Font Size: a A A

Research On Security Authentication In Intelligent Connected Vehicles System Based On Edge Computing

Posted on:2021-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:L PanFull Text:PDF
GTID:2392330629980296Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of artificial intelligence and vehicular ad-hoc networks,intelligent connected vehicle(ICV)has gained more attention,which has become the leading strategic position in the technical transformation and upgrading of the global automobile industry.To achieve safe Driving,the vehicle in the ICV system needs to plan an optimal driving route in time by exchanging the intersection information with other entities.Therefore,it is significant important to ensure the high-security and low-delay of data interaction between the entities of ICV system.It has become a focused area to achieve secure communication between the entities of ICV system using message authentication.As an emerging computing model,the edge computing uses distributed edge nodes to preprocess data,which can ensure real-time communication.Therefore,this thesis focuses on the studies of security authentication in ICV system based on edge computing.The main contents are as follows:(1)This thesis proposes a message authentication scheme for ICV and edge nodes.After introducing edge node,the vehicle obtains relevant data immediately from the edge node rather than remote cloud.Meanwhile,this scheme reduces the overhead of managing certificates through certificateless public key encryption and self-organizing ring signature technology.It can achieve secure communication between the entities and protect their privacy without key escrow issues.(2)This thesis proposes an online anonymous authentication scheme based on priority scheduling.Since the requests of each vehicle in the same area are mostly similar,this scheme uses edge computing to select the highest priority vehicle as the cluster head vehicle.The other vehicles,i.e.the cluster member vehicles,are authenticated by the cluster head vehicle according to their priority,which can reduce the redundancy calculation.Besides,it combines certificateless public key encryption and symmetric encryption technology to protect the privacy and achieve online anonymous interaction between the entities.
Keywords/Search Tags:Intelligent connected vehicle system, Edge computing, Security authentication, Certificateless signature
PDF Full Text Request
Related items