Paper
20 April 2023 Research on C-V2X short-range communication security authentication technology based on domestic commercial cryptography algorithm
XinRui Shao, MuXi Li, XueZhu Yang, Miao Wu
Author Affiliations +
Proceedings Volume 12602, International Conference on Electronic Information Engineering and Computer Science (EIECS 2022); 126023A (2023) https://doi.org/10.1117/12.2668061
Event: International Conference on Electronic Information Engineering and Computer Science (EIECS 2022), 2022, Changchun, China
Abstract
In order to solve the identity authentication and security communication problems of people, vehicles, roads and clouds in C-V2X communication, it is necessary to carry out the research on security authentication technology of C-V2X shortrange communication in intelligent connected vehicles. Based on the V2X scenario of Hongqi brand automobile, this study introduces the C-V2X short-range communication security authentication technical scheme, analyzes the requirements of the V2X PKI authentication system, combines the domestic commercial cryptography algorithm, adopts, and realizes the flexible addition or reduction of each module through hierarchical design and component-based development technology, which can quickly adapt to the different needs of users for network communication security, and provides comprehensive security services such as identity authentication, access control, and data integrity protection for network applications.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
XinRui Shao, MuXi Li, XueZhu Yang, and Miao Wu "Research on C-V2X short-range communication security authentication technology based on domestic commercial cryptography algorithm", Proc. SPIE 12602, International Conference on Electronic Information Engineering and Computer Science (EIECS 2022), 126023A (20 April 2023); https://doi.org/10.1117/12.2668061
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Telecommunications

Data communications

Technology

Security technologies

Network security

Information security

Principal component analysis

Back to Top