Font Size: a A A

Research And Implementation Of Security Communication Mechanism In Intelligent-cyber Vehicles

Posted on:2018-08-25Degree:MasterType:Thesis
Country:ChinaCandidate:Z MengFull Text:PDF
GTID:2322330518496025Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
In recent years, the rapid development of the intelligent transportation system (ITS) makes the intelligent-cyber .car come into people's real life which takes lots of convenience. Google, Baidu and other Internet companies have also proposed technology solutions in the field of driverless car. Intelligent traffic system is designed to combine the vehicles, roadside facilities and people together using advanced Internet technology to make driving safer and more efficient. At present,there are two main solutions for ITS-autonomous and cooperative method. The former applies high-precision radar and other .sensors to sense the surrounding environment information automatically,but the latter needs several vehicles to communicate with each other to get the vehicle information around. There will be a blind spot if the sensors only be used, so the vehicular communication is quite essential for ITS to ensure system reliability and security. The main communication model includes vehicles-to-vehicles (V2V), vehicles-to-roadside (V2R) and vehicles-to-pedestrian (V2P). During communication process in practical applications, the exchange of information, including vehicle location, identity and other sensitive information, is needed to use the security technology to protect the transmission of information integrity,authentication and privacy.This thesis proposes an improved secure communication system based on Public Key Infrastructure (PKI) cryptography to realize the V2X communication security. In order to authenticate the identity of the vehicle node and protect the privacy of the driver, a new authentication method which uses a combination of the permanent valid certificate and the real-time updated temporary pseudonym certificate is proposed in this thesis. Dynamic update of the pseudonym temporary certificate does not contain the driver's private information. The pseudonym temporary certificate is requisite in ITS which give vehicles can send or receive message from the other vehicles. This thesis also implements the warning application of vehicle collision information based on the embedded development platform, which is also tested in the campus. At the same time, the performance of elliptic encryption algorithm ECDSA\ECIES which is needed for authentication\encryption is evaluated.This thesis proposes and implements the security mechanism to protect the information authentication and privacy of the intelligent-cyber vehicles. It is of great value to the a deployment of the intelligent vehicle.
Keywords/Search Tags:Intelligent-cyber Vehicles, Security, PKI, Privacy-protection
PDF Full Text Request
Related items