Font Size: a A A

The Research Of Vehicular Network Security Model Which Based On The Structure Of Cell

Posted on:2013-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y HanFull Text:PDF
GTID:2248330374968817Subject:Computer applications
Abstract/Summary:PDF Full Text Request
On the basis of analysis of the MMM attacks model raised in Ad hoc networks and CIA model which based on the information security proposed for the Internet, this paper detailed discussed several common network security attacks on vehicular networks; In addition to this, we put the VANET cell as a unit, we divided the vehicular network attack model into the attack of intra-cell and the attack of inter-cell according to the source of attacks. And we also focused on the "geographical location information verify" security mechanisms and "the information encryption and decryption" security mechanisms in both cases.In the security model, this paper give a set of key management scheme, and we put forward the TAKPS SKS two key management distribution mechanism, and established the ELP, ECN, TAKPS and SKS key centralized management scheme, and use the wireless signal attenuation model to build the assisted positioning program. On the intra-cell location information verify mechanism, we combined "vehicle radar positioning","signal attenuation model positioning" and "cell oversight mechanisms" to ensure the credibility of geographical location. And on the intra-cell information encryption, we come up with the Self-CA center asymmetric encryption and decryption mechanism which is established based on the TAKPS asymmetric key pool. And upon the Self-CA center asymmetric encryption and decryption mechanism, we proposed the intra-cell public key distribution mechanism, while ensuring the efficiency of the communication and the security of the vehicular networks.On the inter-cell communication of vehicular network, we also come up with three mechanisms on the basis of the "geographical location calibration", they are "routing mechanism","monitoring mechanism" and "active detection mechanism". Among the three mechanisms,"monitoring mechanism" and "active detection mechanism" are directly or indirectly used the techniques of the intra-cell security model. And the other one,"routing mechanism" on the inter-cell model is based on the availability of the geographical location-based routing algorithm to ensure that the routing reachable of fake location information in the network communication of inter-cell can not be guaranteed. On the part of inter-cell information encryption, we mainly used the CA center asymmetric cryptography-based encryption mechanism to accomplish our purpose. On the other hand, we exchange the public key on the stage of establishing the routing. When sending data, we use the asymmetric encryption to encrypt the sending data to ensure the confidentiality of the information. This paper conducted in-depth the feasibility analysis and safety verification of the proposed "geographical location verification" and "information encryption model" and built the network simulation environment on the NCTU ns vehicular network software. In the simulation environment, this paper mainly verified the influence to the vehicular network by the proposed public key and CA center asymmetric encryption and decryption, and made the analysis on the influence to the variety of vehicular network performance parameters.In the end, this paper summarized the existing research achievements, and analysis of the shortage of the present study and the improvement in the further research. And we made the preliminary planning of the simple directions on the next step.
Keywords/Search Tags:Vehicular Networks, Cell Model, GeographicalLocation Verification, Self-CA Center Encryption
PDF Full Text Request
Related items