Font Size: a A A

Design And Implementation Of Security Mechanism In-vehicle Transaction Platform

Posted on:2012-11-17Degree:MasterType:Thesis
Country:ChinaCandidate:T Z DongFull Text:PDF
GTID:2178330332499602Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, with the rapid development of the computer network technology and automotive electronic technology, many areas have undergone enormous changes. The automobile is no longer isolated unit because of people start to combine computer technology and network technology with the automotive industry. There is processor, operating system, sensors and other computing resources in modern car, and with the help of wireless networks, communications authority, satellite positioning technology, the car becomes a feature-rich vehicle terminal node which can provide many features, such as automotive multimedia, intelligent transportation. With the development of the vehicle terminal computing power, applications based on vehicle networking continue to emerge, and in-vehicle e-commerce will become the most important areas of automotive applications in the future. In-vehicle transaction platform will make people's lives more convenient and can save a lot of human and material resources, for example. Nowadays, in-vehicle network technology has become a hot research spot, and many vehicle electronics manufacturers believe that the in-vehicle e-commerce is an enormous business opportunity. Major manufacturers have invested a lot of manpower and resources in the research and development of in-vehicle network applications.However, security issues will restrict the development of in-vehicle network, because most vehicle network applications, e.g. GPS navigation, intelligent co-driver, and in-vehicle transaction platform, are related to the personal and property security and privacy issues. How to ensure that sensitive information in-vehicle network application security is the most important research spot.In order to solve the security issues in the in-vehicle network applications, the experts have made a variety of solutions such as intrusion detection, secure routing, key technology. But because of the dynamic topology and the limited computing power, these traditional security technologies have exposed their limitations and shortcomings when they are applied in the in-vehicle networks. These traditional security technologies don't support dynamic topology in the network and the algorithm is so complex that the overall performance is unsatisfied. In this paper, we analyze the security issues in the in-vehicle network applications and the existing solutions and research to find the limitations of these solutions first, then according to the particularity of their application areas, real-time information and node mobility, we provide a new solution for the security issues in the in-vehicle networks, and take the in-vehicle transaction platform as an example and apply the solution to the platform. We focus on authentication, integrity assessment mechanism and the cloud storage of assessment strategies to solve the security issues in the in-vehicle transaction platform. The specific implementation of the program includes:applied the wireless public key infrastructure to the in-vehicle platform, completed the design and implementation of identity authentication mechanisms; proposed the integrity of the assessment mechanism based on rough set theory; set up a new threshold multi-secret sharing model, and used the new security model for protection of assessment strategies, cloud storage mechanism for appling to store the assessment strategies.In this paper, we describe the proposed solution in detail including the scenario and the architecture, and discuss the possibility to apply the solution in other in-vehicle network applications. Finally, we give our design of the system and implement it under the Linux platform.
Keywords/Search Tags:In-vehicle network, In-vehicle transaction platform, Authentication, Integrity assessment, Cloud computing
PDF Full Text Request
Related items