Font Size: a A A

A Study Of Message Authentication In Vehicular Ad Hoc Networks

Posted on:2015-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhouFull Text:PDF
GTID:2298330422485399Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Cryptography is the foundation of information security, throughout the whole process ofinformation security, providing confidentiality, integrity, authenticity and non-repudiationmeasures for the storage and dissemination of information. Cryptography is increasinglywidespread application in the political, military and social life.In the field of intelligent transportation, Vehicular ad hoc networks(VANET) is a outdoorcommunication network system, it is self-organizing, self-managed and fast-moving, it hasbecome a core component of future intelligent transportation systems. Although VANET hasbrought revolutionary changes to the traffic management, but also created a series ofinformation security issues. According to the summary of security issues in VANET and theresearch of message authentication, some new security protocols are proposed as follow:(1)For the authentication issues of public transport vehicle, combined certificatelessaggregation signature, under the use of bilinear pairings, an efficient authentication scheme isproposed. Security analysis shows that in the random oracle model, based on the q-SDHproblem and the expansion of inverse computational Diffie-Hellman assumption, theproposed signature scheme is provably secure against existential forgery under adaptivechosen message attacks. Simulation results show that the approach conforms with theregulations. When the traffic is not serious, the packet drop rate is acceptable, so the schemehas a good practicability.(2) For the authentication issues of personal transport vehicle, combined with the ideaof Road-Side Unit and used the HMAC technology, an authentication scheme is proposed toprotect personal privacy. This scheme meets security requirements in VANET. Simulationresults show that the approach has small end-to-end delay. When the traffic is serious, thepacket drop will over fifty percent. Howeve, in most cases, the scheme meets the demand ofthe network, has a certain practicality.
Keywords/Search Tags:Vehiclar communication, privacy preservation, authentication, digitalsignature, certificateless aggregation signature
PDF Full Text Request
Related items