CN111385314A - Vehicle networking safety system, device and storage medium based on block chain and cloud computing fusion mechanism - Google Patents

Vehicle networking safety system, device and storage medium based on block chain and cloud computing fusion mechanism Download PDF

Info

Publication number
CN111385314A
CN111385314A CN202010482589.9A CN202010482589A CN111385314A CN 111385314 A CN111385314 A CN 111385314A CN 202010482589 A CN202010482589 A CN 202010482589A CN 111385314 A CN111385314 A CN 111385314A
Authority
CN
China
Prior art keywords
information
module
vehicle
unit
cloud computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010482589.9A
Other languages
Chinese (zh)
Inventor
王暾
左敏江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinruixin Intelligent Iot Research Institute Nanjing Co ltd
Original Assignee
Xinruixin Intelligent Iot Research Institute Nanjing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinruixin Intelligent Iot Research Institute Nanjing Co ltd filed Critical Xinruixin Intelligent Iot Research Institute Nanjing Co ltd
Priority to CN202010482589.9A priority Critical patent/CN111385314A/en
Publication of CN111385314A publication Critical patent/CN111385314A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0125Traffic data processing
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0137Measuring and analyzing of parameters relative to traffic conditions for specific applications
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/16Anti-collision systems
    • G08G1/165Anti-collision systems for passive traffic, e.g. including static obstacles, trees
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/16Anti-collision systems
    • G08G1/166Anti-collision systems for active traffic, e.g. moving vehicles, pedestrians, bikes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Chemical & Material Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Medical Informatics (AREA)
  • Virology (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of Internet of things, in particular to a vehicle networking safety system, a device and a storage medium based on a block chain and cloud computing fusion mechanism. The system comprises a vehicle-mounted terminal unit, a network transmission unit and a cloud platform unit, wherein the vehicle-mounted terminal unit is used for acquiring information of networked vehicles in real time; the network transmission unit is used for taking charge of network transmission of information data; and the cloud platform unit is used for carrying out aggregation screening, analysis and storage on the uploaded data. The design of the invention can realize data encryption transmission, avoid the leakage of privacy information of a vehicle owner, quickly realize data analysis and prevent data loss.

Description

Vehicle networking safety system, device and storage medium based on block chain and cloud computing fusion mechanism
Technical Field
The invention relates to the technical field of Internet of things, in particular to a vehicle networking safety system, a device and a storage medium based on a block chain and cloud computing fusion mechanism.
Background
With the development of new technologies such as mobile internet, cloud computing, and the like, the internet of things technology targeting internet of everything is receiving more and more attention. The connotation of the Internet of vehicles mainly refers to: the vehicle-mounted equipment on the vehicle effectively utilizes all vehicle dynamic information in the information network platform through a wireless communication technology, and provides different functional services in the running process of the vehicle. In the car networking framework, data transmission is realized through on-vehicle wireless device to intelligent vehicle, along with the development of vehicle quantity, the data volume that needs handle in the car networking is also huge day by day, leads to the data processing load big, and then leads to the processing efficiency to reduce, and data storage loses easily, and the car networking when bringing abundant intelligent experience for the user, but also makes the car owner face security risks such as privacy information reveals, the vehicle is controlled illegally.
Disclosure of Invention
The invention aims to provide a vehicle networking safety system, a device and a storage medium based on a block chain and cloud computing fusion mechanism, so as to solve the problems in the background technology.
In order to solve the technical problems, one of the objectives of the present invention is to provide a car networking safety system based on a block chain and cloud computing fusion mechanism, which includes a vehicle-mounted terminal unit, a network transmission unit and a cloud platform unit, wherein the vehicle-mounted terminal unit is used for acquiring information of networked vehicles in real time; the network transmission unit is used for taking charge of network transmission of information data; and the cloud platform unit is used for carrying out aggregation screening, analysis and storage on the uploaded data.
As a further improvement of the technical scheme, the vehicle-mounted terminal unit comprises a vehicle information detection module, a road information feedback module, an information active feedback unit and an emergency passive feedback unit, wherein the vehicle information detection module is used for carrying out all-around detection on vehicle information, the road information feedback module is used for feeding back road information where a vehicle is located, the information active feedback unit is used for automatically feeding back the vehicle information, and the emergency passive feedback unit is used for automatically feeding back information data of the vehicle when an emergency accident happens.
The road information feedback module is designed based on a B/S architecture, the B/S architecture is divided into three layers, namely a user layer, an application layer and a data layer, the user layer is only responsible for providing a user interface, when data access or business processing is needed, a client sends a request to an application server, the application server responds to the request of the client to complete corresponding business processing or send an SQL command to a database, the database server executes corresponding query, modification or deletion operation after receiving an SQL statement, the result is returned to the server, and finally the result is returned to the client by the application server.
As a further improvement of the technical scheme, the vehicle information detection module comprises a sensor perception module and a visual perception module, the sensor perception module perceives the internal and external environments of the vehicle based on a sensor, and the visual perception module perceives the external environment information based on vision.
The sensor sensing module comprises a radar sensor, an ultrasonic sensor, a laser sensor and the like, wherein the radar sensor is used for acquiring two-dimensional or three-dimensional distance information of the surrounding environment of the vehicle through laser, microwave or sound waves and sensing the driving environment through distance or speed analysis, the sensor can directly acquire two-dimensional or three-dimensional distance information of an object with higher precision and is insensitive to the change of the illumination environment, and commonly used sensors comprise a millimeter wave radar, a laser radar and the like; common vehicle-mounted millimeter wave radars comprise short-range radars, middle-range radars and long-range radars which are respectively used for different applications, wherein the short-range radars are used for sensing scenes such as adjacent vehicles, obstacle detection, parking assistance and the like, are mainly arranged in the side area of the vehicle, are commonly used for monitoring the rear area of the vehicle, and are sometimes used as supplements of a front long-range radar sensor; the mid-range radar is used for sensing the medium distance and the speed, is mainly used in a reverse side warning system to assist a driver to leave a parking space, is used in a scene needing a narrow beam forward view, and is mainly used in an adaptive cruise system (ACC) and other safety fields, such as anti-collision application scenes.
The visual perception module is designed based on a laser radar, and the laser radar can be used for detecting other vehicles, pedestrians or obstacles in a road surface scene, identifying road boundaries and the like, and has better transverse resolution.
As a further improvement of the technical solution, the network transmission unit includes a firewall module, an access control module, a data encryption module, and a virus protection module; the firewall module is used for establishing a safety network firewall, the most complex firewall with the highest safety level in the prior art is a hidden intelligent gateway, and the hidden intelligent gateway hides the gateway behind a public system to prevent the gateway from being directly attacked. The hidden intelligent gateway provides almost transparent access to internet services, and prevents illegal access to a private network by external unauthorized access; the access control module is used for strictly authenticating and controlling the authority of the user for accessing the network resources; the data encryption module is used for encrypting data transmitted in a network; the virus protection module is used for deploying a uniform network virus prevention strategy and efficiently and timely coping with virus invasion.
As a further improvement of the technical solution, the data encryption module adopts a DES encryption algorithm, an RSA encryption algorithm, an MD5 encryption algorithm, or an IDEA encryption algorithm.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the length of a key of the DES encryption algorithm is 56 bits, the same algorithm is used for encryption and decryption, the DES encryption algorithm is used for keeping the key secret, and the DES encryption algorithm is public and comprises an encryption algorithm and a decryption algorithm.
The RSA encryption algorithm is a public key cryptosystem, in the public key cryptosystem, an encryption key is public information, a decryption key needs to be kept secret, the encryption algorithm and the decryption algorithm are also public, although the decryption key is determined by the public key, the RSA key cannot be calculated according to the calculation, in order to improve the secret strength, the RSA key is at least 500 bits long, generally 1024 bits are recommended, so that the calculation amount of encryption is large, and in order to reduce the calculation amount, a mode of combining a traditional encryption method and a public key encryption method is often adopted when information is transmitted.
The MD5 encryption algorithm is a safe hash algorithm, two different plaintexts of a person cannot obtain the same output value, but cannot obtain the original plaintexts according to the output value, namely the process is irreversible, so that no ready-made algorithm exists for decrypting the MD5, only an exhaustion method can be used, after the plaintexts which possibly appear are hashed by the MD5 algorithm, the obtained hash value and the original data form a one-to-one mapping table, the MD5 algorithm hash value of the password is decrypted by comparison in the table, and the original plaintexts corresponding to the decrypted password are found out from the mapping table through matching.
The IDEA encryption algorithm is an iterative algorithm consisting of 8 similar circles and an output transform, and each circle of the IDEA algorithm consists of the following three functions: the method comprises the steps of modular (216+1) multiplication, modular 216 addition and bitwise XOR, wherein before encryption, IDEA expands a 128-bit key into a 52-Byte encryption key through key expansion, then a decryption key is calculated from the encryption key, the encryption key and the decryption key are divided into eight groups of half keys, each group is 6-Byte in length, the first eight groups of keys are used for 8-turn encryption, and the last half group of keys are used for output transformation.
As a further improvement of the present technical solution, the cloud platform unit 300 includes an information screening module 310, an information analysis unit 320, and an information storage unit 330; the information screening module 310 is configured to screen information; the information analysis unit 320 is used for performing computer data processing analysis on the screened information; the information storage unit 330 is used for storing information into the blockchain database.
The information filtering module is implemented based on a recursive matching algorithm, and assuming that there are two records A, B, if they represent the same entity, the matching degree is defined as 1.0, otherwise, the matching degree should be 0.0. Since a record is a collection of some attribute values, record a can be decomposed into small sub-records a _ i according to the attribute values, similarly, record B can also be decomposed into a series of sub-records B _ i, and the matching between records a and B can be the matching between the sub-records, and the matching formula is:
Figure DEST_PATH_IMAGE002
asIn a further improvement of the present technical solution, the information analysis unit 320 adopts an HMM method for clustering, and gives n sequences
Figure DEST_PATH_IMAGE004
The index set is
Figure DEST_PATH_IMAGE006
The specified integer K, calculate one
Figure DEST_PATH_IMAGE008
Is distributed
Figure DEST_PATH_IMAGE010
And K HMM models
Figure DEST_PATH_IMAGE012
So that the objective function takes the maximum value, which is expressed as:
Figure DEST_PATH_IMAGE014
wherein,
Figure DEST_PATH_IMAGE016
is a likelihood function, i.e. in a model
Figure DEST_PATH_IMAGE018
Lower generation sequence
Figure DEST_PATH_IMAGE020
The probability density of (c).
As a further improvement of the technical solution, the information storage unit employs a blockchain database, the blockchain database is composed of a plurality of dispersed nodes, each node in the blockchain participates in the whole data management process, and in the face of the problem of content modification in the database, all nodes verify new modification, and only under the condition that most or even all nodes agree, the modification is confirmed to be written into the database, which is the consensus mechanism of the blockchain database.
The invention also provides a car networking safety device based on a block chain and cloud computing fusion mechanism, which comprises a processor, a memory and a computer program stored in the memory and running on the processor, wherein the processor is used for realizing any car networking safety system based on the block chain and cloud computing fusion mechanism when executing the computer program.
It is a further object of the present invention that the computer readable storage medium stores a computer program, and the computer program, when executed by a processor, implements any one of the car networking security systems based on the blockchain and cloud computing fusion mechanism.
Compared with the prior art, the invention has the beneficial effects that: in the car networking safety system, the car networking safety device and the car networking storage medium based on the block chain and cloud computing fusion mechanism, information of networked vehicles can be collected in real time through the arranged vehicle-mounted terminal unit, the firewall module, the access control module, the data encryption module and the virus protection module are arranged in the network transmission unit, data encryption transmission is achieved, privacy information of a car owner can be prevented from being leaked, meanwhile, the information analysis unit is adopted, data analysis is rapidly achieved through an HMM method clustering method, data are stored in the block chain database, and data loss is prevented.
Drawings
Fig. 1 is a block diagram of a car networking security system of embodiment 1;
FIG. 2 is a block diagram of a vehicle-mounted terminal unit according to embodiment 1;
fig. 3 is a block diagram of a network transmission unit module of embodiment 1;
fig. 4 is a block diagram of a cloud platform unit module of embodiment 1;
fig. 5 is a schematic view of the car networking safety structure of embodiment 1.
The various reference numbers in the figures mean:
100. a vehicle-mounted terminal unit; 110. a vehicle information detection module; 120. a road information feedback module; 130. an information active feedback unit; 140. an emergency passive feedback unit;
200. a network transmission unit; 210. a firewall module; 220. an access control module; 230. a data encryption module; 240. a virus protection module;
300. a cloud platform unit; 310. an information screening module; 320. an information analysis unit; 330. an information storage unit.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
As shown in fig. 1 to 5, the present embodiment provides a car networking security system based on a block chain and cloud computing fusion mechanism, including a vehicle-mounted terminal unit 100, a network transmission unit 200, and a cloud platform unit 300, where the vehicle-mounted terminal unit 100 is configured to collect information of networked vehicles in real time; the network transmission unit 200 is used for taking charge of network transmission of information data; the cloud platform unit 300 is used for aggregating, screening, analyzing and storing the uploaded data.
In this embodiment, the vehicle-mounted terminal unit 100 includes a vehicle information detection module 110, a road information feedback module 120, an information active feedback unit 130, and an emergency passive feedback unit 140, where the vehicle information detection module 110 is configured to perform all-around detection on vehicle information, the road information feedback module 120 is configured to perform feedback on road information where a vehicle is located, the information active feedback unit 130 is configured to automatically feedback vehicle information, and the emergency passive feedback unit 140 is configured to automatically feedback information data of the vehicle when an emergency accident occurs.
Further, the road information feedback module 120 is designed based on a B/S architecture, and is divided into three layers in the B/S architecture, which are a user layer, an application layer, and a data layer, where the user layer is only responsible for providing a user interface, when data access or service processing is required, the client sends a request to the application server, the application server responds to the request of the client to complete corresponding service processing or send an SQL command to the database, and after receiving an SQL statement, the database server executes corresponding query, modification, or deletion operations, returns a result to the server, and finally returns the result to the client by the application server.
Specifically, the vehicle information detection module 110 includes a sensor sensing module 111 and a visual sensing module 112, the sensor sensing module 111 senses the environment inside and outside the vehicle based on a sensor, and the visual sensing module 112 senses the external environment information based on vision.
The sensor sensing module 111 comprises a radar sensor, an ultrasonic sensor, a laser sensor and the like, wherein the radar sensor is used for acquiring two-dimensional or three-dimensional distance information of the surrounding environment of the vehicle through laser, microwave or sound waves and sensing the driving environment through distance or speed analysis, the sensor can directly acquire two-dimensional or three-dimensional distance information of an object with higher precision and is insensitive to the change of the illumination environment, and commonly used sensors comprise a millimeter wave radar, a laser radar and the like; common vehicle-mounted millimeter wave radars comprise short-range radars, middle-range radars and long-range radars which are respectively used for different applications, wherein the short-range radars are used for sensing scenes such as adjacent vehicles, obstacle detection, parking assistance and the like, are mainly arranged in the side area of the vehicle, are commonly used for monitoring the rear area of the vehicle, and are sometimes used as supplements of a front long-range radar sensor; the mid-range radar is used for sensing the medium distance and the speed, is mainly used in a reverse side warning system to assist a driver to leave a parking space, is used in a scene needing a narrow beam forward view, and is mainly used in an adaptive cruise system (ACC) and other safety fields, such as anti-collision application scenes.
The visual perception module 112 is designed based on a laser radar, and the laser radar can be used for detecting other vehicles, pedestrians or obstacles in a road surface scene, identifying road boundaries and the like, and has better transverse resolution.
In addition, the network transmission unit 200 includes a firewall module 210, an access control module 220, a data encryption module 230, and a virus protection module 240; the firewall module 210 is used to create a secure network firewall, the most technically complex and highest security level firewall at present being a hidden intelligent gateway that hides the gateway behind the public system from direct attack. The hidden intelligent gateway provides almost transparent access to internet services, and prevents illegal access to a private network by external unauthorized access; the access control module 220 is used for strictly authenticating and controlling the authority of the user for accessing the network resources; the data encryption module 230 is used for encrypting data transmitted in the network; the virus protection module 240 is used to deploy a uniform anti-network virus strategy, and efficiently and timely cope with virus intrusion.
In addition, the data encryption module 230 employs a DES encryption algorithm, an RSA encryption algorithm, an MD5 encryption algorithm, or an IDEA encryption algorithm.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the length of a key of the DES encryption algorithm is 56 bits, the same algorithm is used for encryption and decryption, the DES encryption algorithm is used for keeping the key secret, and the DES encryption algorithm is public and comprises an encryption algorithm and a decryption algorithm.
The RSA encryption algorithm is a public key cryptosystem, in the public key cryptosystem, an encryption key is public information, a decryption key is required to be kept secret, the encryption algorithm and the decryption algorithm are also public, although the decryption key is determined by the public key, the RSA key cannot be calculated according to the calculation, in order to improve the secret strength, the RSA key is at least 500 bits long, generally 1024 bits are recommended, so that the calculation amount of encryption is large, and in order to reduce the calculation amount, a mode of combining a traditional encryption method and a public key encryption method is often adopted when information is transmitted.
The MD5 encryption algorithm is a safe hash algorithm, two different plaintexts of a person cannot obtain the same output value, and the original plaintexts cannot be obtained according to the output value, namely the process is irreversible, so that no ready-made algorithm exists for decrypting the MD5, only an exhaustion method can be used, after the plaintexts which possibly appear are hashed by the MD5 algorithm, the obtained hash value and the original data form a one-to-one mapping table, the MD5 algorithm hash value of the password is decrypted by comparison in the table, and the original plaintexts corresponding to the decrypted password are found out from the mapping table through matching.
The IDEA encryption algorithm is an iterative algorithm consisting of 8 similar circles and an output transform, and each circle of the IDEA algorithm consists of the following three functions: the method comprises the steps of modular (216+1) multiplication, modular 216 addition and bitwise XOR, wherein before encryption, IDEA expands a 128-bit key into a 52-Byte encryption key through key expansion, then a decryption key is calculated from the encryption key, the encryption key and the decryption key are divided into eight groups of half keys, each group is 6-Byte in length, the first eight groups of keys are used for 8-turn encryption, and the last half group of keys are used for output transformation.
Further still, the cloud platform unit 300 includes an information screening module 310, an information analysis unit 320, and an information storage unit 330; the information screening module 310 is used for screening information; the information analysis unit 320 is used for performing computer data processing analysis on the screened information; the information storage unit 330 is used for storing information into the blockchain database.
In which the information filtering module 310 is implemented based on a recursive matching algorithm, assuming that there are two records A, B, if they represent the same entity, the matching degree is defined as 1.0, otherwise, the matching degree should be 0.0. Since a record is a collection of some attribute values, record a can be decomposed into small sub-records a _ i according to the attribute values, similarly, record B can also be decomposed into a series of sub-records B _ i, and the matching between records a and B can be the matching between the sub-records, and the matching formula is:
Figure 671139DEST_PATH_IMAGE002
specifically, the information analysis unit 320 uses the HMM method clustering method to give n sequences
Figure 181755DEST_PATH_IMAGE004
The index set is
Figure 430333DEST_PATH_IMAGE006
The specified integer K, calculate one
Figure 419018DEST_PATH_IMAGE008
Is distributed
Figure 702232DEST_PATH_IMAGE010
And K HMM models
Figure 118170DEST_PATH_IMAGE012
So that the objective function takes the maximum value, which is expressed as:
Figure DEST_PATH_IMAGE014A
wherein is a likelihood function, i.e. in a model
Figure 244258DEST_PATH_IMAGE018
Lower generation sequence
Figure 911999DEST_PATH_IMAGE020
The probability density of (c).
It should be noted that the information storage unit 330 employs a blockchain database, the blockchain database is composed of a plurality of distributed nodes, each node in the blockchain participates in the whole data management process, all nodes verify new modifications in the face of content modification in the database, and only under the condition that most or even all nodes achieve consensus, the current modification is confirmed to be written into the database, which is the consensus mechanism of the blockchain database.
Referring to fig. 5, a schematic structural diagram of a car networking security device based on a block chain and cloud computing convergence mechanism according to the present embodiment is shown, where the device includes a processor, a memory, and a bus.
The processor comprises one or more processing cores, the processor is connected with the processor through a bus, the memory is used for storing program instructions, and the vehicle networking safety system based on the block chain and cloud computing fusion mechanism is realized when the processor executes the program instructions in the memory.
Alternatively, the memory may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
In addition, the invention further provides a computer readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the vehicle networking security system based on the block chain and cloud computing fusion mechanism is realized.
Optionally, the present invention further provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the above aspects of the car networking security system, the device and the storage medium based on the blockchain and cloud computing fusion mechanism.
It will be understood by those skilled in the art that all or part of the steps of implementing the above embodiments may be implemented by hardware, or may be implemented by hardware related to instructions of a program, and the program may be stored in a computer readable storage medium, where the above mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (7)

1. Car networking safety coefficient based on block chain fuses mechanism with cloud, its characterized in that: the vehicle-mounted terminal unit (100) is used for collecting information of networked vehicles in real time; the network transmission unit (200) is used for taking charge of network transmission of information data; the cloudThe platform unit (300) is used for carrying out aggregation screening, analysis and storage on the uploaded data; the vehicle-mounted terminal unit (100) comprises a vehicle information detection module (110), a road information feedback module (120), an information active feedback unit (130) and an emergency passive feedback unit (140), wherein the vehicle information detection module (110) is used for carrying out omnibearing detection on vehicle information, the road information feedback module (120) is used for feeding back road information where a vehicle is located, the information active feedback unit (130) is used for automatically feeding back vehicle information, and the emergency passive feedback unit (140) is used for automatically feeding back information data of the vehicle; the cloud platform unit (300) comprises an information screening module (310), an information analysis unit (320) and an information storage unit (2); the information screening module (310) is used for screening information; the information analysis unit (320) is used for carrying out computer data processing analysis on the screened information; the information storage unit (330) is used for storing information into a block chain database; the information analysis unit (320) gives n sequences by using an HMM method clustering method
Figure 169110DEST_PATH_IMAGE002
The index set is
Figure 181190DEST_PATH_IMAGE004
The specified integer K, calculate one
Figure 429769DEST_PATH_IMAGE006
Is distributed
Figure 746350DEST_PATH_IMAGE008
And K HMM models
Figure 387153DEST_PATH_IMAGE010
So that the objective function takes the maximum value, which is expressed as:
Figure 537512DEST_PATH_IMAGE012
wherein,
Figure 866862DEST_PATH_IMAGE014
is a likelihood function, i.e. in a model
Figure 862500DEST_PATH_IMAGE016
Lower generation sequence
Figure 626319DEST_PATH_IMAGE018
The probability density of (c).
2. The vehicle networking security system based on the blockchain and cloud computing convergence mechanism of claim 1, wherein: the vehicle information detection module (110) comprises a sensor perception module (111) and a visual perception module (112), the sensor perception module (111) perceives the environment inside and outside the vehicle based on a sensor, and the visual perception module (112) perceives the external environment information based on vision.
3. The vehicle networking security system based on the blockchain and cloud computing convergence mechanism of claim 1, wherein: the network transmission unit (200) comprises a firewall module (210), an access control module (220), a data encryption module (230) and a virus protection module (240); the firewall module (210) is configured to establish a secure network firewall; the access control module (220) is used for strictly authenticating and controlling the authority of the user for accessing the network resource; the data encryption module (230) is used for encrypting data transmitted in the network; the virus protection module (240) is used for deploying a unified anti-network virus strategy.
4. The vehicle networking security system based on the blockchain and cloud computing convergence mechanism of claim 3, wherein: the data encryption module (230) adopts DES encryption algorithm, RSA encryption algorithm, MD5 encryption algorithm or IDEA encryption algorithm.
5. The vehicle networking security system based on the blockchain and cloud computing convergence mechanism of claim 1, wherein: the information storage unit (330) employs a blockchain database, which is composed of a plurality of distributed nodes.
6. The utility model provides a car networking safety device based on block chain fuses mechanism with cloud computing which characterized in that: comprising a processor, a memory, and a computer program stored in and executed on the memory, the processor being configured to implement the blockchain and cloud computing fusion mechanism based internet of vehicles security system of any one of claims 1 to 5 when the computer program is executed.
7. A computer-readable storage medium storing a computer program, characterized in that: the computer program when executed by a processor implements the blockchain and cloud computing fusion mechanism based internet of vehicles security system as claimed in any one of claims 1 to 5.
CN202010482589.9A 2020-06-01 2020-06-01 Vehicle networking safety system, device and storage medium based on block chain and cloud computing fusion mechanism Pending CN111385314A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010482589.9A CN111385314A (en) 2020-06-01 2020-06-01 Vehicle networking safety system, device and storage medium based on block chain and cloud computing fusion mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010482589.9A CN111385314A (en) 2020-06-01 2020-06-01 Vehicle networking safety system, device and storage medium based on block chain and cloud computing fusion mechanism

Publications (1)

Publication Number Publication Date
CN111385314A true CN111385314A (en) 2020-07-07

Family

ID=71222077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010482589.9A Pending CN111385314A (en) 2020-06-01 2020-06-01 Vehicle networking safety system, device and storage medium based on block chain and cloud computing fusion mechanism

Country Status (1)

Country Link
CN (1) CN111385314A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112037554A (en) * 2020-08-05 2020-12-04 创驱(上海)新能源科技有限公司 Intelligent automobile safety travel system based on block chain technology
CN113038426A (en) * 2021-02-27 2021-06-25 吉林大学 Internet of vehicles safety detection system and method
CN114301618A (en) * 2021-11-11 2022-04-08 北京蜂云科创信息技术有限公司 Block chain-based commercial vehicle networking data encryption transmission method and system
CN114760092A (en) * 2022-03-09 2022-07-15 浙江零跑科技股份有限公司 Network data safety detection system for intelligent automobile and cloud platform

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170310674A1 (en) * 2016-04-26 2017-10-26 Honeywell International Inc. Approach for securing a vehicle access port
CN110086679A (en) * 2019-05-16 2019-08-02 深圳市英博超算科技有限公司 Intelligent automobile security gateway system
CN111210618A (en) * 2018-11-22 2020-05-29 南京锦和佳鑫信息科技有限公司 Automatic internet public traffic road system
CN111260946A (en) * 2018-11-30 2020-06-09 南京锦和佳鑫信息科技有限公司 Automatic driving truck operation control system based on intelligent network connection system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170310674A1 (en) * 2016-04-26 2017-10-26 Honeywell International Inc. Approach for securing a vehicle access port
CN111210618A (en) * 2018-11-22 2020-05-29 南京锦和佳鑫信息科技有限公司 Automatic internet public traffic road system
CN111260946A (en) * 2018-11-30 2020-06-09 南京锦和佳鑫信息科技有限公司 Automatic driving truck operation control system based on intelligent network connection system
CN110086679A (en) * 2019-05-16 2019-08-02 深圳市英博超算科技有限公司 Intelligent automobile security gateway system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
唐懿芳 等: ""基于聚类模式的多数据源记录匹配算法"", 《小型微型计算机***》 *
梁伟强 等: ""基于区块链与云计算融合机制的车联网安全体系"", 《2018电力行业信息化年会论文集》 *
蒋敬强: ""基于隐马尔科夫模型的时间序列聚类"", 《万方数据知识服务平台》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112037554A (en) * 2020-08-05 2020-12-04 创驱(上海)新能源科技有限公司 Intelligent automobile safety travel system based on block chain technology
CN113038426A (en) * 2021-02-27 2021-06-25 吉林大学 Internet of vehicles safety detection system and method
CN113038426B (en) * 2021-02-27 2022-07-22 吉林大学 Internet of vehicles safety detection system and method
CN114301618A (en) * 2021-11-11 2022-04-08 北京蜂云科创信息技术有限公司 Block chain-based commercial vehicle networking data encryption transmission method and system
CN114760092A (en) * 2022-03-09 2022-07-15 浙江零跑科技股份有限公司 Network data safety detection system for intelligent automobile and cloud platform

Similar Documents

Publication Publication Date Title
CN111385314A (en) Vehicle networking safety system, device and storage medium based on block chain and cloud computing fusion mechanism
Sun et al. Attacks and countermeasures in the internet of vehicles
Lam et al. ANT-centric IoT security reference architecture—Security-by-design for satellite-enabled smart cities
Malina et al. Post-quantum era privacy protection for intelligent infrastructures
Yan et al. Security challenges in vehicular cloud computing
Bendiab et al. Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence
Abbas et al. Blockchain-based authentication in internet of vehicles: A survey
Alharthi et al. A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET
Sun et al. A secure flexible and tampering-resistant data sharing system for vehicular social networks
Feng et al. Blockchain-based data management and edge-assisted trusted cloaking area construction for location privacy protection in vehicular networks
Wang et al. Blockchain-based data storage mechanism for industrial internet of things
Arif et al. Track me if you can? Query based dual location privacy in VANETs for V2V and V2I
Ghimire et al. Secure, privacy preserving, and verifiable federating learning using blockchain for internet of vehicles
Chen et al. A Summary of Security Techniques‐Based Blockchain in IoV
Kouicem et al. An efficient and anonymous blockchain-based data sharing scheme for vehicular networks
Sultan et al. A novel image-based homomorphic approach for preserving the privacy of autonomous vehicles connected to the cloud
Sekhar et al. Artificial neural network-based secured communication strategy for vehicular ad hoc network
Zhang et al. A blockchain-based security approach architecture for the Internet of Things
CN113067695A (en) Vehicle networking data exchange method and system based on block chain
Keshk et al. Privacy-preserving techniques for protecting large-scale data of cyber-physical systems
Obiri et al. A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud
Kou et al. A Privacy protection scheme for carpooling service using fog computing
Chen et al. Blockchain-based uav-assisted forest supervision and data sharing
Hosen et al. SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things
Bagga et al. Blockchain for Smart Transport Applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200707

RJ01 Rejection of invention patent application after publication