Reducing the Computational Load on Processors by Selectively Discarding Data in Vehicular Networks
First Claim
1. A method for efficiently processing messages staged for authentication in a security layer of a protocol stack in a wireless vehicle-to-vehicle communication system, the vehicle-to-vehicle communication system including a host vehicle receiver for receiving messages transmitted by one or more remote vehicles, the host receiver being configured to authenticate received messages in a security layer of a protocol stack, the method comprising the steps of:
- receiving a wireless message broadcast by a remote vehicle, the wireless message containing characteristic data of the remote vehicle;
analyzing the characteristic data of the remote vehicle for determining whether the wireless message transmitted by the remote vehicle is in compliance with a predetermined parameter of the host vehicle; and
discarding the wireless message prior to a transfer of the wireless message to the security layer in response to a determination that the wireless message transmitted by the remote vehicle is not in compliance with the predetermined parameter of the host vehicle, otherwise transferring the wireless message to the security layer.
8 Assignments
0 Petitions
Accused Products
Abstract
A method is provided for efficiently processing messages staged for authentication in a security layer of a protocol stack in a wireless vehicle-to-vehicle communication system. The vehicle-to-vehicle communication system includes a host vehicle receiver for receiving messages transmitted by one or more remote vehicles. The host receiver is configured to authenticate received messages in a security layer of a protocol stack. A wireless message broadcast by a remote vehicle is received. The wireless message contains characteristic data of the remote vehicle. The characteristic data is analyzed for determining whether the wireless message is in compliance with a predetermined parameter of the host vehicle. The wireless message is discarded prior to a transfer of the wireless message to the security layer in response to a determination that the wireless message is not in compliance with the predetermined parameter of the host vehicle. Otherwise, the wireless message is transferred to the security layer.
103 Citations
18 Claims
-
1. A method for efficiently processing messages staged for authentication in a security layer of a protocol stack in a wireless vehicle-to-vehicle communication system, the vehicle-to-vehicle communication system including a host vehicle receiver for receiving messages transmitted by one or more remote vehicles, the host receiver being configured to authenticate received messages in a security layer of a protocol stack, the method comprising the steps of:
-
receiving a wireless message broadcast by a remote vehicle, the wireless message containing characteristic data of the remote vehicle; analyzing the characteristic data of the remote vehicle for determining whether the wireless message transmitted by the remote vehicle is in compliance with a predetermined parameter of the host vehicle; and discarding the wireless message prior to a transfer of the wireless message to the security layer in response to a determination that the wireless message transmitted by the remote vehicle is not in compliance with the predetermined parameter of the host vehicle, otherwise transferring the wireless message to the security layer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A vehicle-to-vehicle communication system for efficiently processing messages staged for authentication in a security layer of the protocol stack, the vehicle-to-vehicle communication system comprising:
-
a receiver for receiving incoming messages from remote vehicles; a processing unit within the receiver for processing the incoming messages received by the receiver of a host vehicle; and a protocol stack for executing a protocol for processing the received messages, the protocol stack including the security layer for authenticating a digital signature of the received message; a filter for selectively processing a number of messages being staged for authentication in a security layer of the protocol stack, the filter discarding a respective wireless message prior to a transfer of the respective wireless message to the security layer in response to a determination that the wireless message transmitted by the remote vehicle is not in compliance with a predetermined parameter of the host vehicle. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification