Font Size: a A A

The Research And Implementation Of Location-based User Identity Authentication Protocol And Intelligent Transport Systems

Posted on:2016-04-18Degree:MasterType:Thesis
Country:ChinaCandidate:H J WenFull Text:PDF
GTID:2322330488974016Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the development of communication technology, computer technology, sensor technology, control technology and other modern information technology, a number of intelligent transport systems have appeared to meet the needs of modern management. However, many computer networks are being threatened by serious security. In particular, the security of the internal network of the traffic administration has become a hidden danger. User authentication as the first level to protect the security of the network, plays a vital role. Traditional user authentication is based on user account and password authentication. This does not meet the needs of intelligent transportation system security user authentication. The new requirement is that the system can verify the user's password and location information at the same time.This thesis presents four location based user authentication protocols for different application scenarios and attack scenarios. Firstly, based on network identity, the protocol ULNI which can verify user's location range is designed. Secondly, based on distance bounding, the protocol ULDB which take the security of location verification into consideration.Thirdly, based on verifiable multilateration, the protocol ULVM which can verify user's exact location is designed. Lastly, based on BRM model, the protocol ULBRM which can resist collusion attack is designed. The research of these protocols support for the theory of the user authentication in Intelligent Transport Systems.At the same time, this thesis analyzes the requirement of the intelligent transportation system and selects the ULNI protocol to apply to the system's login module. Test results that the login module can verify the user's password and location information at the same time. And the login delay is no more than 1s. So, in security the protocol has applications.
Keywords/Search Tags:Intelligent Transport Systems, location based, user identity authentication
PDF Full Text Request
Related items