Font Size: a A A

Research On Information Authentication Scheme In VANET

Posted on:2021-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q TongFull Text:PDF
GTID:2492306047484914Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In the era of Internet of things,Internet of Vehicles(IOV)provides strong support for traffic safety and management,and has become an important symbol of smart city.However,with the rapid development of the IOV,its security issues are increasingly prominent.As the realtime communication data between vehicles and nearby vehicles,as well as roadside infrastructure often contains the road information and users’ privacy data collected by vehicles。attackers can steal and edit these sensitive data,so the vehicle communication process needs a secure information authentication scheme.Most of the traditional information authentication schemes of the IOV are based on the secure storage of the key,aiming to improve the robustness of the system,but do not focus on the key disclosure,which is difficult to avoid in case of the openness of the IOV and the frequency of real-time vehicle communication in reality.Because the key isolation technology has a good compromise in complexity and security in solving the problem of key exposure,it is suitable for the IOV with high security requirements but limited computing power.This paper is devoted to the research of the information authentication scheme of the IOV in the real-time communication scenario.The main results are as follows:On the one hand,a key isolation authentication scheme based on SM9 algorithm is proposed to solve the problem of key exposure in the communication between vehicle and infrastructure(V2I)in IOV.First of all,the trusted organization generates the key update message to assist the vehicle to update the key periodically,so that even if the key of the vehicle in a certain stage are revealed,it will not affect the security of the system in other stages before and after,and reduce the risk of key exposure.Secondly,the scheme combines SM9 algorithm with key isolation for the first time,which is the exploration of SM9 algorithm in the real scene application,responding to the policy that our country is vigorously promoting the independent and controllable domestic cryptographic algorithm.Finally,the security of the scheme is proved under the random prediction model,and compared with other existing schemes,the scheme has less computation cost and better performance in the real scene.On the other hand,the above scheme is improved based on group signatur,and a group authentication scheme based on SM9 algorithm for batch authentication key isolation is proposed.This scheme can not only solve the problem of key exposure in the communication scenario between vehicle and vehicle(V2V)in IOV,but also solve the problem of vehicle identity privacy and the verification efficiency caused by the limited computing power of vehicle unit.Firstly,by introducing anti tamper device to assist the vehicle in key evolution,not only the key isolation security can be realized,but also the management burden of trusted organization can be effectively shared compared with the above scheme.Secondly,a group with roadside units as administrators is established,and the group signature is used to realize the non linkability of communication messages,so as to ensure that malicious vehicles can not determine the source of messages and better protect the privacy of vehicles.At the same time,batch authentication is used to improve the efficiency of verification,which ensures that the vehicle unit with limited computing power can still effectively verify messages in the congested road section.Finally,the security and performance of the scheme are analyzed,which shows that the scheme has the security characteristics of unforgeability,anonymity,traceability and so on,while realizing the key isolation security,and the scheme has obvious advantages in performance compared with other similar schemes.
Keywords/Search Tags:IOV, Information authentication, Key isolation, Group signature, Batch authentication, SM9 algorithm
PDF Full Text Request
Related items