Font Size: a A A

Research On 5G-Enabled Internet Of Vehicles Security Communication Based On Fog Computing

Posted on:2021-09-27Degree:MasterType:Thesis
Country:ChinaCandidate:R ZhangFull Text:PDF
GTID:2492306050473894Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
Automobile has almost become the primary choice for people to travel in recent years,which brings about the problem of urban traffic congestion,and the probability of traffic accidents also rises sharply.In order to reduce the accident rate,control the traffic situation reasonably and build the complete intelligent transportation system,many experts and scholars began to promote the development of vehicles in the direction of intelligence,and the Internet of vehicles(Io V)emerged.Io V realizes the multi-party interaction of vehicles,roads,people and the network effectively,and provides drivers with safer,more efficient and energyefficient driving experience and real-time traffic information.With the advent of the 5G era,compared with 1G-4G network,5G network has a series of unparalleled advantages,including three application scenarios(enhance mobile broadband,massive machine type communication,ultra-reliable and low latency communication)and three technical highlights(network slicing,edge computing,network functions virtualization).The combination of 5G network and Io V technology can promote Io V more intelligent and vehicle information transmission more efficient.However,to build a perfect 5G-enabled Io V architecture,it is inevitable to consider the security and privacy issues,so it is necessary to design an efficient and secure communication protocol for the 5G-enabled Io V environment.In order to design a lightweight authentication protocol for better application in the 5Genabled Io V environment,this paper proposes a new certificateless signcryption scheme based on the elliptic curve cryptography scheme firstly,which avoids expensive operations such as bilinear pairing and map-to-point hash function,and the security of this scheme is proved under the random oracle model,indicating that our scheme has unforgeability and confidentiality.In comparison with several existing similar schemes,we can find that this scheme has high efficiency both in the signcryption phase and the unsigncryption phase,and the computational overhead is significantly reduced.In terms of storage overhead,the key size is also effectively reduced.Subsequently,this paper introduces the basic architecture of 5G-V2 X,which is composed of four parts: 5G access network,network edge,5G core network and data network.It also outlines the types of communication,threats and security objectives of 5G-V2 X.Finally,based on the certificateless signcryption scheme mentioned above,we design a CLSC-CPPA protocol,which is mainly used for secure communication between vehicles and between vehicle and fog device,and at the stage of batch transmission,fog computing is introduced to speed up the authentication and decryption process of multiple ciphertexts.This paper also analyzes the formal security of this protocol,which shows that CLSC-CPPA protocol can meet the security requirements such as data confidentiality,conditional privacy protection,unlinkability,and replaying resistance.Compared with other existing safety protocols for vehicle communication,our protocol meets more features,and in the single transmission phase and batch transmission phase,our protocol has less time costs.
Keywords/Search Tags:IoV, certificateless signcryption, elliptic curve, condition privacy preservation, Fog Computing
PDF Full Text Request
Related items