Font Size: a A A

Application Of TCM In Mobile Terminals In Internet Of Vehicles

Posted on:2012-12-08Degree:MasterType:Thesis
Country:ChinaCandidate:W B GaoFull Text:PDF
GTID:2178330335950297Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With China's rapid economic development and improvement of people's living standards, more and more cars have entered ordinary families. The rapid increase in the number of cars in China has met people's demand for cars, but it also has brought many problems. Traffic jams, energy consumption, environmental pollution and the safety problems of vehicles have gotten worse. Faced with these problems caused by the transport industry, the development of Intelligent Transportation System (ITS) is one of the solutions.As an important component of ITS, Internet of Vehicles technology has become a hotspot and got the rapid development. It speeds up the traffic to the information and network development process. Internet of Vehicles combines the existing electronic and information technology. Vehicles are the nodes and information sources of the Internet of Vehicles. By means of wireless communications technology, Internet of Vehicles gets vehicles own and other properties, and uses them effectively to achieve the harmony and unity of "human vehicle-road-the environment". Its appearance will overturn the traditional concept of vehicle and traffic and define the operating mode of vehicle. Internet of Vehicles technology can significantly improve urban transport and provide users with a more intelligent, safe driving environment.As a node in the network, the vehicle's electronic systems develop towards information, intelligence and network. Meanwhile, the information security of vehicle platform is also facing more challenges. Vehicle platform is difficult to guarantee the security of their information, which for many reasons, such as the inherent security risks of Vehicle embedded operating system, Imperfect mechanism for integrity verification and protection between the hardware inside the vehicle platform and the lack of appropriate privacy and integrity protection between the interfaces. On the other hand, the increase in vehicle wireless communications applications enrich the vehicle platform infected with Trojans and viruses channels, communication between vehicle platform and external entities can be monitored easily, and privacy and integrity of transmission data can be destroyed easily. Solve these problems becomes particularly urgent and important.In order to form a trusted network and solve the security issues of passing the information among people, programs with machines, Trusted Computing Group presented trusted computing concepts and developed the technical specifications on TPM and Trusted Network Connect. TPM can resist the physical alteration and provide hardware-level protection for the terminal. TPM is also the trusted root of terminal. It passes the trust to the whole terminal system to ensure the credibility of the terminal through measure and certification. TPM also provides many security features such as the measurement of integrity, data security, storage, key management and identity. Trusted Network Connect technology is built on the basis of trusted computing technology. It improves the credibility of the terminal and the entire network through the access authentication, integrity verification and other measures.Functional properties of TPM and TNC can help us solve the problems of information security on the vehicle platform. In this paper, we analyzed the number of vehicle platforms security threats in the Internet of Vehicles and applied trusted cryptography module (TCM) on the vehicle platform to build trusted vehicle platform. Trusted vehicle platform can achieve credible boot process, pass the trust from the trusted code modules to the entire platform, and provide a reliable car environment to users. Trusted vehicle platform can improve the privacy and integrity of the key and data to achieve the secure storage of sensitive information on the vehicle platform. Trusted vehicle platform can provide integrity value to users and external entities through integrity measurement, storage and reporting and prove the credibility of its identity combining platform identity key and certificate.In this paper we used the TCM to enhance the safety and privacy of vehicle platform information ensuring the credibility of the terminal. On the other hand, we designed a kind of vehicle terminal access model to solve security problems in network communication. The model increases the TLD based on the TNC architecture. TLD is used to divide trusted levels for vehicle terminal after the authentication and integrity verification. Different trusted levels represent different access permission, which can control the vehicle terminal access network resources more effectively. The access model puts forward higher requirements on the integrity and security of the vehicle platform, which in turn enhances the security of the network itself and ensures the security of vehicle platform communications within the network. Finally we give the designation of trusted terminal and the prototype system showing the practicality and effectiveness of this assess model.
Keywords/Search Tags:Internet of Vehicles, TCM, Authentication, Vehicular Platform, Network Access
PDF Full Text Request
Related items