CN111901126A - Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer - Google Patents
Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer Download PDFInfo
- Publication number
- CN111901126A CN111901126A CN202010778775.7A CN202010778775A CN111901126A CN 111901126 A CN111901126 A CN 111901126A CN 202010778775 A CN202010778775 A CN 202010778775A CN 111901126 A CN111901126 A CN 111901126A
- Authority
- CN
- China
- Prior art keywords
- data
- decryption
- priority
- protocol stack
- safety data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000012795 verification Methods 0.000 title claims abstract description 17
- 231100000279 safety data Toxicity 0.000 claims abstract description 40
- 238000004891 communication Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 2
- 241000497429 Obus Species 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/125—Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
- Communication Control (AREA)
Abstract
The invention discloses a method for avoiding time consumption of a decryption and signature checking module based on a V2X protocol stack network layer, belonging to the technical field of C-V2X wireless communication and comprising the following steps: collecting multiple V2X safety data of a MAC layer; the data receiving thread calculates the self-defined priority; inserting the self-defined priority into each piece of V2X safety data, sending the updated V2X safety data to threads in a decryption and signature checking thread pool for decryption and signature checking operation, and obtaining V2X safety data after decryption and signature checking operation; carrying out protocol analysis on the V2X safety data after decryption and signature verification operation; inserting the V2X safety data after protocol analysis into a multi-priority data queue according to the priority and the receiving time; the application layer acquires data from the multi-priority data queue, analyzes the protocol and then obtains V2X safety data, and performs protocol logic processing; the processing that the V2X protocol stack network layer avoids deciphering and checking the label module is time-consuming is finished, the time consumption caused by single thread sequence processing is solved, the time-consuming operation is reduced, and the performance of processing the data packet by the software protocol stack is improved.
Description
Technical Field
The invention relates to the technical field of C-V2X wireless communication, in particular to a method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer.
Background
As the name suggests, V2X (Vehicle to event) is a communication system for connecting Vehicle and Everything, belonging to the internet of things, and V2X is a communication system specially used for connecting Vehicle and surrounding environment.
In the C-V2X network layer software protocol stack, algorithm operations of encryption, decryption, signature verification and signature verification are performed, but these cryptographic operations are usually time-consuming, and especially become a time-consuming bottleneck when using software algorithms, and hardware encryption and decryption increase the cost.
Disclosure of Invention
According to the problems in the prior art, the invention discloses a method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer, which comprises the following steps:
s1, collecting a plurality of V2X safety data of the MAC layer;
s2, the data receiving thread calculates the self-defined priority;
s3, inserting the self-defined priority into each piece of V2X safety data by the data receiving thread to obtain updated V2X safety data;
s4, the data receiving thread sends the updated V2X safety data to threads in a decryption and signature checking thread pool for decryption and signature checking operation to obtain V2X safety data after decryption and signature checking operation;
s5, carrying out protocol analysis on the V2X safety data after decryption and signature checking operation;
s6, inserting the V2X safety data after the protocol analysis into a multi-priority data queue according to the priority and the receiving time;
s7, the application layer obtains data from the multi-priority data queue, analyzes the protocol and then carries out V2X safety data, and carries out protocol logic processing; i.e. the network layer of the V2X protocol stack is completed to avoid the time-consuming process of decrypting the signature verification module.
Further, the data receiving thread custom priority is obtained by: the priority uploaded through the MAC layer and the time when the V2X security data is received combine to customize the priority.
Further, the data receiving thread acquires the current time of the protocol stack operating system as the data receiving time while receiving the V2X security data.
Further, the priority data queue comprises a plurality of data queues, the data queues insert data according to an insert-first-execution principle, and the maximum data quantity in the data queues is determined according to a memory of a protocol stack operating system.
Furthermore, a corresponding priority data queue is found through the analyzed priority field, and then the analyzed V2X safety data is inserted into the queue according to the sequence of the data receiving time, and the protocol stack is transmitted to the application layer.
Due to the adoption of the technical scheme, the method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer solves the problem of time consumption caused by single-thread sequential processing, reduces time consumption operation by parallelly processing the data packets, improves the performance of a software protocol stack for processing the data packets, ensures that the number of data packets in the air is very large when the number of OBUs and RSUs in an automobile network is large, reduces the time consumption of encryption and decryption of the protocol stack by parallelly processing the data packets, avoids the situation of packet loss caused by slow data processing, improves the processing capability of the protocol stack, and achieves the capability of parallelly processing a plurality of pieces of safety information at the same time by maximally utilizing the hardware performance under the condition of the same hardware performance.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a process diagram of the method of the present invention.
Detailed Description
In order to make the technical solutions and advantages of the present invention clearer, the following describes the technical solutions in the embodiments of the present invention clearly and completely with reference to the drawings in the embodiments of the present invention:
fig. 1 is a schematic process diagram of the method of the present invention, and a method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer includes the following steps:
s1, collecting a plurality of V2X safety data of the MAC layer;
s2, the data receiving thread calculates the self-defined priority;
s3, inserting the self-defined priority into each piece of V2X safety data by the data receiving thread to obtain updated V2X safety data;
s4, the data receiving thread sends the updated V2X safety data to threads in a decryption and signature checking thread pool for decryption and signature checking operation to obtain V2X safety data after decryption and signature checking operation;
s5, carrying out protocol analysis on the V2X safety data after decryption and signature checking operation;
s6, inserting the V2X safety data after the protocol analysis into a multi-priority data queue according to the priority and the receiving time;
s7, the application layer obtains data from the multi-priority data queue, analyzes the protocol and then carries out V2X safety data, and carries out protocol logic processing; i.e. the network layer of the V2X protocol stack is completed to avoid the time-consuming process of decrypting the signature verification module.
Further, the data receiving thread custom priority is obtained by: the self-defined priority is combined by the priority uploaded by the MAC layer and the time of receiving the V2X safety data, the priority uploaded by the MAC layer occupies 1 byte, the time of receiving the V2X safety data occupies 16 bytes, the self-defined priority is inserted before the V2X safety data, and the self-defined priority of each V2X safety data is different and is used for identifying the uniqueness of each safety data.
Further, the data receiving thread obtains the current time of the protocol stack operating system as the data receiving time while receiving the V2X safety data, and the precision is accurate to ms.
Further: the priority data queue comprises a plurality of data queues, the data queues insert data according to the principle of inserting first and executing first, and the maximum data quantity in the data queues is determined according to the internal memory of the protocol stack operating system.
Further, a decryption and signature checking thread pool is established, and the maximum thread number in the decryption and signature checking thread pool is set according to the maximum acceptable number at the same time under the condition of the step S1.
Furthermore, a corresponding priority data queue is found through the analyzed priority field, and the analyzed V2X security data are inserted into the queue according to the sequence of the receiving time and are transmitted to the application layer.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (5)
1. A method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer is characterized in that: the method comprises the following steps:
s1, collecting a plurality of V2X safety data of the MAC layer;
s2, the data receiving thread calculates the self-defined priority;
s3, inserting the self-defined priority into each piece of V2X safety data by the data receiving thread to obtain updated V2X safety data;
s4, the data receiving thread sends the updated V2X safety data to threads in a decryption and signature checking thread pool for decryption and signature checking operation to obtain V2X safety data after decryption and signature checking operation;
s5, carrying out protocol analysis on the V2X safety data after decryption and signature checking operation;
s6, inserting the V2X safety data after the protocol analysis into a multi-priority data queue according to the priority and the receiving time;
s7, the application layer obtains data from the multi-priority data queue, analyzes the protocol and then carries out V2X safety data, and carries out protocol logic processing; i.e. the network layer of the V2X protocol stack is completed to avoid the time-consuming process of decrypting the signature verification module.
2. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 1, wherein: the data receiving thread self-defined priority is obtained by the following method: the priority uploaded through the MAC layer and the time when the V2X security data is received combine to customize the priority.
3. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 2, wherein: and the data receiving thread acquires the current time of the protocol stack operating system as the data receiving time while receiving the V2X safety data.
4. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 1, wherein: the priority data queue comprises a plurality of data queues, the data queues insert data according to the principle of inserting first and executing first, and the maximum data quantity in the data queues is determined according to the internal memory of the protocol stack operating system.
5. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 1, wherein: finding out the corresponding priority data queue through the analyzed priority field, inserting the analyzed V2X safety data into the queue according to the sequence of data receiving time, and transmitting the queue to the application layer.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010778775.7A CN111901126B (en) | 2020-08-05 | 2020-08-05 | Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010778775.7A CN111901126B (en) | 2020-08-05 | 2020-08-05 | Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111901126A true CN111901126A (en) | 2020-11-06 |
| CN111901126B CN111901126B (en) | 2022-10-14 |
Family
ID=73245967
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010778775.7A Active CN111901126B (en) | 2020-08-05 | 2020-08-05 | Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111901126B (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113795008A (en) * | 2021-03-29 | 2021-12-14 | 荣耀终端有限公司 | V2X signature verification method, device, electronic device and readable storage medium |
| CN116233786A (en) * | 2021-12-03 | 2023-06-06 | 北京万集科技股份有限公司 | V2X data processing method and device and V2X road side equipment |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110123020A1 (en) * | 2009-11-26 | 2011-05-26 | Samsung Electronics Co., Ltd. | Endecryptor capable of performing parallel processing and encryption/decryption method thereof |
| US20190043357A1 (en) * | 2017-08-01 | 2019-02-07 | Denso International America, Inc. | Systems and Methods For Adaptive Filtering Of Vehicle-To-Vehicle Messages From Remote Vehicles |
| CN109672996A (en) * | 2018-12-29 | 2019-04-23 | 重庆邮电大学 | One kind being based on V2X roadside device system and its information dispensing method |
| CN109768939A (en) * | 2018-11-27 | 2019-05-17 | 中国科学院计算技术研究所 | A method and system for labeling a network stack supporting priority |
-
2020
- 2020-08-05 CN CN202010778775.7A patent/CN111901126B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110123020A1 (en) * | 2009-11-26 | 2011-05-26 | Samsung Electronics Co., Ltd. | Endecryptor capable of performing parallel processing and encryption/decryption method thereof |
| US20190043357A1 (en) * | 2017-08-01 | 2019-02-07 | Denso International America, Inc. | Systems and Methods For Adaptive Filtering Of Vehicle-To-Vehicle Messages From Remote Vehicles |
| CN109768939A (en) * | 2018-11-27 | 2019-05-17 | 中国科学院计算技术研究所 | A method and system for labeling a network stack supporting priority |
| CN109672996A (en) * | 2018-12-29 | 2019-04-23 | 重庆邮电大学 | One kind being based on V2X roadside device system and its information dispensing method |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113795008A (en) * | 2021-03-29 | 2021-12-14 | 荣耀终端有限公司 | V2X signature verification method, device, electronic device and readable storage medium |
| CN113795008B (en) * | 2021-03-29 | 2022-08-02 | 荣耀终端有限公司 | V2X signature verification method and device, electronic equipment and readable storage medium |
| CN116233786A (en) * | 2021-12-03 | 2023-06-06 | 北京万集科技股份有限公司 | V2X data processing method and device and V2X road side equipment |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111901126B (en) | 2022-10-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11971978B2 (en) | Vehicle network system whose security is improved using message authentication code | |
| US10841243B2 (en) | NIC with programmable pipeline | |
| US12375566B2 (en) | Data transmission method, apparatus and device, and computer-readable storage medium | |
| US20160373261A1 (en) | Method for manipulation protection of a bus system between at least two system components | |
| EP2775660B1 (en) | Message authentication method in communication system and communication system | |
| CN109379380A (en) | Data transmission method, data receiver method and remote printing system, mobile terminal | |
| US10243829B2 (en) | Communication protocol testing method, and tested device and testing platform thereof | |
| EP3605881B1 (en) | Method and device for transmitting and receiving network management information, transmitting apparatus and receiving apparatus | |
| CN110620762A (en) | RDMA (remote direct memory Access) -based data transmission method, network card, server and medium | |
| US12395471B2 (en) | Sufficiently secure controller area network | |
| CN111901126B (en) | Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer | |
| US20200128042A1 (en) | Communication method and apparatus for an industrial control system | |
| CN112468407A (en) | Data subpackage transmission method and device, computer equipment and storage medium | |
| CN118175205B (en) | Algorithm card scheduling method and device, storage medium and electronic equipment | |
| CN117255061B (en) | DPU-based encrypted message speed limiting method and device | |
| US11960611B2 (en) | Efficient distribution of processes between a vehicle control computing device and a cryptographic module, and method for operation thereof | |
| CN110912841B (en) | SRIO protocol control character and data packet separation system facing 128bit width | |
| CN115952513B (en) | Communication method and system based on T-BOX data secure storage component | |
| CN115665242B (en) | Method and device for sending and receiving messages | |
| CN117560226B (en) | Method and device for data transmission through VPN | |
| CN109194490B (en) | Power distribution network communication security authentication system and method | |
| CN114329507B (en) | Encryption accelerator and system and method for encryption | |
| CN107171800B (en) | Scheduling system of multi-channel cryptographic algorithm | |
| US12088672B1 (en) | Efficient and secured access to in-vehicle end nodes across a vehicle fleet | |
| US20240356754A1 (en) | Nonce preprocessing for a security scheme |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |