1. Field of the Invention
The present invention relates to a communication technique, and particularly to a terminal apparatus for exchanging a signal containing predetermined information.
2. Description of the Related Art
There is discussed a drive assist system for providing road information or intersection information via road-to-vehicle communication in order to prevent collision accidents at the intersections or to reduce traffic jams, or mutually providing vehicle drive information via inter-vehicle communication. With the road-to-vehicle communication, information on the situations of the intersections is communicated between a roadside apparatus and a vehicle-mounted apparatus. With the road-to-vehicle communication, the roadside apparatuses need to be installed on the intersections or on the roads, and thus time and cost therefor increase. To the contrary, with the inter-vehicle communication, or in a form in which information is communicated between the vehicle-mounted apparatuses, the roadside apparatuses do not need to be installed. In this case, for example, current position information is detected by GPS (Global Positioning System) or the like in real-time and the position information is exchanged between the vehicle-mounted apparatuses, so that a determination is made as to on which road the vehicle and other vehicles are positioned to enter the intersection.
Communication is more easily intercepted with wireless communication than with wired communication, and thus confidential communication contents are difficult to secure. When a apparatus is controlled via a network, a spoofing third party can operate it via illegal communication. In order to secure confidential communication contents via the wireless communication, communication data needs to be encrypted and a key used for the encryption needs to be periodically updated. For example, each network apparatus is in an initial state in which only data encrypted with an old encryption key used before the update can be exchanged on the update of the encryption key. Each apparatus can exchange both items of data encrypted with the old encryption key and the updated new encryption key in this state, and the exchange of the data encrypted with the new encryption key transits to the operation-unconfirmed state. Further, each apparatus can exchange the data encrypted with both the old encryption key and the new encryption key, and the exchange of the data encrypted by the new encryption key transits to the operation-confirmed state. Finally, each apparatus sequentially transits to the state in which only the data encrypted with the new encryption key after the completion of the key update can be exchanged.
When a wireless LAN is applied to the inter-vehicle communication, information needs to be transmitted to many terminal apparatuses and thus a signal is desirably transmitted in broadcast. However, at the intersections, an increase in vehicles or an increase in terminal apparatuses causes an increase in traffics, and thus an increase in collisions of packet signals is expected. Consequently, data contained in the packet signal cannot be sent to other terminal apparatus. If the state occurs in the inter-vehicle communication, the purpose to prevent collision accidents at the intersections cannot be achieved. Further, if the road-to-vehicle communication is made in addition to the inter-vehicle communication, various communication forms are employed. At this time, a decrease in mutual impacts between the inter-vehicle communication and the road-to-vehicle communication is required.
In the situation, a message authentication code (MAC) generated in common key cryptosystem or an electronic signature generated in public key cryptosystem is attached to a message in order to prevent spoofing or data falsification. The message with a message authentication code or electronic signature is verified on the reception side. When the message transmitted in broadcast is attached with a message authentication code or electronic signature, the message needs to be verified with a message authentication code or electronic signature within a predetermined period.
In order to solve the above problem, a terminal apparatus according to an aspect of the present invention includes a reception unit configured to periodically receive a packet signal from a base station apparatus in each of two or more subframes in a superframe formed by time-multiplexing the subframes, an analysis unit configured to give a priority order to a subframe receiving the packet signal from the base station apparatus based on the packet signal received in the reception unit, and a processing unit configured to preferentially process the packet signal received in the subframe with a high priority order among the priority orders given in the analysis unit.
Another aspect of the present invention also provides a communication apparatus. The communication apparatus includes a generation unit configured to generate an electronic signature by a private key based on at least a security header and a payload, an encryption unit configured to perform an encryption processing on at least the payload and a security footer, and an output unit configured to output a security frame in which at least the security header, the payload and the security footer are arranged. The security header to be subjected to an electronic signature to be generated by the generation unit contains a public key certificate, and the private key corresponding to the public key certificate is used for generating the electronic signature, the encryption unit excludes the security header from the encryption processing, and the security footer contains the electronic signature generated in the generation unit, and the encryption processing is performed on the payload and the security footer in the security frame output from the output unit by the encryption unit.
Any combination of the constituents, and a modified representation of the present invention in a method, a apparatus, a system, a recording medium and a computer program are also effective as an aspect of the present invention.
The invention will now be described by reference to the preferred embodiments. This does not intend to limit the scope of the present invention, but to exemplify the invention.
Before specifically describing the present invention, we will describe an outline thereof. An embodiment of the present invention relates to a communication system for making inter-vehicle communication between vehicle-mounted terminal apparatuses and for making road-to-vehicle communication from a base station apparatus installed at an intersection or the like to a terminal apparatus. For the inter-vehicle communication, the terminal apparatus transmits a packet signal storing vehicle information such as vehicle speed or position therein in broadcast (broadcast transmission of packet signals will be referred to as “broadcast” below). When receiving the packet signal, other terminal apparatus recognizes an approach of the vehicle based on the data. For the road-to-vehicle communication, the base station apparatus broadcasts a packet signal storing intersection information and traffic jam information therein. The information contained in the packet signals for the inter-vehicle communication and the road-to-vehicle communication will be collectively referred to as “data” for a simplified explanation.
The intersection information contains intersection circumstances such as a position of the intersection, shot images of the intersection installed with the base station apparatus, and position information of vehicles at the intersection. The terminal apparatus displays the intersection information on a monitor, recognizes the situation of the vehicles at the intersection based on the intersection information, and transmits the presence of other vehicles or pedestrians to a user in order to prevent head-on, right-turn and left-turn collisions, thereby preventing accidents. The traffic jam information contains information on congestion situations, roadworks or accidents of the roads around the intersection installed with the base station apparatus. The traffic jams in the travelling direction are transmitted or alternate routes are presented to the user based on the information.
For the communication, completeness, authenticity and confidentiality of the data are desired. Completeness is to ensure that information is not falsified, authenticity is to ensure data sources, and confidentiality is that the data is not known to the third parties. For example, a data authentication code using a common key encryption or an electronic signature using a public key encryption is added for completeness, an electronic signature (public key infrastructure (PKI)) is added to a public key certificate and data for authenticity, and data is encrypted for confidentiality. The processing amounts are different from each other, and should be applied as needed. Since the traffics in the inter-vehicle communication are more than the traffics in the road-to-vehicle communication, a data authentication code is attached and the data is encrypted for ensuring completeness and confidentiality of the data in the inter-vehicle communication. The data authentication code is used since it has a smaller amount of data and its verification processing is simpler than the electronic signature. In the road-to-vehicle communication, completeness, authenticity and confidentiality are ensured, and a public key certificate and an electronic signature are attached and the data is encrypted on the roadside apparatus. This is because a transmission data length has a more margin than in the inter-vehicle communication and important information such as traffic lights' information is contained in the data to be transmitted. Depending on a type of the data to be transmitted, the data may not be encrypted or a message authentication code or electronic signature may not be attached.
As illustrated, a road in the horizontal direction of the figure or in the right and left direction and a road in the vertical direction of the figure or in the up and down direction intersect at the center. Herein, the upper side of the figure corresponds to “north”, the left side corresponds to “west”, the lower side corresponds to “south”, and the right side corresponds to “east.” The intersection part of the two roads is an “intersection.” The first vehicle 12a and the second vehicle 12b travel from left to right, and the third vehicle 12c and the fourth vehicle 12d travel from right to left. The fifth vehicle 12e and the sixth vehicle 12f travel from top to bottom, and the seventh vehicle 12g and the eighth vehicle 12h travel from bottom to top.
The communication system 100 arranges the base station apparatus 10 at the intersection. The base station apparatus 10 controls communication between the terminal apparatuses. The base station apparatus 10 repeatedly generates a superframe containing a plurality of subframes based on a signal received from the GPS satellite (not shown) or a superframe formed in other base station apparatus 10 (not shown). There is defined such that a road-to-vehicle transmission period can be set at the header of each subframe. The base station apparatus 10 selects a subframe for which the road-to-vehicle transmission period is not set by other base station apparatus 10 from among the subframes. The base station apparatus 10 sets the road-to-vehicle transmission period at the header of the selected subframe. The base station apparatus 10 broadcasts a packet signal in the set road-to-vehicle transmission period. This corresponds to the road-to-vehicle communication.
When receiving a packet signal from the base station apparatus 10, the terminal apparatus generates a superframe based on the information contained in the packet signal. Consequently, the superframes generated in the terminal apparatuses are synchronized with the superframe generated in the base station apparatus 10. When the terminal apparatus can receive a packet signal from the base station apparatus 10, the terminal apparatus can be present in an area 212. When being present in the area 212, the terminal apparatus broadcasts the packet signal in a carrier sense during a inter-vehicle transmission period. This corresponds to the inter-vehicle communication.
In the road-to-vehicle communication, an electronic signature generated with a private key of public key cryptosystem and a public key certificate on the roadside apparatus for verifying the electronic signature are attached. The electronic signature corresponds to a seal or signature on a sheet, and is mainly used for confirming the identity and preventing forgery and falsification. More specifically, when a person is described on a document as a creator of the document, that the document is truly created by the creator is proven by the signature or seal of the creator attached to the document in the case of a sheet document. However, a seal or signature cannot be directly attached to an electronic document, and thus an electronic signature is used for proving it. Hash function and public key encryption are used for generating an electronic signature.
A digital signature based on public key cryptosystem is dominant as an electronic signature. Specifically, a system based on public key cryptosystem employs RSA, DSA, ECDSA and the like. The electronic signature system includes a key generation algorithm, a signature algorithm and a verification algorithm. The key generation algorithm corresponds to a preparation of an electronic signature. The key generation algorithm outputs a user public key and private key. A different random number is selected whenever the key generation algorithm is executed, and a different pair of public key and private key is assigned per roadside apparatus. A public key certificate is formed to be attached with an electronic signature by a third party of the public key.
The roadside apparatus inputs its private key together with the data when creating an electronic signature by the signature algorithm. Only the roadside apparatus having its private key should know the private key used for the signature, and thus this is an evidence for identifying the transmission source of the data attached with the electronic signature. The user terminal apparatus receiving the data, the public key certificate and the electronic signature verifies the attached public key certificate on the roadside apparatus and confirms the validity of the roadside apparatus as an origination source by the previously-published authentication key for verifying the public key certificate of the roadside apparatus. When the validity is confirmed, the public key is taken out from the public key certificate of the roadside apparatus, and the electronic signature attached to the data is verified and its result is output. Processing loads of the verification processing in public key cryptosystem are typically heavy.
On the other hand, in the inter-vehicle communication, a packet signal attached with a message authentication code generated in common key cryptosystem is broadcasted. In common key cryptosystem, the same key is used between the terminal apparatus on the transmission side and the terminal apparatus on the reception side. The key used for verification is known and the key certificate is not required for the terminal apparatus on the reception side, and thus a deterioration in transmission efficiency is further restricted than in public key cryptosystem. When the same key is not present, the data authentication code cannot be confirmed and thus completeness of the data is ensured. Common key cryptosystem employs DES, AES, and the like. The data encryption employs common key cryptosystem in both the road-to-vehicle communication and the inter-vehicle communication.
The RF unit 22 receives a packet signal from a terminal apparatus (not shown) or other base station apparatus 10 by the antenna 20 for the reception processing. The RF unit 22 performs frequency conversion on the received wireless frequency packet signal, and generates a baseband packet signal. The RF unit 22 further outputs the baseband packet signal to the modulation/demodulation unit 24. Typically, the baseband packet signal is formed of an in-phase component and an orthogonal component and thus should be indicated by two signal lines, but only one signal line is indicated herein for clarifying the figure. The RF unit 22 includes a LNA (Low Noise Amplifier), a mixer, an AGC and an A/D conversion unit.
The RF unit 22 performs frequency conversion on the baseband packet signal input from the modulation/demodulation unit 24 and generates a wireless frequency packet signal for the transmission processing. The RF unit 22 further transmits the wireless frequency packet signal from the antenna 20 in the road-to-vehicle transmission period. The RF unit 22 includes a PA (Power amplifier), a mixer, and a D/A conversion unit.
The modulation/demodulation unit 24 demodulates the baseband packet signal from the RF unit 22 for the reception processing. The modulation/demodulation unit 24 further outputs a MAC frame to the MAC frame processing unit 26 based on the demodulation result. The modulation/demodulation unit 24 modulates the MAC frame from the MAC frame processing unit 26 for the transmission processing. The modulation/demodulation unit 24 further outputs the modulation result as a baseband packet signal to the RF unit 22. Herein, the communication system 100 copes with the OFDM (Orthogonal Frequency Division Multiplexing) modulation system, and thus the modulation/demodulation unit 24 also performs FFT (Fast Fourier Transform) for the reception processing and performs IFFT (Inverse Fast Fourier Transform) for the transmission processing.
The MAC frame processing unit 26 extracts a security frame from the MAC frame from the modulation/demodulation unit 24 for the reception processing, and outputs it to the security processing unit 28. The MAC frame processing unit 26 adds a MAC header, a LLC header and a RSU control header to the security frame from the security processing unit 28 for the transmission processing, and generates and outputs a MAC frame to the modulation/demodulation unit 24. Timing control is performed for preventing the packet signals from other base station apparatus or terminal apparatus from crashing.
The data authentication processing unit 34 receives application data from the network communication unit 32 for the transmission processing. This corresponds to the application data of
Thus, the security header as a target of the electronic signature contains a public key certificate, and the private key corresponding to the public key certificate is used for generating the electronic signature. The data authentication processing unit 34 stores the electronic signature in the security footer. When the management data is contained, the data authentication processing unit 34 generates an electronic signature by the private keybased on the security header, the management data and the payload. On the other hand, when the message authentication illustrated in
When the message authentication illustrated in
As illustrated in
The security processing unit 28 receives the security frame from the MAC frame processing unit 26 for the reception processing. The security processing unit 28 confirms the contents of the security header in the security frame. When the message form is data-authenticated data, the data authentication processing unit 34 performs a message verification processing. When the message form is authenticated encrypted data, the data authentication processing unit 34 performs the message verification processing and the encryption processing unit 36 performs a decryption processing. When the message form is plaintext, the processings are omitted. When the transmission source of the security frame is other base station apparatus 10, the data authentication processing unit 34 and the encryption processing unit 36 perform the message verification processing and the decryption processing corresponding to the electronic signature generation processing and the encryption processing, respectively. The data authentication processing unit 34 performs apparatus authentication based on the public key certificate contained in the security frame. On the other hand, when the transmission source of the security frame is the terminal apparatus, the data authentication processing unit 34 and the encryption processing unit 36 perform the message verification processing and the decryption processing corresponding to the electronic signature generation processing and the encryption processing performed in the terminal apparatus, respectively. The electronic signature generation processing and the encryption processing performed in the terminal apparatus will be described later. The security processing unit 28 outputs a processing result to the network communication unit 32.
The network communication unit 32 is connected to a network (not shown). The network communication unit 32 outputs the processing results in the security processing unit 28 to a network (not shown) and accumulates them therein, and periodically outputs them to a network (not shown). The network communication unit 32 receives road information (such as roadworks and traffic jams) from a network (not shown). The control unit 30 controls the entire processings of the base station apparatus 10.
The structure can be realized by a CPU, a memory or other LSI in any computer in hardware, and can be realized by a program loaded in a memory in software, and the functional blocks realized in their association are depicted. Thus, those skilled in the art can understand that the functional blocks can be realized in any form such as hardware only, software only, or a combination thereof.
The data authentication processing unit 64 receives application data from the data generation unit 62 for the transmission processing. This corresponds to the application data of
The data authentication processing unit 64 stores the message authentication code in the security footer. When the management data is contained, the data authentication processing unit 64 generates a message authentication code by the common key based on the security header, the management data and the payload. On the other hand, when the message authentication illustrated in
When the message authentication illustrated in
The security processing unit 58 outputs the security frame in which at least the security header, the payload and the security footer are arranged as illustrated in
The security processing unit 58 receives the security frame from the MAC frame processing unit 26 for the reception processing. The security processing unit 58 confirms contents of the security header in the security frame. When the message form is data-authenticated data, the data authentication processing unit 64 performs the message verification processing. When the message form is authenticated encrypted data, the data authentication processing unit 64 performs the message verification processing and the encryption processing unit 66 performs the decryption processing. When the message form is plaintext, the processings are omitted. When the transmission source of the security frame is other terminal apparatus 14, the data authentication processing unit 64 and the encryption processing unit 66 perform the message verification processing and the decryption processing corresponding to the electronic signature generation processing and the encryption processing, respectively. On the other hand, when the transmission source of the security frame is the base station apparatus 10, the data authentication processing unit 64 and the encryption processing unit 66 perform the message verification processing and the decryption processing corresponding to the electronic signature generation processing and the encryption processing performed in the base station apparatus 10 previously described. The security processing unit 58 outputs a processing result to the reception processing unit 60.
The reception processing unit 60 estimates a risk of collision, an approach of emergency vehicle such as ambulance or firetruck, a congestion situation of the road in the travelling direction and the intersection based on the data received from the security processing unit 58 and the vehicle information received from the data generation unit 62. The data, if any image information, is processed to be displayed on the notification unit 70. The notification unit 70 includes a notification means to the user such as monitor, lamp or speaker (not shown). An approach of other vehicle 12 (not shown) is notified to the driver via the monitor, lamp or speaker in response to an instruction from the reception processing unit 60. The traffic jam information or the intersection image information is displayed on the monitor.
The data generation unit 62 includes a GPS receiver (not shown), a gyroscope, a vehicle speed sensor and the like, and acquires the vehicle information (not shown), that is, a presence position, a travelling direction, a moving speed, and the like of the vehicle 12 mounting the terminal apparatus 14 thereon based on the information supplied therefrom. The presence position is indicated by latitude and longitude. The acquisition may employ a well-known technique, and its explanation will be omitted herein. The data generation unit 62 generates data based on the acquired information, and outputs the generated data as application data to the security processing unit 58. The control unit 72 controls the entire operations of the terminal apparatus 14.
A modification of the present invention will be described below. The modification of the present invention relates to a communication system in which the inter-vehicle communication and the road-to-vehicle communication are made similarly as in the embodiment. The terminal apparatus receives a plurality of packet signals from the base station apparatus during the road-to-vehicle transmission period. When the number of packet signals is 7 and an electronic signature is attached, the terminal apparatus performs an originator authentication processing once and a message authentication processing seven times. The originator authentication processing is performed on only the first packet signal. Consequently, the terminal apparatus performs the ECDSA verification processing eight times and the SHA calculation seven times in the road-to-vehicle transmission period. Assuming that a superframe contains a plurality of subframes and the number of subframes is 16, the terminal apparatus is requested to perform the ECDSA verification processing 128 times for the superframe. As described above, a length of the superframe is 100 msec, and thus the ECDSA verification processing is required to terminate in a shorter period than 1 msec. Typically, the processing amount of the ECDSA verification processing is large, and thus a high-speed calculator capable of completing the processing in a shorter period than 1 msec is difficult to mount on the terminal apparatus. That is, when the packets by all the road-to-vehicle communication are to be verified, cost for the terminal apparatus remarkably increases and wide use thereof is prevented.
In order to address the same, the base station apparatus according to the modification broadcasts the position information on the base station apparatus contained in a packet signal. For example, the position information on the base station apparatus is contained in the security header. When receiving a plurality of packet signals from the base station apparatus in predetermined periods, the terminal apparatus extracts the position information from each packet signal. The terminal apparatus compares the position information extracted from each packet signal with its position information, thereby to derive a distance between the base station apparatus broadcasting each packet signal and the terminal apparatus. The terminal apparatus gives a priority order to each of the subframes such that a base station apparatus with a shorter distance has a higher priority order. The terminal apparatus preferentially receives a packet signal from a subframe with a higher priority order in the road-to-vehicle transmission period. In the subframe not capable of being processed in the superframe, the terminal apparatus does not receive a packet signal in the road-to-vehicle transmission period. The communication system 100 according to the modification of the present invention is of the same type as
The security processing unit 28 in the base station apparatus 10 contains the position information in the security header. The position information is indicated by latitude and longitude, and may be indicated by altitude. The information on the upper part of latitude and longitude may be omitted in order to reduce the information amount of the position information.
The frame detection unit 76 acquires the received packet signals and the packet signals from the base station apparatuses 10 via the MAC frame processing unit 56. The packet signals are periodically received in the road-to-vehicle transmission period in each of two or more subframes in a superframe. As described above, the packet signal contains the position information on the base station apparatus 10 as a transmission source. When acquiring the packet signal, the frame detection unit 76 confirms the detection of the superframe. Consequently, a timing synchronization with the superframe and timing synchronizations with the respective subframes contained in the superframe are established.
The RSU detection unit 78 specifies a subframe which receives the packet signal from the base station apparatus 10 among the subframes contained in the superframe detected in the frame detection unit 76. This corresponds to the detection of a subframe for which the road-to-vehicle transmission period is set among the subframes. The RSU detection unit 78 outputs the information on the subframe for which the road-to-vehicle transmission period is set to the priority order determination unit 84. In the information on the subframe for which the road-to-vehicle transmission period is set, the subframe is associated with the base station apparatus 10 which sets the road-to-vehicle transmission period in the subframe.
The acquisition unit 80 acquires the position information on the base station apparatus 10 contained in the security header in the received packet signal. When receiving the packet signals from the base station apparatus 10, the acquisition unit 80 acquires the position information on each base station apparatus 10. The acquisition unit 80 also acquires the position information on the terminal apparatus 14. The position information on the terminal apparatus 14 is supplied from the data generation unit 62. The acquisition unit 80 outputs the position information on the terminal apparatus 14 and the position information on each base station apparatus 10 to the derivation unit 82.
The derivation unit 82 receives the position information on the terminal apparatus 14 and the position information on each base station apparatus 10 from the acquisition unit 80. The derivation unit 82 derives a distance from each base station apparatus 10 based on the position information on the terminal apparatus 14 and the position information on each base station apparatus 10. A vector calculation is made, for example, in order to derive the distance. The derivation unit 82 outputs the distance from each base station apparatus 10 to the priority order determination unit 84.
The priority order determination unit 84 receives the information on the subframe for which the road-to-vehicle transmission period is set from the RSU detection unit 78 and receives the distance from each base station apparatus 10 from the derivation unit 82. The priority order determination unit 84 gives a priority order to each base station apparatus 10 such that as the derived distance is shorter, the priority order is higher. The priority order determination unit 84 specifies a subframe for which each base station apparatus 10 sets the road-to-vehicle transmission period based on the information on the subframe for which the road-to-vehicle transmission period is set, thereby to give a priority order to each subframe. A priority order may not be given to a subframe for which the road-to-vehicle transmission period is not set, or the lowest priority order may be given thereto. The priority order determination unit 84 outputs a priority order given to each subframe to the priority order holding unit 86.
The priority order holding unit 86 receives the priority order given to each subframe from the priority order determination unit 84, and stores information on the priority order. The determination unit 88 causes the security processing unit 58 to preferentially process the packet signal received by the subframe given with a higher priority order among the priority orders given to the respective subframes. For example, when the packet signals in the road-to-vehicle transmission period set in two subframes can be processed by the processing capability of the terminal apparatus 14, the determination unit 88 selects two subframes in descending order of the priority order. The security processing unit 58 performs the reception processing on the packet signal in the road-to-vehicle transmission period of the subframe designated by the determination unit 88. The security processing unit 58 stops the reception processing in the road-to-vehicle transmission period in other subframe.
The operations of the communication system 100 with the above structure will be described.
Another modification of the present invention will be described below. Another modification of the present invention relates to a communication system in which the inter-vehicle communication and the road-to-vehicle communication are made as described above. In the modification, the base station apparatus broadcasts the position information contained in the packet signal in order to restrict the number of ECDSA verification processings according to a length of the superframe. The terminal apparatus sets a priority order to be higher for the subframe for which the base station apparatus with a near distance sets the road-to-vehicle transmission period, and preferentially performs the ECDSA verification processing on the subframe in descending order of the priority order. Another modification also has an object to restrict the number of ECDSA verification processings according to a length of the superframe. However, the base station apparatus according to another modification does not contain the position information in the packet signal.
On the other hand, when receiving the packet signals from the base station apparatus, the terminal apparatus measures reception power of each packet signal. The terminal apparatus gives a priority order to each of the subframes such that a higher priority order is given to the base station apparatus as a transmission source of the packet signal with higher reception power. The terminal apparatus preferentially receives a packet signal in a subframe with a higher priority order in the road-to-vehicle transmission period. The communication system 100 according to another modification of the present invention is of the same type as
The priority order determination unit 84 receives the information on the subframe for which the road-to-vehicle transmission period is set from the RSU detection unit 78, and receives the RSSI of each subframe from the RSSI detection unit 90. The priority order determination unit 84 gives a priority order to each subframe such that as the RSSI is higher, the priority order is higher. This corresponds to giving a priority order to each base station apparatus 10. The priority order determination unit 84 outputs the priority order given to each subframe to the priority order holding unit 86.
The operations of the communication system 100 with the above structure will be described.
Still another modification of the present invention will be described below. Still another modification of the present invention relates to a communication system in which the inter-vehicle communication and the road-to-vehicle communication are made as described above. In another modification, a priority order is given to each of the subframes based on reception power in order to restrict the number of times of the ECDSA verification processing according to a length of the superframe. Still another modification corresponds to the processing subsequent thereto. The terminal apparatus preferentially processes the packet signal in the road-to-vehicle transmission period in the subframe with a higher priority order. Message authentication is performed by the electronic signature contained in the packet signal, but may not be verified.
When verification fails, the terminal apparatus excludes the processing in the road-to-vehicle transmission period in the subframe from the next superframe. This corresponds to discarding the priority order of the subframe and advancing a lower priority order. The communication system 100 according to still another modification of the present invention is of the same type as
The data authentication processing unit 64 performs the verification processing on the electronic signature contained in the security footer for the reception processing as described above, and when the verification result is invalid, notifies the fact to the analysis unit 74. When receiving the fact that the verification result is invalid, the priority order determination unit 84 refers to the priority order holding unit 86 to discard the priority order of the corresponding subframe. The priority order determination unit 84 refers to the priority order holding unit 86 to correct the priority order such that a lower priority order than the discarded priority order is advanced. The priority order holding unit 86 stores the corrected priority orders. This corresponds to “priority order (flow 1) increase/decrease false policy” in
Still another modification of the present invention will be described below. Still another modification of the present invention relates to a communication system in which the inter-vehicle communication and the road-to-vehicle communication are made as described above. In another modification, a priority order is given to each of the subframes based on reception power in order to restrict the number of ECDSA verification processings according to a length of the superframe. The priority order is similarly given also in still another modification, but the priority order is given to a different target from other embodiment. In still another embodiment, a superframe is divided into a plurality of zones. For example, a superframe is divided into two zones such as the former zone and the latter zone. At this time, an integral number of subframes are contained in each zone.
The terminal apparatus gives the priority orders to the subframes contained in the former zone (which will be referred to as “first zone” below), and gives the priority orders to the subframes contained in the latter zone (which will be referred to as “second zone” below). Herein, the priority orders in the first zone and the priority orders in the second zone are independent from each other. The processing reduces a possibility of calculating ECDSA in the consecutive subframes. The communication system 100 according to still another modification of the present invention is of the same type as
The priority order determination unit 84 gives the priority orders to the subframes contained in the first zone in the superframe, and independently gives the priority orders to different subframes contained in the second zone.
Still another modification of the present invention will be described below. Still another modification of the present invention relates to a communication system in which the inter-vehicle communication and the road-to-vehicle communication are made as described above. The communication system 100 according to the modification is of the same type as
“Version” indicates a version of a frame format. “Message form” designates a message form. The message form includes a plaintext data form, an authenticated data form, and an authenticated encrypted data form. When the message form is a plaintext data form and an authenticated data form, the above encryption is not performed. In the case of a plaintext data form, the electronic signature and the MAC are not generated. Thus, the data known to “electronic signature” and “MAC”, for example, all the items of data are set at 0. “Key ID” is information for identifying a communication key shared between the base station apparatus 10 and the terminal apparatus 14. When the data form is an authenticated data form and an authenticated encrypted data form, the communication key identified by “apparatus ID” is used to perform MAC generation or encryption. The communication key can employ a common key in the previously-shared common key in common key cryptosystem, such as AES (Advanced Encryption Standard) key.
“Nonse” is set with a unique value per communication used for disturbing the result in the MAC generation and the encryption using the communication key. The value may be a random number or a transmission time. Further, the apparatus ID of the origination source may be added to the random number or transmission time. “Data length” sets a data length of an encryption target (more specifically, the number of bytes). When the data length of “public key certificate” is a fixed length, the data length of “payload” may be set.
“Public key certificate” sets a public key certificate for the public key unique to the base station apparatus 10. The public key certificate is a certificate associating the public key and an owner of the public key. The public key certificate includes signer identification information, apparatus ID, expiration date, public key (containing key generation algorithm and size), signer's signature, and the like. In the modification, the signer is assumed as certificate authority (CA). The signature is generated in public key cryptosystem such as RSA, DSA (Digital Signature Algorithm) or ECDSA (Elliptic Curve-DSA). The modification employs ECDSA.
“Electronic signature” is set with a signature for “payload.” The signature is generated by the private key paired with the public key contained in “public key certificate.”
For “MAC”, MAC generated by applying a predetermined MAC algorithm to the common key and the MAC target is set. The common key is a communication key shared between the base station apparatus 10 and the terminal apparatus 14. In the example of
The procedure of the reception processing by the terminal apparatus 14 according to the modification is the same as in the flowchart of
The determination unit 88 determines a thinning rate and a thinning timing for assigning the priority order “1”, the priority order “2” and the priority order “3” according to the number of processable subframes or the number of decryptable ECDSA in the superframe. For example, the electronic signature contained in the RSU packet signal received in the subframe with the priority order “1” is verified once per 100 msec, the electronic signature contained in the RSU packet signal received in the subframe with the priority order “2” is verified once per 1 sec, and the electronic signature contained in the RSU packet signal received in the subframe with the priority order “1” is verified once per minute.
The determination unit 88 causes the security processing unit 58 to verify MAC added to the security footer for the RSU packet signal for which the electronic signature verification is skipped (S165). The MAC verification does not use ECDSA, and thus does not increase the loads of the ECDSA core. The MAC verification uses AES, but the processing loads of AES are low.
There has been described that the data authentication processing unit 64 in the terminal apparatus 14 performs the verification processing on the electronic signature contained in the security footer. More strictly, the data authentication processing unit 64 performs both the verification of the public key certificate contained in the security header and the verification of the electronic signature contained in the security footer.
The data authentication processing unit 64 verifies the electronic signature contained in the public key certificate contained in the RSU packet signal transmitted from the base station apparatus 10 by use of the authentication key (public key). The authentication key may be previously incorporated or may be acquired later with a safe means. The electronic signature of the public key certificate employs ECDSA similar to the electronic signature of “payload.”
When the electronic signature contained in the public key certificate is successfully verified, the public key generated by the base station apparatus 10 contained in the public key certificate can be estimated to be true based on the demonstration by the certificate authority. However, since the signature employs ECDSA, the processing loads increase when the public key certificates for all the RSU packet signals are verified. The public key certificate verification is skipped as needed. For example, only the public key certificate contained in the RSU packet signal first received in the service area of a base station apparatus 10 is verified, and only the digest held in the storage region described later is compared for the subsequent RSU packet signals, and when matched, “electronic signature” of
The data authentication processing unit 64 holds the digest acquired from the successfully-verified public key certificate as a certificate verification log in a predetermined storage region. The digest is a hash value of data to be subjected to the electronic signature of the public key certificate, or its part. Instead of the digest, the serial number (identification information), the electronic signature, the public key and the apparatus ID contained in the public key certificate may be used. The storage region is formed by a FIFO-system RAM, and has a region for storing items of data more than the maximum number of RSU slots. In the present embodiment, since the superframe contains 16 subframes, the maximum number of RSU slots is 16.
When receiving the packet signal transmitted from the base station apparatus 10, the data authentication processing unit 64 compares the digest extracted from the public key certificate contained in the RSU packet signal with the digest held in the storage region. When both match, the verification of the public key certificate contained in the RSU packet signal is skipped. That is, success verification is assumed without proper verification and with a match of the digest of the public key certificate. This is because while the digest of the public key certificate matches, the packet signal transmitted from the same base station apparatus 10 is estimated. That is, once the public key certificate contained in the packet signal broadcasted from a base station apparatus 10 is successfully verified, the subsequent packet signals broadcasted from the base station apparatus 10 are determined to be highly reliable.
The data authentication processing unit 64 verifies the authenticated message contained in the RSU packet signal for which the digest of the public key certificate matches. The verification employs the public key and the apparatus ID contained in the received public key certificate. In the present embodiment, a verification is made as to whether “payload” in the message form with an electronic signature is true. For the encrypted message form with an electronic signature, the code is decrypted and then the same processings are performed. Since the electronic signature is generated by the private key paired with the public key stored in the public key certificate contained in the packet signal, if the message with the electronic signature using the public key is successfully verified, the message can be estimated to be generated by the base station apparatus 10 and to be true.
However, since the electronic signature employs ECDSA, if the messages with the electronic signature are verified in all the RSU packet signals, the processing loads increase. Thus, the verification of the electronic signature contained in the security footer is skipped for the packet signal for which the public key certificate is verified. The thinning processing is performed.
When the vehicle 12 enters the far distance area A3, the data authentication processing unit 64 in the terminal apparatus 14 receives a RSU packet signal from the base station apparatus 10. The data authentication processing unit 64 verifies the public key certificate contained in the security header of the first-received RSU packet signal. For the subsequent RSU packet signals, the comparison of the digest of the public key certificate and the message verification are performed. The electronic signature contained in the security footer of the RSU packet signal is verified at a frequency at which the priority order is set at “3” in the far distance area A3.
When the vehicle 12 further travels and enters the middle distance area A2, the data authentication processing unit 64 verifies the electronic signature contained in the security footer of the RSU packet signal at a frequency at which the priority order is set at “2.” When the vehicle 12 further travels and enters the near distance area A1, the data authentication processing unit 64 verifies the electronic signature contained in the security footer of the RSU packet signal at a frequency at which the priority order is set at “1.” When the vehicle 12 passes the base station apparatus 10 and reenters the middle distance area A2, the data authentication processing unit 64 verifies the electronic signature contained in the security footer of the RSU packet signal at a frequency at which the priority order is set at “2.” When the vehicle 12 further travels and reenters the far distance area A3, the data authentication processing unit 64 verifies the electronic signature contained in the security footer of the RSU packet signal at a frequency at which the priority order is set at “3.” When the vehicle 12 further travels and exits the service area of the base station apparatus 10, it cannot receive a packet signal from the base station apparatus 10 and its verification processing also ends.
According to the embodiment of the present invention, since the payload and the security footer are encrypted but the security header is not encrypted in the security frame, the contents of the security header can be acquired earlier. The contents of the security header can be acquired earlier and thus the reception processing can be speeded up. The priority orders are given to the subframes and a packet signal received in a subframe with a high priority order is preferentially processed, thereby reducing the number of packet signals to be processed. The number of packet signals to be processed is reduced and thus the number of ECDSA verification processings can be reduced.
The number of ECDSA verification processings is reduced and thus the verification of a message with an electronic signature can be completed within a predetermined period of time. The priority orders are given such that as a distance from each base station apparatus is shorter, the priority order is higher, and thus a packet signal from a near base station apparatus can be easily received. A packet signal from a near base station apparatus is easily received, and thus a reception quality of the packet signal can be enhanced. The priority orders are given such that as the reception power is higher, the priority order is higher, and thus a packet signal is easily received from a near base station apparatus.
When the verification processing performed on the electronic signature contained in the packet signal is invalid, the processing on the subframe receiving the packet signal is excluded from the next superframe, and thus a false base station apparatus can be ignored. A superframe is divided into a plurality of zones and the priority orders are given to the respective zones, and thus the timings of the ECDSA verification processings can be dispersed. The timings of the ECDSA verification processings are dispersed and thus the processings can be dispersed.
The thinning rate of the electronic signature verification is adjusted according to the priority order, thereby performing the reception processing more flexibly. The electronic signature and the MAC are used together in the road-to-vehicle communication, and thus the RSU packet signals which are not subjected to the reception processing can be reduced. The verification result of the public key certificate is left in the log, and thus the number of times of the certificate verification can be reduced.
The present invention has been described above by way of the embodiment. The embodiment is exemplary, and those skilled in the art may understand that various modifications of combination of the components and the processes are possible and such modifications are also encompassed in the scope of the present invention.
According to the modification of the present invention, the position information on the base station apparatus 10 is contained in the security header. However, the position information on the base station apparatus 10 is not limited thereto, and may be contained in other part. According to the modification, a degree of freedom for the design of the communication system 100 can be enhanced.
In another modification or still another modification of the present invention, the priority order determination unit 84 gives the priority orders based on the reception power. However, the priority order determination unit 84 is not limited thereto, and may give the priority orders based on the distance from each base station apparatus 10 similarly as in the embodiment. According to the modification, a degree of freedom for the design of the communication system 100 can be enhanced.
In still another modification of the present invention, a superframe is divided into two zones. The superframe is not limited thereto, and may be divided into three or more zones. According to the modification, a degree of freedom for the design of the communication system 100 can be enhanced.
Number | Date | Country | Kind |
---|---|---|---|
2010-293560 | Dec 2010 | JP | national |
Number | Date | Country | |
---|---|---|---|
Parent | PCT/JP2011/007151 | Dec 2011 | US |
Child | 13770845 | US |