[go: up one dir, main page]

CN111901126A - Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer - Google Patents

Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer Download PDF

Info

Publication number
CN111901126A
CN111901126A CN202010778775.7A CN202010778775A CN111901126A CN 111901126 A CN111901126 A CN 111901126A CN 202010778775 A CN202010778775 A CN 202010778775A CN 111901126 A CN111901126 A CN 111901126A
Authority
CN
China
Prior art keywords
data
decryption
priority
protocol stack
safety data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010778775.7A
Other languages
Chinese (zh)
Other versions
CN111901126B (en
Inventor
王鹤
潘为豪
王晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Wangfuda Information Technology Co ltd
Original Assignee
Shenzhen Wangfuda Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Wangfuda Information Technology Co ltd filed Critical Shenzhen Wangfuda Information Technology Co ltd
Priority to CN202010778775.7A priority Critical patent/CN111901126B/en
Publication of CN111901126A publication Critical patent/CN111901126A/en
Application granted granted Critical
Publication of CN111901126B publication Critical patent/CN111901126B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/125Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Communication Control (AREA)

Abstract

The invention discloses a method for avoiding time consumption of a decryption and signature checking module based on a V2X protocol stack network layer, belonging to the technical field of C-V2X wireless communication and comprising the following steps: collecting multiple V2X safety data of a MAC layer; the data receiving thread calculates the self-defined priority; inserting the self-defined priority into each piece of V2X safety data, sending the updated V2X safety data to threads in a decryption and signature checking thread pool for decryption and signature checking operation, and obtaining V2X safety data after decryption and signature checking operation; carrying out protocol analysis on the V2X safety data after decryption and signature verification operation; inserting the V2X safety data after protocol analysis into a multi-priority data queue according to the priority and the receiving time; the application layer acquires data from the multi-priority data queue, analyzes the protocol and then obtains V2X safety data, and performs protocol logic processing; the processing that the V2X protocol stack network layer avoids deciphering and checking the label module is time-consuming is finished, the time consumption caused by single thread sequence processing is solved, the time-consuming operation is reduced, and the performance of processing the data packet by the software protocol stack is improved.

Description

Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer
Technical Field
The invention relates to the technical field of C-V2X wireless communication, in particular to a method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer.
Background
As the name suggests, V2X (Vehicle to event) is a communication system for connecting Vehicle and Everything, belonging to the internet of things, and V2X is a communication system specially used for connecting Vehicle and surrounding environment.
In the C-V2X network layer software protocol stack, algorithm operations of encryption, decryption, signature verification and signature verification are performed, but these cryptographic operations are usually time-consuming, and especially become a time-consuming bottleneck when using software algorithms, and hardware encryption and decryption increase the cost.
Disclosure of Invention
According to the problems in the prior art, the invention discloses a method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer, which comprises the following steps:
s1, collecting a plurality of V2X safety data of the MAC layer;
s2, the data receiving thread calculates the self-defined priority;
s3, inserting the self-defined priority into each piece of V2X safety data by the data receiving thread to obtain updated V2X safety data;
s4, the data receiving thread sends the updated V2X safety data to threads in a decryption and signature checking thread pool for decryption and signature checking operation to obtain V2X safety data after decryption and signature checking operation;
s5, carrying out protocol analysis on the V2X safety data after decryption and signature checking operation;
s6, inserting the V2X safety data after the protocol analysis into a multi-priority data queue according to the priority and the receiving time;
s7, the application layer obtains data from the multi-priority data queue, analyzes the protocol and then carries out V2X safety data, and carries out protocol logic processing; i.e. the network layer of the V2X protocol stack is completed to avoid the time-consuming process of decrypting the signature verification module.
Further, the data receiving thread custom priority is obtained by: the priority uploaded through the MAC layer and the time when the V2X security data is received combine to customize the priority.
Further, the data receiving thread acquires the current time of the protocol stack operating system as the data receiving time while receiving the V2X security data.
Further, the priority data queue comprises a plurality of data queues, the data queues insert data according to an insert-first-execution principle, and the maximum data quantity in the data queues is determined according to a memory of a protocol stack operating system.
Furthermore, a corresponding priority data queue is found through the analyzed priority field, and then the analyzed V2X safety data is inserted into the queue according to the sequence of the data receiving time, and the protocol stack is transmitted to the application layer.
Due to the adoption of the technical scheme, the method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer solves the problem of time consumption caused by single-thread sequential processing, reduces time consumption operation by parallelly processing the data packets, improves the performance of a software protocol stack for processing the data packets, ensures that the number of data packets in the air is very large when the number of OBUs and RSUs in an automobile network is large, reduces the time consumption of encryption and decryption of the protocol stack by parallelly processing the data packets, avoids the situation of packet loss caused by slow data processing, improves the processing capability of the protocol stack, and achieves the capability of parallelly processing a plurality of pieces of safety information at the same time by maximally utilizing the hardware performance under the condition of the same hardware performance.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a process diagram of the method of the present invention.
Detailed Description
In order to make the technical solutions and advantages of the present invention clearer, the following describes the technical solutions in the embodiments of the present invention clearly and completely with reference to the drawings in the embodiments of the present invention:
fig. 1 is a schematic process diagram of the method of the present invention, and a method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer includes the following steps:
s1, collecting a plurality of V2X safety data of the MAC layer;
s2, the data receiving thread calculates the self-defined priority;
s3, inserting the self-defined priority into each piece of V2X safety data by the data receiving thread to obtain updated V2X safety data;
s4, the data receiving thread sends the updated V2X safety data to threads in a decryption and signature checking thread pool for decryption and signature checking operation to obtain V2X safety data after decryption and signature checking operation;
s5, carrying out protocol analysis on the V2X safety data after decryption and signature checking operation;
s6, inserting the V2X safety data after the protocol analysis into a multi-priority data queue according to the priority and the receiving time;
s7, the application layer obtains data from the multi-priority data queue, analyzes the protocol and then carries out V2X safety data, and carries out protocol logic processing; i.e. the network layer of the V2X protocol stack is completed to avoid the time-consuming process of decrypting the signature verification module.
Further, the data receiving thread custom priority is obtained by: the self-defined priority is combined by the priority uploaded by the MAC layer and the time of receiving the V2X safety data, the priority uploaded by the MAC layer occupies 1 byte, the time of receiving the V2X safety data occupies 16 bytes, the self-defined priority is inserted before the V2X safety data, and the self-defined priority of each V2X safety data is different and is used for identifying the uniqueness of each safety data.
Further, the data receiving thread obtains the current time of the protocol stack operating system as the data receiving time while receiving the V2X safety data, and the precision is accurate to ms.
Further: the priority data queue comprises a plurality of data queues, the data queues insert data according to the principle of inserting first and executing first, and the maximum data quantity in the data queues is determined according to the internal memory of the protocol stack operating system.
Further, a decryption and signature checking thread pool is established, and the maximum thread number in the decryption and signature checking thread pool is set according to the maximum acceptable number at the same time under the condition of the step S1.
Furthermore, a corresponding priority data queue is found through the analyzed priority field, and the analyzed V2X security data are inserted into the queue according to the sequence of the receiving time and are transmitted to the application layer.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (5)

1. A method for avoiding time consumption of a decryption and signature verification module based on a V2X protocol stack network layer is characterized in that: the method comprises the following steps:
s1, collecting a plurality of V2X safety data of the MAC layer;
s2, the data receiving thread calculates the self-defined priority;
s3, inserting the self-defined priority into each piece of V2X safety data by the data receiving thread to obtain updated V2X safety data;
s4, the data receiving thread sends the updated V2X safety data to threads in a decryption and signature checking thread pool for decryption and signature checking operation to obtain V2X safety data after decryption and signature checking operation;
s5, carrying out protocol analysis on the V2X safety data after decryption and signature checking operation;
s6, inserting the V2X safety data after the protocol analysis into a multi-priority data queue according to the priority and the receiving time;
s7, the application layer obtains data from the multi-priority data queue, analyzes the protocol and then carries out V2X safety data, and carries out protocol logic processing; i.e. the network layer of the V2X protocol stack is completed to avoid the time-consuming process of decrypting the signature verification module.
2. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 1, wherein: the data receiving thread self-defined priority is obtained by the following method: the priority uploaded through the MAC layer and the time when the V2X security data is received combine to customize the priority.
3. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 2, wherein: and the data receiving thread acquires the current time of the protocol stack operating system as the data receiving time while receiving the V2X safety data.
4. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 1, wherein: the priority data queue comprises a plurality of data queues, the data queues insert data according to the principle of inserting first and executing first, and the maximum data quantity in the data queues is determined according to the internal memory of the protocol stack operating system.
5. The method for avoiding time consumption of the decryption and signature verification module based on the V2X protocol stack network layer as claimed in claim 1, wherein: finding out the corresponding priority data queue through the analyzed priority field, inserting the analyzed V2X safety data into the queue according to the sequence of data receiving time, and transmitting the queue to the application layer.
CN202010778775.7A 2020-08-05 2020-08-05 Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer Active CN111901126B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010778775.7A CN111901126B (en) 2020-08-05 2020-08-05 Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010778775.7A CN111901126B (en) 2020-08-05 2020-08-05 Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer

Publications (2)

Publication Number Publication Date
CN111901126A true CN111901126A (en) 2020-11-06
CN111901126B CN111901126B (en) 2022-10-14

Family

ID=73245967

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010778775.7A Active CN111901126B (en) 2020-08-05 2020-08-05 Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer

Country Status (1)

Country Link
CN (1) CN111901126B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113795008A (en) * 2021-03-29 2021-12-14 荣耀终端有限公司 V2X signature verification method, device, electronic device and readable storage medium
CN116233786A (en) * 2021-12-03 2023-06-06 北京万集科技股份有限公司 V2X data processing method and device and V2X road side equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110123020A1 (en) * 2009-11-26 2011-05-26 Samsung Electronics Co., Ltd. Endecryptor capable of performing parallel processing and encryption/decryption method thereof
US20190043357A1 (en) * 2017-08-01 2019-02-07 Denso International America, Inc. Systems and Methods For Adaptive Filtering Of Vehicle-To-Vehicle Messages From Remote Vehicles
CN109672996A (en) * 2018-12-29 2019-04-23 重庆邮电大学 One kind being based on V2X roadside device system and its information dispensing method
CN109768939A (en) * 2018-11-27 2019-05-17 中国科学院计算技术研究所 A method and system for labeling a network stack supporting priority

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110123020A1 (en) * 2009-11-26 2011-05-26 Samsung Electronics Co., Ltd. Endecryptor capable of performing parallel processing and encryption/decryption method thereof
US20190043357A1 (en) * 2017-08-01 2019-02-07 Denso International America, Inc. Systems and Methods For Adaptive Filtering Of Vehicle-To-Vehicle Messages From Remote Vehicles
CN109768939A (en) * 2018-11-27 2019-05-17 中国科学院计算技术研究所 A method and system for labeling a network stack supporting priority
CN109672996A (en) * 2018-12-29 2019-04-23 重庆邮电大学 One kind being based on V2X roadside device system and its information dispensing method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113795008A (en) * 2021-03-29 2021-12-14 荣耀终端有限公司 V2X signature verification method, device, electronic device and readable storage medium
CN113795008B (en) * 2021-03-29 2022-08-02 荣耀终端有限公司 V2X signature verification method and device, electronic equipment and readable storage medium
CN116233786A (en) * 2021-12-03 2023-06-06 北京万集科技股份有限公司 V2X data processing method and device and V2X road side equipment

Also Published As

Publication number Publication date
CN111901126B (en) 2022-10-14

Similar Documents

Publication Publication Date Title
US11971978B2 (en) Vehicle network system whose security is improved using message authentication code
US10841243B2 (en) NIC with programmable pipeline
US12375566B2 (en) Data transmission method, apparatus and device, and computer-readable storage medium
US20160373261A1 (en) Method for manipulation protection of a bus system between at least two system components
EP2775660B1 (en) Message authentication method in communication system and communication system
CN109379380A (en) Data transmission method, data receiver method and remote printing system, mobile terminal
US10243829B2 (en) Communication protocol testing method, and tested device and testing platform thereof
EP3605881B1 (en) Method and device for transmitting and receiving network management information, transmitting apparatus and receiving apparatus
CN110620762A (en) RDMA (remote direct memory Access) -based data transmission method, network card, server and medium
US12395471B2 (en) Sufficiently secure controller area network
CN111901126B (en) Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer
US20200128042A1 (en) Communication method and apparatus for an industrial control system
CN112468407A (en) Data subpackage transmission method and device, computer equipment and storage medium
CN118175205B (en) Algorithm card scheduling method and device, storage medium and electronic equipment
CN117255061B (en) DPU-based encrypted message speed limiting method and device
US11960611B2 (en) Efficient distribution of processes between a vehicle control computing device and a cryptographic module, and method for operation thereof
CN110912841B (en) SRIO protocol control character and data packet separation system facing 128bit width
CN115952513B (en) Communication method and system based on T-BOX data secure storage component
CN115665242B (en) Method and device for sending and receiving messages
CN117560226B (en) Method and device for data transmission through VPN
CN109194490B (en) Power distribution network communication security authentication system and method
CN114329507B (en) Encryption accelerator and system and method for encryption
CN107171800B (en) Scheduling system of multi-channel cryptographic algorithm
US12088672B1 (en) Efficient and secured access to in-vehicle end nodes across a vehicle fleet
US20240356754A1 (en) Nonce preprocessing for a security scheme

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant