Font Size: a A A

Research On Trusted Routing And Trudted Access Server In Vehicular Ad-hoc Network

Posted on:2012-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:J Y DengFull Text:PDF
GTID:2178330332499603Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, with the rapid development of the Vehicular Ad-hoc Network, and the increasing of information communication between vehicles, so the network information data is facing more and more security threats. Therefore, VANET security has become a research hotspot, the people urgently need to research how to defense VANET from the internal and external security threats.Vehicular Ad-hoc Network has many features different from the traditional Internet. For example, the nodes move fast, the topologies change frequently, the wireless channel's quality is unstable, the distribution of nodes is limited by road etc. Therefore, the securities of nodes, routing protocol and network connection in VANET are facing great challenge:the high-speed dynamic topology makes the routing information vulnerable to attack; the malicious nodes distribute false information to disturb the routing protocol, result in data loss, network suspend and even bringing down the network. Furthermore, VANET with the self-organizing and no central features, the mature security technologies in Cable Ad Hoc Network can not be fully appropriate for VANET.A number of IT giants initiated Trusted Computing Platform Alliance (Trusted Computing Platform Alliance, TCPA) since October 1999, just 10 years, the trusted computing technology has developed rapidly and became the New Wave Technology in the world information security area. Along with the emergence of TPM chip, which is absolutely complied with TPM1.2 standard of Trusted Computing Group (Trusted Computing Group, TCG), it provides a new way of thinking to resolve security issues in VANET.In order to enhance the reliability of packet transmission, VANET nodes usually transmit the packet to the neighbor can be trust. The "trusted" is an expectation, in accordance with this expectation, the equipments are going to work in a certain way according to the specific purpose. In general, only some of VANET nodes can be trusted, and the "trusted" will be transferred along them in VANET, they establish the trusted relationships between the strange nodes, all of the relationships will constitute the trusted network.This paper detailedly describes the trusted computing technology, TPM chip's principles and features, and Trusted Network Connect (Trusted Network Connect, TNC)'s specification, authentication model, frame structure and communication process. This paper introduces the trusted computing technology into VANET, and regards TPM chip as the only identification of the vehicle, and moreover, proposes the definition of trusted nodes, which can achieve the basic requirement of trusted nodes in VANET. The routing protocol undertakes the important task of linking the nodes to constitute VANET, and plays a vital role in the operation of the entire network, so the security of routing protocol is facing the most significant challenge in VANET. Location-based routing protocol does not need to maintain an end-to-end path, as long as each node knows its location, the destination node's location, and the neighbor nodes'location, they can realize the end-to-end communication. This routing protocol does not need to storage and update routing table, but can transmit data packets to all the nodes in a certain geographical area by maintaining the neighbor table. It can adapt to the network size and topology change quite well, so now the location-based routing protocols are the most frequently used in VANET, the primary representative protocol is GPSR (Greedy Perimeter Stateless Routing). This paper combines GPSR routing protocol with the trusted computing technology to achieve the trusted security routing protocol model, and through the NS2 simulation, we compare it against the original GPSR routing protocol, the result demonstrates that the trusted security routing protocol can better defense internal malicious nodes.In VANET, not only routing protocol may be security attacked, but also the network connect is the main target of security attacks. The research purpose of the trusted network connect is to use the new network security technologies to solve the modern network security issues that the traditional network security technologies can not cope with. The trusted terminal system is an important component of the trusted network, an effective way to dispose the network security threats caused by the terminal systems is to control their authorization of connecting to VANET. Therefore, this paper uses TNC architecture, and implements trusted network connect server in AS5.4 according the characteristics of VANET, takes advantage of it to verify the integrity and security of node terminal, and to maintain VANET security from the outside vehicle connection.The simulation results of trusted routing protocol and trusted network connect server model show that introducing the trusted computing technology into VANET can maintain VANET security, both internally and externally, and this entire trusted security mechanism from inside to outside proposed in the paper is correct and feasible.
Keywords/Search Tags:Vehicular Ad-hoc Network, Trusted Computing, Greedy Perimeter Stateless Routing, Trusted Network Connect, Trusted Network Connect Server
PDF Full Text Request
Related items