Font Size: a A A

Research And Implementation On Key Management Scheme For Setf-organization In VANET

Posted on:2015-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y K LiangFull Text:PDF
GTID:2268330428998083Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, wireless communication network technology has developedrapidly, and the transportation field informatazation has implemented steadily.Wireless communication network technology in the transportation field has drawnmore attention from academia and industry field. Then Vehicular Ad HocNetwork(VANET) came into being, whose basic idea is that vehicles cancommunicate to exchange speed, location, etc and their vehicle sensors data witheach other within a certain range, and automatically build a mobile network. VehicularAd Hoc Network can bring people more intelligent driving experience and a wealth ofapplications,such as providing entertainment for the driver, access to the Internet forbrowsing, passing assistance information between the vehicle driver, and what’s morepassing emergency information to avoid an accident. So VANET makes a bigdifference in improving driving environment and safety. However, VANET not onlyprovided safety and convenience, but also spawned a lot of problems and challenges,especially in communications security issues, including security of the vehicle nodeand the truth and accuraty of information. This relays on the vehicle nodeauthentication and key security management in VANET. We studied the existing keymanagement scheme for MANET and VANET, and analyzed the advantages anddisadvantages of their performance and proposed our own security plan on the basisof that.This paper proposes a key management scheme based on group. We create agroup with the float vehicle node on the road. After creating the group, the head nodepass the authentication competence to the other common nodes by joint. Theauthentication process is completed with multi-secret sharing and threshold signature.The head node generates secret shares and distributes in the network. The common nodes recovery the shares and sign the threshold signature to authenticate information.The head node synthesizes the signature together. We can detect the malicious nodesby calculating some information in this process.
Keywords/Search Tags:Vehicular ad hoc networks, Security, Key management, Group, Multi-secretsharing, Threshold signature
PDF Full Text Request
Related items