| With the rapid development of technologies such as cloud compute,5G mobile communication and the Internet,Intelligent Transport System(ITS)has become a hotspot that attracted attention form researchers.The Internet of Vehicles(Io V)is the most part of ITS,and intelligent connected vehicles are user equipment that have the most close relationship with drivers and passengers.In order to sense environment,connected vehicles will be equipped with many sensors,data generated by these sensors should be transmitted over Automotive Ethernet.Besides,connected vehicles have high requirements for data transmission speed,reliability and time delay,in order that keep communicate with Io V.At present,V2 X technology based on cellular networks has become the main communication technology in the Io V,and 5G NR-V2 X based on 5G technology has attracted the attention of academia and industry.Automotive Ethernet and 5G are two heterogeneous networks.They are different in the format of protocol data units(PDU)in data link layer,we must convert those two type of PDUs for the interconnection between Automotive Ethernet and 5G.While connected vehicles access networks or communicate with other entities,they are vulnerable from pseudo base stations,illegal user equipment,and third-party malicious devices,lead to the loss of vehicles and users.Thus,connected vehicles must verify the identity of the counterpart of the communication before data transmission begins in order to protect vehicles and users.This research was mainly focus on the above two issues.Main works of this research are as follows:(1)This research has studied data link layer protocols of Automotive Ethernet and 5G in Io V,and then proposed a method of Automotive Ethernet-5G protocols conversion.This method can convert data from one type to another,no matter the data is transmitted or received by connected vehicle.By this method we can interconnect Automotive Ethernet and 5G.(2)On information security and protection of connected vehicles and networks in Io V,this research has proposed a method of anonymous identity authentication for Io V.This method is based on blockchain technology,includes identity register and identity verification.Before connected vehicles and other traffic participants access Io V,they should register their identity and get a public identity block.Both sides of the communication could conduct anonymous identity verification.Blockchain technology was proposed in Bitcoin whose structure is one-direction and linear,that is not appliable for complex Io V system.This research has achieved the above anonymous identity authentication method by tree-like blockchain,and verified the feasibility and effectiveness of this method by simulations.(3)To protect the safety of data and information when connected vehicles communicate with other traffic participants in Io V,this research has proposed a method of secure communication for Io V based on SM cryptographic algorithms.Firstly,on the characteristics and information security requirements of communication in Io V,this research has studied mainstream cryptographic algorithms.Then,this research has integrated the method of identity authentication we proposed,applied SM2 cryptography to achieve SM4 key agreement while verifying identity,build confidential communication for connected vehicles based on SM4 cryptography.On these basis,this research has coded all related programs and implemented this secure communication method.Finally,this research has analyzed and discussed the safety,reliability and communication overhead of this method with program simulation results.(4)In order to verify the feasibility of the above secure communication method,this research has designed related FPGA modules and simulated key process of the method,and analyzed simulation results.Results of this research shown that the method of anonymous identity authentication based on blockchain and the method of secure communication based on SM cryptographic algorithms proposed by this research have wonderful safety and feasibility. |