京工业大学 Method for realizing vehicle identity condition privacy protection based on RSU
CN113992388B (en) * 2021-10-26 2024-06-07 北京工业大学 Method for realizing privacy protection of vehicle identity condition based on RSU

Similar Documents

Publication Publication Date Title
CN104853351A (en) Internet of Vehicles distributed authentication method based on controllable privacy
CN111684760B (en) Cryptographic method and system for managing digital certificates
Zhong et al. Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks
Lo et al. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings
JP7074863B2 (en) Encryption method and system using activation code for withdrawal of digital certificate
CN104394000A (en) Batched certification method based on pseudonym verification public key in vehicle-mounted network
CN104683112A (en) Vehicle-vehicle security communication method based on RSU assisted authentication
Xue et al. LPA: a new location‐based privacy‐preserving authentication protocol in VANET
Liu et al. An efficient anonymous authentication protocol using batch operations for VANETs
CN104219663A (en) A method and system for certificating vehicle identity
CN105812354B (en) Location privacy protection method based on attack resistance in car networking under a kind of LBS background
Chim et al. Security and privacy issues for inter-vehicle communications in VANETs
Chim et al. MLAS: Multiple level authentication scheme for VANETs
CN104010302A (en) Vehicle-mounted self-organizing network traffic data trust evaluation method
Ahamed et al. EMBA: An efficient anonymous mutual and batch authentication schemes for vanets
CN112243234A (en) Identity-based privacy security protection method for Internet of vehicles
CN116321154A (en) Efficient message authentication method based on zero knowledge proof in Internet of vehicles environment
CN114430552B (en) Vehicle networking v2v efficient communication method based on message pre-authentication technology
Shen et al. An efficient public key management system: an application in vehicular ad hoc networks
Jayashree et al. LAPEP—Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network
Funderburg et al. Efficient short group signatures for conditional privacy in vehicular ad hoc networks via ID caching and timed revocation
Yang et al. A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature
Navdeti et al. Privacy preservation and secure data sharing scheme in fog based vehicular ad-hoc network
Ullmann et al. Secure Vehicle-to-Infrastructure Communication: Secure Roadside Stations, Key Management, and Crypto Agility
Singh et al. Pseudo-identity based secure communication scheme for vehicular ad-hoc networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150819