汽车工程 ›› 2020, Vol. 42 ›› Issue (1): 27-32.doi: 10.19562/j.chinasae.qcgc.2020.01.004

• • 上一篇    下一篇

V2X通信中基于椭圆曲线加密算法的身份认证研究*

章嘉彦, 李飞, 李如翔, 李亚林, 宋佳琦, 周启扬   

  1. 成都信息工程大学网络空间安全学院,成都 610225
  • 收稿日期:2018-11-14 发布日期:2020-01-21
  • 通讯作者: 李飞,教授,E-mail:lifei@cuit.edu.cn
  • 基金资助:
    *四川省自然科学基金(2016GZ0343,2018JY0510,18RKX0667)资助

Research on Identity Authentication in V2X CommunicationsBased on Elliptic Curve Encryption Algorithm

Zhang Jiayan, Li Fei, Li Ruxiang, Li Yalin, Song Jiaqi, Zhou Qiyang   

  1. Cyberspace Security College, Chengdu University of Information Technology, Chengdu 610225
  • Received:2018-11-14 Published:2020-01-21

摘要: 随着汽车信息技术的发展,汽车之间和汽车与云互联通信的车联网成为现实,然而车联网在给人们带来方便之余,也给了黑客可乘之机,他们通过伪造虚假身份对发送中的数据包进行劫持和篡改,从而给用户带来安全威胁,因此汽车通信双方的身份认证,对于汽车的安全性起着至关重要的作用。本文中在对比常用公钥加密算法的基础上,提出利用椭圆曲线加密术和其他安全策略,对接入车联网用户的真实性进行验证。实验结果表明,采用该方法对车辆之间的通信进行加密认证,保证汽车之间的网络通信安全,且在时间上比传统公钥加密算法平均缩短了约83%。

关键词: 车联网, 网络安全, 椭圆曲线加密算法, 身份认证

Abstract: With the development of automotive information technology, the internet of vehicles (IOV) between vehicles and vehicle-cloud interconnected communication has become a reality. However, while the IOV brings convenience to people, it also gives hackers the opportunity to conduct the unauthorized capture or revision of the data packets sent by using fake identity, thus posing a security threat to the user. Therefore, the identity authentication of both parties in vehicle communications plays a vital role in vehicle safety. In this paper, on the basis of comparison on commonly used public key encryption algorithms, it is proposed to use elliptic curve cryptography and other security strategies to verify the authenticity of the connected vehicle network users. The results of experiments show that the adoption of the method proposed to perform the encryption and authentication of inter-vehicle communications effectively ensure the communications security of IOV, with 83% less time consumed compared with traditional public key encryption algorithms

Key words: internet of vehicles, network safety, elliptic curve encryption algorithm, identity authentication