Font Size: a A A

Distributed Authentication Scheme Without The Center In VANET

Posted on:2016-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y J HouFull Text:PDF
GTID:2298330467497101Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, with the rapid development of wireless communication technology,mobile communication has become a hot research at home and abroad, and it has been appliedmore and more widely. In this context, as an important application in the transport sector ofthe Mobile Ad hoc network, VANET comes into people’s sight bringing a lot of convenienceto people’s lives. The advantages of VANET which Mobile Ad hoc network also has is that, itcan quickly set up a network of convenience at any place and time according to the specialneeds without relying on the infrastructures. Because of the convenience, VANET canimprove road traffic efficiency, reduce the accident rate, and it also allows OBU connecting tothe Internet to provide entertainment services for everyday applications bringing peopleconvenience and enjoyment. What is more, in the military activities, rescues, remotewilderness areas and other occasions it also can be able to provide reliable service.The rapid development of VANET in recent years has brought a lot of convenience forpeople, especially in the auxiliary transportation obtaining a very good application. But in theinterest of its development, we should also note its hidden problems, that is, network securityissues. The characteristics of Mobile Ad hoc network makes the system more vulnerable to beattacked, and fast mobility and instability channel make the network security of VANET evenmore worse than Mobile Ad hoc network. Obtaining the safety authentication is thefoundation to solve network security problems. Combined with the existing authenticationschemes and other research results, this article will propose a distributed authenticationscheme without the center for VANET with no infrastructures. Firstly this article gives a briefdescription of the general situation of VANET, the research background, significance andcurrent situation; secondly, the basic theory of cryptography involved in the securityauthentication mechanisms will be introduced briefly, Including the theory of elliptic curvecryptosystems and the threshold secret sharing mechanism mainly applied in authenticationschemes; Key management scheme is an essential part of the authentication mechanism. Thenext, compare the applications, advantages and disadvantages of the several existing keymanagement schemes. According to the application scenarios, the article proposesa distributed authentication model, and the two main modules of the model are the system initialization module and the authenticate service module. Then, organically combine theexisting distributed key management technology, elliptic curve cryptography, threshold secretsharing technology to design a authentication scheme for VANET without the infrastructures,and makes a detailed description of the solution algorithm; finally, throughout the text,summarize the shortage and look forward to the development of the research in the future.This scheme based on the existing fully distributed authentication scheme, in order tocomply with the characteristics of non-infrastructure VANET, replaced the trusted center bythe n nodes of the initial formation network. These n nodes are responsible for the generationof system polynomials and system key, and as the initial service nodes each with a componentof the system private key; When a node applies to the network for communication, servicenodes can use their system private key component to sign the certificate and send the partsigned certificate to the applying node. The introduction of verification mechanism of the partsigned certificate to avoid the wrong part leading to the failure of compositing the certificateand requiring apply for the part signed certificates again. Only for threshold t part signedcertificates can composite the effective system signed certificate. In order to guarantee thesafety and reliability of communication, this paper puts forward the supervision mechanism ofthe neighbor node behaviors. Each node has obligation to supervise its neighbor nodes, oncefound their bad behaviors, accused the suspicious node. Design the structure of the CRL, toenable storage the bad behavior records in it. An analysis of the security authenticationscheme proposed in this paper, by using the experimental results obtained to evaluate thesystem performances, the scheme is verified feasibility of and safety.
Keywords/Search Tags:VANET, Elliptic curve mechanism, Threshold secret sharing scheme, Distributedauthentication, Without the center
PDF Full Text Request
Related items