CN104853351A - Internet of Vehicles distributed authentication method based on controllable privacy - Google Patents
Internet of Vehicles distributed authentication method based on controllable privacy Download PDFInfo
- Publication number
- CN104853351A CN104853351A CN201510125985.5A CN201510125985A CN104853351A CN 104853351 A CN104853351 A CN 104853351A CN 201510125985 A CN201510125985 A CN 201510125985A CN 104853351 A CN104853351 A CN 104853351A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- rsu
- signature
- message
- private key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an Internet of Vehicles distributed authentication method based on controllable privacy, relates to the field of vehicle network communication safety, and specifically relates to an Internet of Vehicles distributed authentication method based on controllable privacy. The method specifically includes five following steps: system initialization; private key update of fake names and a part of signatures; message signature; message authentication of signatures; and real identity tracking and revocation. According to the method, the double hash chain is employed to establish the fake names, the communication cost for invalidating a vehicle identity is irrelevant to the numbers of the fake names and a part of the signature private keys of the vehicle, a vehicle user can update multiple parts of signature private keys by the adoption of one authorization, and the burden of trusted authority (TA) and road-side units (RSU) is reduced; when a message with a controversial signature occurs, the TA can distinguish whether the signature is forged by the RSU according to re-signature of the message uploaded by the vehicle, and the problem of non-repudiation in the distributed environment is solved. According to the method, the security is high, the cost is low, and the method is applicable to node high-speed movement, topology structure volatility, and large-scale VANET network.
Description
Technical field
The present invention relates to In-vehicle networking field of communication security, particularly a kind of networking of the car based on controlled privacy distributed authentication method.
Background technology
Vehicular ad hoc network is mobile ad hoc network and the sensor technology embody rule at field of traffic, and it can greatly reduce the generation of traffic safety accident, improves road efficiency and provides information service.Vehicular ad hoc network adopts Dedicated Short Range Communications, supports that the communication V2V between car and car and car and roadside unit intercom V2I two kinds of communication patterns mutually, build a self-organizing, distributed, dispose facilitate, the inter-vehicular communication network of structure opening.
The deployment of vehicle-mounted net and enforcement have huge Social and economic benef@, cause showing great attention to of industrial quarters and academia in recent years, create many important achievements in research.But the development of this technology is also faced with many challenges, while the integrality mainly guaranteeing message and confirmability, protect the privacy of driver and conductor and meet the requirement of process in real time.Forge message to meet the needs of oneself because lawless person and selfish personnel may utilize vehicle-mounted net to propagate, so data signature mechanism must be used to guarantee, the information transmitted comes from true and reliable vehicle; But these message generally include position, the direction and time etc. of vehicle, can threaten the privacy of driver and conductor, so will realize anonymous authentication by other people after being known; And in distributed identity authentication environment, realize occurring that the message traceability of dispute just must meet the non-repudiation of information signature.
In order to address these problems, there are many representational achievements in research.Raya M etc. advise adopting another name authentication mechanism in vehicular ad hoc network the earliest.Vehicle is applied for a large amount of certificate to CA and is stored onboard, and CA stores the relation of true identity and another name.Armknecht F etc. have studied the routing policy under another name mechanism, considers between protection privacy and maintenance routing stability.Fischer L etc. points out if assailant can invade CA, and another name mechanism just loses the effect of secret protection.For this reason, author advises that vehicle adopts Proxy Signature from multiple CA application another name, which greatly enhances the threshold of privacy leakage.But the program generates but alias expense is too large, and the another name of the malice vehicle that cannot singlely cancel.Above-mentioned another name mechanism is all concentrated authorization, namely once obtains a large amount of another name certificates.Like this, greatly increased the weight of the burden of Certificate Authority, and the certificate that the vehicle that cancels will be held all cancels, and this means sizable calcellation expense.
For another name mechanism, the another name number that minimizing vehicle carries is the effective ways reducing calcellation expense.The suggestion such as Bellur adopts distributed certificate management mode, allows vehicle to upgrade another name by RSU in normal traveling process.Whole Region dividing is become some subregions, and every alias certificate can only use in a sub regions.Certain member of such calcellation just only needs to notice it and has the subregion calling place.The ECPP scheme that Lu etc. propose decreases the radio transmission expense of calcellation list and the storage overhead of common vehicle.Wasef etc. propose vehicle can apply for certificate from RSU as required, and author reduces the reliability rating of RSU under study for action, think that RSU is half believable, but the deficiency of the program is that the cost recovering malice testing vehicle register is larger.Priya etc. propose GAP scheme, and the program uses group ranking and batch certification, but does not reach the non-repudiation under distributed bad border, and in the program, the vehicle RSU that can countercharge forges a signature.
Summary of the invention
The object of the invention is to a kind of car based on controlled privacy networking distributed authentication method, reduce RSU computing cost and communication overhead, alleviate the burden of TA and RSU, solve the undeniable sex chromosome mosaicism of transmit leg under distributed environment, thus realize the Distributed Anonymous certification of the safety and efficiently rate in vehicle-mounted net.
In order to solve above technical problem, the present invention adopts the signature scheme of the part signature private key of secret value and the RSU place acquisition of providing based on authoritative institution, and the concrete technical scheme of car networking distributed authentication method proposed based on controlled privacy is as follows:
Based on a car networking distributed authentication method for controlled privacy, it is characterized in that comprising following steps:
Step one, system initialization: authoritative institution chooses common parameter, for RSU and vehicle are registered;
Step 2, assumed name and part signature private key upgrade: the identity of certifying authority vehicle, and for part signature private key request certificate provided by vehicle, described vehicle obtains a collection of corresponding part signature private key according to part signature private key request certificate from RSU;
Step 3, information signature: the secret value that vehicle utilizes authoritative institution to provide and the part signature private key that RSU place obtains are signed to message, obtain the message of signing; Described information signature have employed the secret value of authoritative institution's granting and the part signature private key of RSU granting simultaneously;
Step 4, the message authentication of signature: vehicle sends the message of signature according to other vehicle received, carries out certification to the message of signature;
Step 5, the tracking of true identity with cancel: when disputing on appears in the message of signature, authoritative institution tracks the true identity of vehicle according to the message of signing, and is cancelled by described testing vehicle register.
Described step one is specially further:
Process one, a Big prime p selects in authoritative institution, selects two constant a, b ∈ Z
pmake 4a
3+ 27b
2≠ 0 mod p, definition Z
pon elliptic curve E:y
2=x
3+ ax+b by one based on congruence expression y
2=x
3disaggregation and an infinite point O of+ax+b mod p form, if P is that on E, rank are a point of prime number q, TA selects a random number
as system master key, computing system PKI PK
tA=SK
tAp ∈ G, then select two Hash functions
with the cryptographic algorithm Enc of a safety
k(), last TA public address system parameter (q, P, G, H
1, H
2, Enc
k());
Process two, when vehicle registration, TA is to vehicle V
idistribute a true identity RID
i∈ G, and the public private key pair that traditional
wherein
last TA is V
iselect the seed of two hash chains
with
l is the number of the seed generation assumed name of two hash chains, and stores the mapping relations of true identity and hash chain seed;
Process three, TA is that each RSU selects a random number
as the private key of RSU, and calculate
as the PKI of RSU, finally by R
i=(RSU
i|| L
i),
with
safe sends RSU to, wherein L
ibe the positional information of RSU, thus obtain certificate
Described step 2 is specially following process further:
Process one, as vehicle V
iwhen entering RSU, vehicle V
iselect a random number r', then will by RSU
send to TA, r' is used to prevent opponent from collecting information, thus obtains this vehicle through which RSU; TA decrypt X, checks RID
iwhether cancelling in chained list; Vehicle V in each RSU
ithe assumed name quantity upgraded once is needed to be fixing, at R
ithe interior quantity upgraded that needs is
TA is vehicle generating portion signature private key request certificate: first TA is by searching memory cell, calculates vehicle V
ithe assumed name quantity upgraded is m, and TA judges herein
whether set up, if set up TA random selecting
and calculate
then will
t
stamp,
with
with
use vehicle V
iconventional public-key
encryption generating messages
Y is sent to V by RSU
i, otherwise TA is vehicle V
iagain choose hash chain seed, TA will
add self memory space and renewal
tA chooses herein
add part signature private key request certificate, object makes, when there is the message of controversial signature, can differentiate the source of the message of signature, reach non-repudiation;
Process two, vehicle V
iafter receiving enciphered message Y, use vehicle V
itraditional private key deciphering Y, obtain U
1, t
stamp,
with
checking TA signature
validity, if signature is effectively, V
iwill
with part signature private key request certificate
There is the memory space of self, V
iwait for and obtain signature private key from RSU;
Process three, RSU broadcasts certificate termly
if
legal, vehicle V
ichoose a random number
and calculate symmetric key
and decryption factor
then, V
isend a request message to RSU
rSU calculates symmetric key
and decipher W, then proving time stamp t
stampfreshness, and signature
validity; If the verification passes, RSU calculates assumed name PID
i,j,
Choose corresponding to each assumed name RSU
calculate
Order
wherein Δ t
i,jit is the time window that part signature private key uses; Calculate
RSU handle
Send to vehicle V
i, RSU will
add the memory space of self;
Process four, vehicle V
iafter receiving message Ψ, obtain U with after φ deciphering
i,j,
Δ t
i,j, and calculate assumed name according to formula (1), finally store n
riindividual four-tuple (PID
i,j, U
i,j,
Δ t
i,j)
for information signature.
Described step 3 is specially following process further:
For message M ∈ { 0,1}
*, vehicle signature is as follows:
Process one, random selecting
calculate R
i,j=k
i,jp;
Process two, order
Process three, calculates
Then δ
i=(U
i,j, e
i,j, v
i,j) be exactly vehicle V
iwith assumed name PID
i,jto message M
isignature.
Described step 4 is specially further:
Verification algorithm: once receive the message (PID of signature
i,j, M
i, Δ t
i,j, δ
i), verifier proceeds as follows:
Process one, calculates
Process two, calculates
Process three, finally calculates
And if only if e '
i,j=e
i,jtime, verifier accepts the message of signing.
Described step 5 is specially further:
When the message of an appearance controversial signature time, according to vehicle V
iassumed name PID
i,j, TA searches for the PID of storage from self memory space
i,jcorresponding true identity, obtains vehicle V
itrue identity RID
i, TA is once obtain RID
i, just can cancel V easily
i, mainly comprise two processes;
Process one, by RID
iadd and cancel chained list (CRL), V
ican not obtain new part signature private key request certificate from TA, RSU is no longer vehicle V
idistribution unit divides signature private key
Process two, first, cancels V
ithe not yet expired assumed name obtained and part signature private key, TA is according to the memory space of self
find Current vehicle V
iobtain the RSU of assumed name and part signature private key; Then, TA will
send to RSU, C is added that the signature of RSU is broadcast to all vehicle user of RSU region by RSU; Finally, third party is after receiving C, and third party calculates the effective assumed name PID cancelling vehicle and hold at present according to formula (1)
i,j, third party is PID
i,jbe added to time window Δ t
i,jin interior local CRL.
The application has beneficial effect.Present applicant proposes a kind of car based on controlled privacy networking distributed authentication method, this application uses Double Hash chains to build assumed name, on the basis keeping anonymity, the assumed name that the communication overhead of a calcellation testing vehicle register and this car are held and part signature private key number have nothing to do, and user utilizes a mandate can upgrade multiple part signature private key, alleviates the burden of TA and RSU; Due to when the distribution of signature private key, RSU is according to part signature private key request certificates constructing part signature private key, so when having dispute message, TA can according to vehicle upload to this message again sign distinguish this signature whether be forged by RSU, solve the undeniable sex chromosome mosaicism under distributed environment.In addition, this application, no matter in the distribution of part signature private key, signature process and verification process do not need expensive to computing, and signature authentication only needs three dot products operations, has increased substantially certification speed, has been highly suitable for VANET network.
Accompanying drawing explanation
The flow chart of the networking of the car based on the controlled privacy distributed authentication method that Fig. 1 provides for the embodiment of the present invention.
The assumed name that Fig. 2 provides for the embodiment of the present invention and the flow chart that part signature private key upgrades.
The flow chart of the information signature that Fig. 3 provides for the embodiment of the present invention.
The flow chart of the message authentication that Fig. 4 provides for the embodiment of the present invention.
The flow chart that Fig. 5 cancels for the identity that the embodiment of the present invention provides.
Embodiment
As shown in Figure 1, the present invention has 5 steps, is respectively:
(1) system initialization: authoritative institution chooses common parameter, for RSU and vehicle are registered;
(2) assumed name and part signature private key upgrade: the identity of certifying authority vehicle, and for signature private key request certificate provided by vehicle, described vehicle obtains a collection of corresponding signature private key according to signature private key request certificate from RSU;
(3) information signature: the secret value that vehicle utilizes authoritative institution to provide and the signature private key that RSU place obtains are signed to message;
(4) message authentication of signing: vehicle sends the message of signature according to other vehicle received, carries out certification to the message of signature;
(5) true identity tracking with cancel: when disputing on appears in the message of signature, authoritative institution tracks the true identity of vehicle according to the message of signing, and is cancelled by described testing vehicle register.
Below in conjunction with specific embodiments and the drawings, the present invention is further described.
(1) initialization system: authoritative institution chooses common parameter, for RSU and vehicle are registered;
Step 1.1: described authoritative institution, selects a Big prime p, selects two constant a, b ∈ Z
pmake 4a
3+ 27b
2≠ 0 mod p, definition Z
pon elliptic curve E:y
2=x
3+ ax+b by one based on congruence expression y
2=x
3disaggregation and an infinite point O of+ax+b mod p form, if P is that on E, rank are a point of prime number q.
Step 1.2:TA selects a random number
as system master key, computing system PKI PK
tA=SK
tAp ∈ G, then select two Hash functions
with the cryptographic algorithm Enc of a safety
k(), last TA public address system parameter (q, P, G, H
1, H
2, Enc
k());
Step 1.3: when vehicle registration, TA is to vehicle V
idistribute a true identity RID
i∈ G, and the public private key pair that traditional
wherein
last TA is V
iselect the seed of two hash chains
with
suppose that the seed of every two hash chains is used for generating l assumed name, and store the mapping relations of true identity and hash chain seed;
Step 1.4:TA is that each RSU selects a random number
as the private key of RSU, and calculate
as the PKI of RSU, finally by R
i=(RSU
i|| L
i),
with
safe sends RSU to, wherein L
ibe the positional information of RSU, can certificate be obtained
(2) assumed name and part signature private key upgrade: as shown in Figure 2, the identity of certifying authority vehicle, for signature private key request certificate provided by vehicle, described vehicle obtains a collection of corresponding signature private key according to signature private key request certificate from RSU, has 18 steps.
Step 2.1: as vehicle V
iwhen entering RSU, vehicle V
iselect a random number r', then will by RSU
send to TA.
Step 2.2:TA decrypt X, checks RID
iwhether cancelling in chained list; RID
iif not cancelling in chained list, to step 2.3, otherwise to step 2.17.
Step 2.3:TA, by searching memory cell, calculates vehicle V
ithe assumed name quantity upgraded is m, and TA judges herein
whether set up, if set up to step 2.4, otherwise to step 2.5.
Step 2.4:TA random selecting
and calculate
tA generating messages
Y is sent to V by RSU
i, to step 2.6.
Step 2.5:TA is vehicle V
iagain hash chain seed is chosen, to step 2.3.
Step 2.6:TA will
add self memory space and renewal
Step 2.7: vehicle V
iafter receiving enciphered message Y, use vehicle V
itraditional private key deciphering Y, obtain U
1, t
stamp,
with
checking TA signature
validity, if TA signature valid till step 2.8.Otherwise to step 2.1.
Step 2.8:V
istore secret value
with part signature private key request certificate
Step 2.9:RSU broadcasts certificate termly
Step 2.10:V
ichecking
it is legitimacy.If certificate is legal in step 2.11, otherwise to step 2.17.
Step 2.11: vehicle V
ichoose a random number
and calculate symmetric key
and decryption factor
then, V
isend a request message to RSU
Step 2.12:RSU calculates symmetric key
and decipher W, then proving time stamp t
stampfreshness, and signature
validity; If the verification passes, to step 2.13, otherwise to step 2.17.
Step 2.13:RSU calculates assumed name PID
i,j,
Step 2.14: choose corresponding to each assumed name RSU
calculate
Order
Wherein Δ t
i,jit is the time window that part signature private key uses; Calculate
Step 2.15:RSU handle
Send to vehicle V
i, RSU incites somebody to action (
t
stamp) add self memory space;
Step 2.16: vehicle V
iafter receiving message Ψ, obtain U with after φ deciphering
i,j,
Δ t
i, j, and according to the assumed name of formula (1) calculating above, finally store
individual four-tuple (PID
i,j, U
i,j,
Δ t
i,j)
for information signature.To step 2.18.
Step 2.17: protocol ends.
Step 2.18: assumed name and part signature private key upgrade and terminate.
So far assumed name and part signature private key upgrade and terminate, the message that in described Handshake Protocol, assailant is stolen by network monitoring, because do not decipher secret key can not decipher the content obtaining message, ensure that the confidentiality of message, with respective signature, each message ensure that message is not tampered.
(3) information signature: described information signature is characterised in that signature have employed the secret value of authoritative institution's granting and the signature private key of RSU granting simultaneously, as shown in Figure 3, has 3 steps.
For message M
i∈ { 0,1}
*, vehicle signature is as follows:
Step 3.1: vehicle random selecting
calculate R
i,j=k
i,jp;
Step 3.2: vehicle makes
Step 3.3: vehicle calculates
Then δ
i=(U
i,j, e
i,j, v
i,j) be exactly vehicle V
iwith assumed name PID
i,jto message M
isignature.
So far information signature terminates, and described endorsement method cannot be forged, because the signature of the method not only needs secret value but also need part signature private key.Even if after RSU is attacked, forge a signature, also can review the source of message, as long as vehicle produces two signatures to message, whether TA can decision message be just that RSU forges.And the practical assumed name communication of the method, assumed name just with once, reaches identity anonymous and track not trackability well at every turn.
(4) message authentication: as shown in Figure 4, vehicle sends the message of signature according to other vehicle received, and carries out certification to the message of signature;
Verification algorithm: once receive the message (PID of signature
i,j, M
i, Δ t
i,j, δ
i), verifier proceeds as follows:
Step 4.1: verifier calculates
Step 4.2: verifier calculates
Step 4.3: last verifier calculates
Step 4.4: if e '
i,j=e
i,jtime, verifier accepts the message of signing, otherwise abandons this message.
So far, the message authentication of signature terminates, described authentication method, only needs the time of three dot products, and do not need expensive to computing, authentication efficiency is very high.
(5) true identity tracking with cancel: as shown in Figure 5, when dispute appears in the message of signature, authoritative institution tracks the true identity of vehicle according to the message of signature, and is cancelled by described testing vehicle register.
Step 5.1:TA is by RID
iadd and cancel chained list (CRL).
Step 5.2:TA is according to the memory space of self
find Current vehicle V
iobtain the RSU of assumed name and part signature private key.
Step 5.3:TA will
send to RSU.
C is added that the signature of RSU is broadcast to all vehicle user of RSU region by step 5.4:RSU.
Step 5.5: third party is after receiving C, and third party can calculate according to formula (1) the effective assumed name PID cancelling vehicle and hold at present
i,j, third party is PID
i,jbe added to time window Δ t
i,jin interior local CRL.
Claims (6)
1., based on a car networking distributed authentication method for controlled privacy, it is characterized in that comprising following steps:
Step one, system initialization: authoritative institution chooses common parameter, for RSU and vehicle are registered;
Step 2, assumed name and part signature private key upgrade: the identity of certifying authority vehicle, and for part signature private key request certificate provided by vehicle, described vehicle obtains a collection of corresponding part signature private key according to part signature private key request certificate from RSU;
Step 3, information signature: the secret value that vehicle utilizes authoritative institution to provide and the part signature private key that RSU place obtains are signed to message, obtain the message of signing; Described information signature have employed the secret value of authoritative institution's granting and the part signature private key of RSU granting simultaneously;
Step 4, the message authentication of signature: vehicle sends the message of signature according to other vehicle received, carries out certification to the message of signature;
Step 5, the tracking of true identity with cancel: when disputing on appears in the message of signature, authoritative institution tracks the true identity of vehicle according to the message of signing, and is cancelled by described testing vehicle register.
2. a kind of networking of the car based on controlled privacy distributed authentication method according to claim 1, is characterized in that described step one is specially further:
Process one, a Big prime p selects in authoritative institution, selects two constant a, b ∈ Z
pmake 4a
3+ 27b
2≠ 0 mod p, definition Z
pon elliptic curve E:y
2=x
3+ ax+b by one based on congruence expression y
2=x
3disaggregation and an infinite point O of+ax+b mod p form, if P is that on E, rank are a point of prime number q, TA selects a random number
as system master key, computing system PKI PK
tA=SK
tAp ∈ G, then select two Hash functions
with the cryptographic algorithm Enc of a safety
k(), last TA public address system parameter (q, P, G, H
1, H
2, Enc
k());
Process two, when vehicle registration, TA is to vehicle V
idistribute a true identity RID
i∈ G, and the public private key pair that traditional
wherein
last TA is V
iselect the seed of two hash chains
with
l is the number of the seed generation assumed name of two hash chains, and stores the mapping relations of true identity and hash chain seed;
Process three, TA is that each RSU selects a random number
as the private key of RSU, and calculate
as the PKI of RSU, finally by R
i=(RSU
i|| L
i),
with
safe sends RSU to, wherein L
ibe the positional information of RSU, thus obtain certificate
3. a kind of networking of the car based on controlled privacy distributed authentication method according to claim 1, is characterized in that described step 2 is specially following process further:
Process one, as vehicle V
iwhen entering RSU, vehicle V
iselect a random number r', then will by RSU
send to TA, r' is used to prevent opponent from collecting information, thus obtains this vehicle through which RSU; TA decrypt X, checks RID
iwhether cancelling in chained list; Vehicle V in each RSU
ithe assumed name quantity upgraded once is needed to be fixing, at R
ithe interior quantity upgraded that needs is
TA is vehicle generating portion signature private key request certificate: first TA is by searching memory cell, calculates vehicle V
ithe assumed name quantity upgraded is m, and TA judges herein
whether set up, if set up TA random selecting
and calculate
then will
t
stamp,
with
with
use vehicle V
iconventional public-key
encryption generating messages
Y is sent to V by RSU
i, otherwise TA is vehicle V
iagain choose hash chain seed, TA will
add self memory space and renewal
tA chooses herein
add part signature private key request certificate, object makes, when there is the message of controversial signature, can differentiate the source of the message of signature, reach non-repudiation;
Process two, vehicle V
iafter receiving enciphered message Y, use vehicle V
itraditional private key deciphering Y, obtain U
1,
with
checking TA signature
validity, if signature is effectively, V
iwill
with part signature private key request certificate
There is the memory space of self, V
iwait for and obtain signature private key from RSU;
Process three, RSU broadcasts certificate termly
if
legal, vehicle V
ichoose a random number
and calculate symmetric key
and decryption factor
then, V
isend a request message to RSU
rSU calculates symmetric key
and decipher W, then proving time stamp t
stampfreshness, and signature
validity; If the verification passes, RSU calculates assumed name PID
i,j,
Choose corresponding to each assumed name RSU
calculate
order
wherein Δ t
i,jit is the time window that part signature private key uses; Calculate
RSU handle
Send to vehicle V
i, RSU will
add the memory space of self;
Process four, vehicle V
iafter receiving message Ψ, obtain U with after φ deciphering
i,j,
Δ t
i,j, and calculate assumed name according to formula (1), finally store
individual four-tuple
for information signature.
4. a kind of networking of the car based on controlled privacy distributed authentication method according to claim 1, is characterized in that described step 3 is specially following process further:
For message M
i∈ { 0,1}
*, vehicle signature is as follows:
Process one, random selecting
calculate R
i,j=k
i,jp;
Process two, order
Process three, calculates
Then δ
i=(U
i,j, e
i,j, v
i,j) be exactly vehicle V
iwith assumed name PID
i,jto message M
isignature.
5. a kind of networking of the car based on controlled privacy distributed authentication method according to claim 1, is characterized in that described step 4 is specially further:
Verification algorithm: once receive the message (PID of signature
i,j, M
i, Δ t
i,j, δ
i), verifier proceeds as follows:
Process one, calculates
Process two, calculates
Process three, finally calculates
And if only if e '
i,j=e
i,jtime, verifier accepts the message of signing.
6. a kind of networking of the car based on controlled privacy distributed authentication method according to claim 1, is characterized in that described step 5 is specially further:
When the message of an appearance controversial signature time, according to vehicle V
iassumed name PID
i,j, TA searches for the PID of storage from self memory space
i,jcorresponding true identity, obtains vehicle V
itrue identity RID
i, TA is once obtain RID
i, just can cancel V easily
i, mainly comprise two processes;
Process one, by RID
iadd and cancel chained list (CRL), V
ican not obtain new part signature private key request certificate from TA, RSU is no longer vehicle V
idistribution unit divides signature private key
Process two, first, cancels V
ithe not yet expired assumed name obtained and part signature private key, TA is according to the memory space of self
find Current vehicle V
iobtain the RSU of assumed name and part signature private key; Then, TA will
send to RSU, C is added that the signature of RSU is broadcast to all vehicle user of RSU region by RSU; Finally, third party is after receiving C, and third party calculates the effective assumed name PID cancelling vehicle and hold at present according to formula (1)
i,j, third party is PID
i,jbe added to time window Δ t
i,jin the CRL (local CRL) of interior RSU region.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510125985.5A CN104853351A (en) | 2015-03-20 | 2015-03-20 | Internet of Vehicles distributed authentication method based on controllable privacy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510125985.5A CN104853351A (en) | 2015-03-20 | 2015-03-20 | Internet of Vehicles distributed authentication method based on controllable privacy |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104853351A true CN104853351A (en) | 2015-08-19 |
Family
ID=53852626
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510125985.5A Pending CN104853351A (en) | 2015-03-20 | 2015-03-20 | Internet of Vehicles distributed authentication method based on controllable privacy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104853351A (en) |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105656634A (en) * | 2016-01-12 | 2016-06-08 | 上海第二工业大学 | Privacy protection batch authentication method without pairing operation in vehicular ad hoc network |
CN105763558A (en) * | 2016-01-20 | 2016-07-13 | 华东师范大学 | Distributed aggregation authentication method having privacy protection function for vehicle-mounted self-organizing network |
CN105871831A (en) * | 2016-03-28 | 2016-08-17 | 江苏大学 | Data fragmenting and downloading service method in vehicular network |
CN106027519A (en) * | 2016-05-18 | 2016-10-12 | 安徽大学 | Efficient condition privacy protection and security authentication method in internet of vehicles |
CN106657021A (en) * | 2016-11-24 | 2017-05-10 | 北京洋浦伟业科技发展有限公司 | Vehicle message authentication method and device in Internet of Vehicles |
CN107040516A (en) * | 2017-01-03 | 2017-08-11 | 东南大学 | A kind of efficient pseudonym management and data integrity protection protocol |
US9940142B2 (en) | 2016-05-20 | 2018-04-10 | At&T Mobility Ii Llc | Connected car resource manager with associated applications control |
CN107995262A (en) * | 2017-11-16 | 2018-05-04 | 北京交通大学 | Based on the vehicle-mounted cloud system to park cars and application method |
CN108024206A (en) * | 2017-11-30 | 2018-05-11 | 东北大学 | With reference to the vehicle node location privacy protection system and method for PMIPv6 frameworks |
CN108171511A (en) * | 2017-12-26 | 2018-06-15 | 陈晶 | A kind of block chain model with privacy protection function |
CN108282757A (en) * | 2018-01-24 | 2018-07-13 | 电子科技大学 | VANET method for secret protection under a kind of mobile cloud service |
CN108462948A (en) * | 2017-01-05 | 2018-08-28 | 大众汽车有限公司 | Method, apparatus for vehicle-to-vehicle communication and the computer readable storage medium including instruction |
CN108965313A (en) * | 2018-07-31 | 2018-12-07 | 安徽大学 | Vehicle violation information publishing method, system and storage medium |
CN108964919A (en) * | 2018-05-02 | 2018-12-07 | 西南石油大学 | The lightweight anonymous authentication method with secret protection based on car networking |
CN109120409A (en) * | 2018-03-26 | 2019-01-01 | 泰山学院 | A kind of digital signature method for secure communication in Internet of Things |
CN109194610A (en) * | 2018-07-24 | 2019-01-11 | 北京交通大学 | Vehicle-mounted mist data lightweight anonymous access authentication method based on block chain auxiliary |
CN109561383A (en) * | 2018-12-17 | 2019-04-02 | 昆明理工大学 | A kind of location privacy protection method based on dynamic assumed name exchange area |
CN109788482A (en) * | 2019-02-26 | 2019-05-21 | 武汉大学 | Message anonymous authentication method and system under a kind of car networking environment between vehicle |
CN110008752A (en) * | 2019-04-12 | 2019-07-12 | 北京理工大学 | A kind of platooning's evaluation method based on secret protection |
CN110071797A (en) * | 2019-02-01 | 2019-07-30 | 湖州师范学院 | The method of assumed name change car networking privacy-protection certification based on mixing context |
CN110233724A (en) * | 2019-05-15 | 2019-09-13 | 上海大学 | Mist calculates the car networking private data guard method based on dual assumed name under environment |
CN110446183A (en) * | 2019-06-01 | 2019-11-12 | 西安邮电大学 | Car networking system and working method based on block chain |
CN111107071A (en) * | 2019-12-10 | 2020-05-05 | 重庆邮电大学 | Electric vehicle charging service method capable of protecting privacy |
CN111885544A (en) * | 2020-07-16 | 2020-11-03 | 暨南大学 | Emergency message dissemination method and system with trust management and privacy protection functions in Internet of vehicles |
CN112261078A (en) * | 2020-09-11 | 2021-01-22 | 山东师范大学 | Block chain-based road rescue privacy protection system and method in fog computing environment |
CN113364598A (en) * | 2021-06-04 | 2021-09-07 | 江苏大学 | Batch authentication method for privacy protection in Internet of vehicles environment |
CN113992388A (en) * | 2021-10-26 | 2022-01-28 | 北京工业大学 | Method for realizing vehicle identity condition privacy protection based on RSU |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104219663A (en) * | 2013-05-30 | 2014-12-17 | 江苏大学 | A method and system for certificating vehicle identity |
CN104394000A (en) * | 2014-12-11 | 2015-03-04 | 江苏大学 | Batched certification method based on pseudonym verification public key in vehicle-mounted network |
-
2015
- 2015-03-20 CN CN201510125985.5A patent/CN104853351A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104219663A (en) * | 2013-05-30 | 2014-12-17 | 江苏大学 | A method and system for certificating vehicle identity |
CN104394000A (en) * | 2014-12-11 | 2015-03-04 | 江苏大学 | Batched certification method based on pseudonym verification public key in vehicle-mounted network |
Non-Patent Citations (2)
Title |
---|
YILIANG LIU: "Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks", 《IEEE XPLORE》 * |
刘辉等: "《采用群组密钥管理的分布式车联网信息认证方案》", 《西安交通大学学报》 * |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105656634B (en) * | 2016-01-12 | 2019-07-02 | 上海第二工业大学 | Secret protection batch authentication method without pairing operation in vehicular ad hoc network |
CN105656634A (en) * | 2016-01-12 | 2016-06-08 | 上海第二工业大学 | Privacy protection batch authentication method without pairing operation in vehicular ad hoc network |
CN105763558B (en) * | 2016-01-20 | 2018-08-24 | 华东师范大学 | Distributed polymerization authentication method with secret protection in vehicular ad hoc net |
CN105763558A (en) * | 2016-01-20 | 2016-07-13 | 华东师范大学 | Distributed aggregation authentication method having privacy protection function for vehicle-mounted self-organizing network |
CN105871831A (en) * | 2016-03-28 | 2016-08-17 | 江苏大学 | Data fragmenting and downloading service method in vehicular network |
CN106027519A (en) * | 2016-05-18 | 2016-10-12 | 安徽大学 | Efficient condition privacy protection and security authentication method in internet of vehicles |
CN106027519B (en) * | 2016-05-18 | 2019-03-29 | 安徽大学 | Efficient condition privacy protection and security authentication method in Internet of vehicles |
US9940142B2 (en) | 2016-05-20 | 2018-04-10 | At&T Mobility Ii Llc | Connected car resource manager with associated applications control |
US11348383B2 (en) | 2016-05-20 | 2022-05-31 | At&T Mobility Ii Llc | Connected car resource manager with associated applications control |
US10679435B2 (en) | 2016-05-20 | 2020-06-09 | At&T Mobility Ii Llc | Connected car resource manager with associated applications control |
CN106657021A (en) * | 2016-11-24 | 2017-05-10 | 北京洋浦伟业科技发展有限公司 | Vehicle message authentication method and device in Internet of Vehicles |
CN107040516A (en) * | 2017-01-03 | 2017-08-11 | 东南大学 | A kind of efficient pseudonym management and data integrity protection protocol |
CN107040516B (en) * | 2017-01-03 | 2021-06-11 | 东南大学 | Efficient pseudonym management and data integrity protection protocol |
CN108462948A (en) * | 2017-01-05 | 2018-08-28 | 大众汽车有限公司 | Method, apparatus for vehicle-to-vehicle communication and the computer readable storage medium including instruction |
US10693831B2 (en) | 2017-01-05 | 2020-06-23 | Volkswagen Ag | Method, apparatus, and computer readable storage medium comprising instructions for vehicle-to-vehicle communication |
CN107995262A (en) * | 2017-11-16 | 2018-05-04 | 北京交通大学 | Based on the vehicle-mounted cloud system to park cars and application method |
CN108024206B (en) * | 2017-11-30 | 2020-07-14 | 东北大学 | Vehicle node position privacy protection system and method combined with PMIPv6 architecture |
CN108024206A (en) * | 2017-11-30 | 2018-05-11 | 东北大学 | With reference to the vehicle node location privacy protection system and method for PMIPv6 frameworks |
CN108171511B (en) * | 2017-12-26 | 2021-08-17 | 广东优世联合控股集团股份有限公司 | Block chain system with privacy protection function |
CN108171511A (en) * | 2017-12-26 | 2018-06-15 | 陈晶 | A kind of block chain model with privacy protection function |
CN108282757A (en) * | 2018-01-24 | 2018-07-13 | 电子科技大学 | VANET method for secret protection under a kind of mobile cloud service |
CN109120409A (en) * | 2018-03-26 | 2019-01-01 | 泰山学院 | A kind of digital signature method for secure communication in Internet of Things |
CN109120409B (en) * | 2018-03-26 | 2021-05-28 | 泰山学院 | Digital signature method for secure communication in Internet of things |
CN108964919A (en) * | 2018-05-02 | 2018-12-07 | 西南石油大学 | The lightweight anonymous authentication method with secret protection based on car networking |
CN108964919B (en) * | 2018-05-02 | 2021-01-26 | 西南石油大学 | Lightweight anonymous authentication method with privacy protection based on Internet of vehicles |
CN109194610A (en) * | 2018-07-24 | 2019-01-11 | 北京交通大学 | Vehicle-mounted mist data lightweight anonymous access authentication method based on block chain auxiliary |
CN108965313A (en) * | 2018-07-31 | 2018-12-07 | 安徽大学 | Vehicle violation information publishing method, system and storage medium |
CN109561383A (en) * | 2018-12-17 | 2019-04-02 | 昆明理工大学 | A kind of location privacy protection method based on dynamic assumed name exchange area |
CN110071797A (en) * | 2019-02-01 | 2019-07-30 | 湖州师范学院 | The method of assumed name change car networking privacy-protection certification based on mixing context |
CN110071797B (en) * | 2019-02-01 | 2021-10-12 | 湖州师范学院 | Method for changing privacy protection authentication of internet of vehicles based on pseudonymous names of mixed contexts |
CN109788482B (en) * | 2019-02-26 | 2021-09-03 | 武汉大学 | Method and system for anonymous authentication of messages between vehicles in Internet of vehicles environment |
CN109788482A (en) * | 2019-02-26 | 2019-05-21 | 武汉大学 | Message anonymous authentication method and system under a kind of car networking environment between vehicle |
CN110008752A (en) * | 2019-04-12 | 2019-07-12 | 北京理工大学 | A kind of platooning's evaluation method based on secret protection |
CN110008752B (en) * | 2019-04-12 | 2020-10-09 | 北京理工大学 | Vehicle formation evaluation method based on privacy protection |
CN110233724B (en) * | 2019-05-15 | 2021-10-12 | 上海大学 | Vehicle networking private data protection method based on double pseudonyms in fog computing environment |
CN110233724A (en) * | 2019-05-15 | 2019-09-13 | 上海大学 | Mist calculates the car networking private data guard method based on dual assumed name under environment |
CN110446183A (en) * | 2019-06-01 | 2019-11-12 | 西安邮电大学 | Car networking system and working method based on block chain |
CN110446183B (en) * | 2019-06-01 | 2022-04-08 | 西安邮电大学 | Vehicle networking system based on block chain and working method |
CN111107071B (en) * | 2019-12-10 | 2022-04-05 | 重庆邮电大学 | Electric vehicle charging service method capable of protecting privacy |
CN111107071A (en) * | 2019-12-10 | 2020-05-05 | 重庆邮电大学 | Electric vehicle charging service method capable of protecting privacy |
CN111885544A (en) * | 2020-07-16 | 2020-11-03 | 暨南大学 | Emergency message dissemination method and system with trust management and privacy protection functions in Internet of vehicles |
CN111885544B (en) * | 2020-07-16 | 2023-12-29 | 暨南大学 | Emergency message dissemination method and system for considering trust management and privacy protection in Internet of vehicles |
CN112261078A (en) * | 2020-09-11 | 2021-01-22 | 山东师范大学 | Block chain-based road rescue privacy protection system and method in fog computing environment |
CN112261078B (en) * | 2020-09-11 | 2022-09-13 | 山东师范大学 | Block chain-based road rescue privacy protection system and method in fog computing environment |
CN113364598A (en) * | 2021-06-04 | 2021-09-07 | 江苏大学 | Batch authentication method for privacy protection in Internet of vehicles environment |
CN113364598B (en) * | 2021-06-04 | 2022-10-11 | 江苏大学 | Batch authentication method for privacy protection in Internet of vehicles environment |
CN113992388A (en) * | 2021-10-26 | 2022-01-28 | 北京工业大学 | Method for realizing vehicle identity condition privacy protection based on RSU |
CN113992388B (en) * | 2021-10-26 | 2024-06-07 | 北京工业大学 | Method for realizing privacy protection of vehicle identity condition based on RSU |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104853351A (en) | Internet of Vehicles distributed authentication method based on controllable privacy | |
CN111684760B (en) | Cryptographic method and system for managing digital certificates | |
Zhong et al. | Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks | |
Lo et al. | An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings | |
JP7074863B2 (en) | Encryption method and system using activation code for withdrawal of digital certificate | |
CN104394000A (en) | Batched certification method based on pseudonym verification public key in vehicle-mounted network | |
CN104683112A (en) | Vehicle-vehicle security communication method based on RSU assisted authentication | |
Xue et al. | LPA: a new location‐based privacy‐preserving authentication protocol in VANET | |
Liu et al. | An efficient anonymous authentication protocol using batch operations for VANETs | |
CN104219663A (en) | A method and system for certificating vehicle identity | |
CN105812354B (en) | Location privacy protection method based on attack resistance in car networking under a kind of LBS background | |
Chim et al. | Security and privacy issues for inter-vehicle communications in VANETs | |
Chim et al. | MLAS: Multiple level authentication scheme for VANETs | |
CN104010302A (en) | Vehicle-mounted self-organizing network traffic data trust evaluation method | |
Ahamed et al. | EMBA: An efficient anonymous mutual and batch authentication schemes for vanets | |
CN112243234A (en) | Identity-based privacy security protection method for Internet of vehicles | |
CN116321154A (en) | Efficient message authentication method based on zero knowledge proof in Internet of vehicles environment | |
CN114430552B (en) | Vehicle networking v2v efficient communication method based on message pre-authentication technology | |
Shen et al. | An efficient public key management system: an application in vehicular ad hoc networks | |
Jayashree et al. | LAPEP—Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network | |
Funderburg et al. | Efficient short group signatures for conditional privacy in vehicular ad hoc networks via ID caching and timed revocation | |
Yang et al. | A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature | |
Navdeti et al. | Privacy preservation and secure data sharing scheme in fog based vehicular ad-hoc network | |
Ullmann et al. | Secure Vehicle-to-Infrastructure Communication: Secure Roadside Stations, Key Management, and Crypto Agility | |
Singh et al. | Pseudo-identity based secure communication scheme for vehicular ad-hoc networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150819 |