Font Size: a A A

Security Research And Simulation Of DSRC

Posted on:2011-04-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y F GuoFull Text:PDF
GTID:2178360305955060Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of China's economy, the number of vehicles processed by per person is increasing every year. Vehicles provide people convenient travel experience, it also bring other serious problems. How to reduce traffic accidents, to avoid traffic congestion, improve traffic efficiency of vehicles and improve traffic management have aroused government and society wide attentions. Wireless network technology has become one of the important technology in the intelligent transportation technology. Special short-range communication protocol is the basis for intelligent transportation systems. It can provide the vehicles with a variety of convenient, comprehensive services; the driver can obtain real-time traffic conditions to reach the destination in the most safe and economical way. Meanwhile, based on the real-time information of the driver and the road the traffic managers can improve management efficiency to take full advantage of transport resources.But with speed and number of vehicle rapidly improve the conventional vehicle communication mechanism between low speed and efficiency has become bottlenecks which restrict ITS development bottlenecks. While encrypt technology development brings enormous challenges to security system. Face to the rapid development of science and technology fields and the continuous generation of new traffic demands, to develop a reasonable and complete DSRC protocol has become the main research topic in ITS.This article's main aim is to make research about DSRC protocol in the practical application of security issues, propose a more rational, perfect, scientific and effective solutions to ensure better services for DSRC system in ITS.The first part is to make brief introduce about the system and the application of ITS. And we made some research on the basic theory and structure of the DSRC protocol and related technologies in intelligent transport system.The main content of the second part of this paper is to propose one intelligent transportation system solutions to security problems. We first introduced the concept and structure of intelligent transportation systems, made analysis about security problems in application issues and extracted specific security requirements. After making analysis and comparative study on the traditional program, the solutions and strategies on the target system problems obtain more explicit division. Traditional solutions fall into two categories: public key based digital signature and signature-based security group program. However, due to the complexity of traditional algorithm, when the number of identification information is so large, the system can not effectively deal with the signature. Speed has become an important factor affecting the performance VANET. Therefore, the protocol needs to meet improve the system security issues on the demand, meanwhile assure proper information length and the bandwidth load, reduce the packet loss rate, and maintain good transmission delay. Improved protocol consists of four stages, pseudo-ID and private key formative stage, anonymous identification stage, one-way hash line between OBU-RSU deployment phase, information signature and confirmation stage. Protocol focused on one-way hash function and the bilinear matching technology. In the communication process RSU assigns the corresponding key line to OBU, the key used to encrypt the information is stored in the key list. Based on one-way hash function and non-confrontational way, you can ensure both correct certification and information identification in the communications. At the same time in the communication process, the vehicles use different pseudo-ID generated by the OBU as its own identity, and protect the privacy of vehicles. Be sure that information of users can not be exposed, meanwhile when special event occurs, the judiciary can help in managing the department, through getting the key information in the list and comparing with data in the database to distill real ID, in order to satisfy traceability purpose. Finally, we made improved protocol extent analysis and comparison, demonstrating the improved protocol not only to meet a variety of communications security and vehicle private demand, and it does not increase the delay of identification data packets, but significantly reducing packet loss rate and increasing the packet transmission speed and computational efficiency.The main content of the third part is to propose one improved ETC system solutions for security problems. First, we made a brief introduce of the concept of the ETC system and structure. Then discussed the existing ETC system security issues, and traditional solutions are compared and analyzed. ECC algorithm key size is relatively small and solve the elliptic curve discrete logarithm is very difficult feature to make it more suitable for weak computation and storage space constrained environments. Therefore, according to the demand for the security of the system, we used elliptic curve algorithm to do a comprehensive design. Improved protocol is divided into stages of e-money purchase; travel expenses paid stage, three-part retrospective breach. From electronic money purchase to the entire acquisition process, to ensure the security trades completion among vehicle, pay site, the inter-bank trades, we take advantage of the ECC algorithm to encrypt identify transmit information and electronic money, transactions use a small amount of payment. After successfully charging the bank sends electronic invoices used no certificate signatures to the vehicle. Finally, we made security analysis for improved protocol. Comparing with the traditional ECT program, it demonstrated the advantages of improved system to solve security issues. The improved protocol not only well solves the wide problems in current charging system, at the same time the system pays more attention to security and user privacy, and provides more rapid, reliable service.
Keywords/Search Tags:ITS, DSRC, ETC, Security, ECC
PDF Full Text Request
Related items