scispace - formally typeset
Search or ask a question
Author

Li Tun

Bio: Li Tun is an academic researcher. The author has contributed to research in topics: Encryption & Data Authentication Algorithm. The author has an hindex of 1, co-authored 1 publications receiving 7 citations.

Papers
More filters
Patent
22 Aug 2017
TL;DR: In this paper, an Internet of vehicles (IoV) security authentication device and method is described, which comprises the following steps of organically combining traditional cryptography authentication service with a trust evaluation mechanism.
Abstract: The invention discloses an Internet of vehicles security authentication device and method. The method comprises the following steps of organically combining traditional cryptography authentication service with a trust evaluation mechanism, realizing the traditional cryptography authentication service and the trust evaluation mechanism according to an interface provided by an authentication performance device, mounting the traditional cryptography authentication service and the trust evaluation mechanism to the device, externally providing call service through a uniform interface of the device, and shielding realization details of various complex authentication algorithms; deploying a trusted embedded security module on a vehicle node in a sensing layer, thereby providing security capability, and modularizing an encryption algorithm of the sensing layer; establishing an authentication system integrated with a trusted terminal, a cryptography authentication method and the trust evaluation system; and matching and evaluating a high-security trusted evidence factor provided by a bottom sensing layer and providing authentication decision basis for an upper traffic information service platform.

7 citations


Cited by
More filters
Patent
18 May 2018
TL;DR: In this article, a traffic information identification and forwarding method with a dual trust mechanism in a vehicle networking environment is presented, which comprises the steps that 1, a sending nodei sends road traffic information M to a receiving node j, and the receiving nodej receives the information M; 2, whether or not the sending node i is a special vehicle is determined; 3, the receiving nodes j calculates a trust value of the sending nodes i, and 4, the determining node j determines whether or whether the sendingnode i is trustable; 5, a cosine value of included
Abstract: The invention provides a traffic information identification and forwarding method with a dual trust mechanism in a vehicle networking environment. The method comprises the steps that 1, a sending nodei sends road traffic information M to a receiving node j, and the receiving node j receives the information M; 2, whether or not the sending node i is a special vehicle is determined; 3, the receiving node j calculates a trust value of the sending node i; 4, the receiving node j determines whether or not the sending node i is trustable; 5, a cosine value of the included angle and the consistencybetween the road traffic information M and attribute vectors of vehicle information MR are calculated to evaluate the similarity degree; 6, whether or not the content of the road traffic information Msent by the sending node i is trustable is determined. According to the method, whether or not a mobile node is trustable is determined by calculating the trust value of the mobile node, and by comparing the similarity of the information content based on the cosine similarity, text similarity calculation and comparison are performed on the information content sent by the node, and whether or notthe content of the road traffic information sent by the node is trustable is determined. The dual trust mechanism is used for evaluating the credibility of the traffic information in a vehicle network, and the forwarding rate of the entire vehicle network is effectively increased.

4 citations

Patent
19 Jan 2018
TL;DR: In this article, the authors proposed an Ad Hoc network security trust method based on a reference node strategy and belongs to the field of network security, which specifically comprises the following stepsof computing a trust value of each node through a trust model.
Abstract: The invention relates to an Ad Hoc network security trust method based on a reference node strategy and belongs to the field of network security. The method specifically comprises the following stepsof computing a trust value of each node through a trust model, sending the trust value to a trust value statistical node, making the trust value statistical node count a weighted trust value of each node, updating a reference node and the trust value statistical node, and lastly, initiating the reference node strategy through the reference node. The method has the advantages that a black hole attack node in the Ad Hoc network can be quickly discovered, and meanwhile, the method has a good defense effect on a way of hybrid of a data message attack and the black hole attack; and the method has strong expandability and adaptability.

3 citations

Patent
04 Jan 2019
TL;DR: In this paper, the authors provide the data structure and the method of the adaptive anti-tampering of an updated package in vehicle networking and belong to the vehicle networking safety field.
Abstract: The invention provides the data structure and the method of the adaptive anti-tampering of an updated package in vehicle networking and belongs to the vehicle networking safety field. The method comprises the following steps of S1, a server end selects the updated package which needs to be transmitted, assigns a value to an ID and obtains current time to assign the value to Ts; S2, a currently-updated package attribute is acquired, and according to the requirement of a flag bit, the server end assigns the value to the flag bits TAG2,. . . , TAGn; S3, currently-updated package information is acquired, an information abstract is generated so as to assign the value to MD; S4, a vehicle terminal acquires the updated package, determines the current running speed state of a vehicle, and assignsthe value to a TAG1 field; and S5, a safety level is assigned according to a situation reflected by the combined value of the n flag bits, and an appropriate integrity measurement scheme is selected according to the safety level. The invention provides the data structure of the updated package. In the new structure form, an ID field, a Ts field, TAG1,. . . , TAGn flag bit fields and a MD field areadded, and through the flag bit fields, the integrity measurement scheme which is most suitable for a current environment can be flexibly selected in a vehicle networking system.

1 citations

Patent
03 Sep 2019
TL;DR: In this paper, an abnormal node processing method was proposed, which comprises the following steps: obtaining node data transmitted by an access network element, performing feature statistics on thenode data to obtain node feature data, determining an abnormal nodes based on the node featuredata, and generating an identification result at least comprising the abnormal node; and sending the identification result to the access node element.
Abstract: The invention discloses an abnormal node processing method. The method comprises the following steps: obtaining node data transmitted by an access network element; performing feature statistics on thenode data to obtain node feature data; determining an abnormal node based on the node feature data, and generating an identification result at least comprising the abnormal node; and sending the identification result to the access network element. The invention also discloses a node identification entity, an access network element and a computer readable storage medium.
Patent
24 Apr 2020
TL;DR: In this article, an Internet of Vehicles bidirectional authentication method and device based on crowd sensing is presented, which relates to the technical field of Internet of VANET security authentication, and the method comprises the steps: enabling an authentication base station to select a scoring strategy and broadcast the scoring strategy to an assistance base station, enabling theassistance base stations to send vehicle historical state information to the authentication base stations according to the scoring strategies, obtaining a first behavior prediction result by utilizing a decision tree; constructing an assistance BS data credibility criterion, solving a plurality of evidence conflicts according
Abstract: The embodiment of the invention discloses an Internet of Vehicles bidirectional authentication method and device based on crowd sensing, and relates to the technical field of Internet of Vehicles security authentication. The method comprises the steps: enabling an authentication base station to select a scoring strategy and broadcast the scoring strategy to an assistance base station; enabling theassistance base station to send vehicle historical state information to the authentication base station according to the scoring strategy; based on the historical state information of the vehicle, obtaining a first behavior prediction result by utilizing a decision tree; constructing an assistance base station data credibility criterion, solving a plurality of evidence conflicts according to a basic probability assignment function, and determining an assistance base station data quality grade; executing a scoring strategy and updating a Q matrix to obtain an accurate vehicle behavior prediction result; and authenticating the vehicle and the assistance base station. According to the embodiment of the invention, on the one hand, the authenticity of the base station side is authenticated through the data quality grade; on the other hand, the authenticity of the vehicle information is authenticated through the vehicle prediction behavior result, thereby realizing bidirectional authentication of the base station and the vehicle, and solving the network security problem of the Internet of Vehicles.