Font Size: a A A

A Traceable Anonymous Authenthcation Scheme In VANET

Posted on:2016-05-09Degree:MasterType:Thesis
Country:ChinaCandidate:S J ZhaoFull Text:PDF
GTID:2308330476956318Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile Internet and the Internet of Things,VANET(Vehicular Ad Hoc Networks) is gradually used in real life, and becomes the most application of the Ad Hoc, attracting people of all ages. The mobile Internet pushes human life into the peak of the information industry, at the same time, brings a lot of convenience. The driver can obtain the near vehicle’s location, speed, direction and other information through the vehicular ad hoc networks, so as to avoid traffic accidents and traffic congestion by real-time road information, and create an information highway. At the same time, the vehicular ad hoc networks brings some entertainment and office services during the driving time, which saves a lot of time and improves the quality of life. All these let people’s life into a dynamic and lively atmosphere. From 2013 to 2015, the news about the vulnerabilities of VANET is constantly emerging, some international experts are worrying about the information security. In order to ensure the personal security, it is necessary to provide a VANET security mechanism.In this paper, according to the two different attributes of the car, the different anonymous authentication schemes can be put forward.1. The traceable ring signature scheme of non-public vehiclesBecause the personal privacy once destroyed will bring serious harm to the non-public vehicles, so we adopt the ring signature of anonymous communication.However, it is hard to trace the false information through the signature. And it is not timely to recall the illegal vehicles through the VANET. Therefore, we design a mechanism, which can be used to control anonymity abusing phenomenon, based on the traditional design of a tag tracking mechanisms.2. The non-public vehicle to have the tracking of forward security schemeThe key leakage phenomenon will cause serious consequences, so on the basis of traceable ring signature we introduce a forward security mechanism. In order to protect the information effectively, once key may be revealed at a certain moment.Through the adoption of security import time parameter, the private key signature canbe updated during a sustained period. This new program not only ensures that the near vehicles can still be made correct traveling route determination, even if a key is revealed.3. The blind signature scheme of public vehiclesThe general public vehicles belong to specific units or groups, and the information has high credibility. So to the communication between the public vehicles and RSU, we adopt the way of blind signature. Of course, in order to prevent falsification of information, we introduce third party vehicle management TM on the transmission of information to ensure the backup, if the violation of the vehicle occurs, the vehice can be recalled in time.
Keywords/Search Tags:VANET, traceability, ring signature, forward security, blind signature
PDF Full Text Request
Related items