Font Size: a A A

Research On Privacy Protection Authentication Scheme For Connected And Autonomous Vehicles

Posted on:2022-08-22Degree:MasterType:Thesis
Country:ChinaCandidate:W W CaoFull Text:PDF
GTID:2492306542963249Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The connected and autonomous vehicle perception unit collects the perception data related to various vehicles,the data processing unit processes the data and makes quick decisions,the executive unit responds quickly according to the decision results,and all units work together to ensure the secure driving of the connected and autonomous vehicle.Different from traditional vehicles,the secure driving of connected and autonomous vehicles is based on secure and reliable internal modules and security data transmission.In the process of the connected and autonomous vehicle driving,the vehicle needs to share data with relevant organizations and service providers,so as to ensure the normal operation of the whole intelligent transportation system through multi-party cooperative work.The internal modules of connected and autonomous vehicle face the risk of being attacked,and the data transmission between multiple modules lacks efficient protection mechanism.Data transmission between connected and autonomous vehicles and service providers may be subject to various attacks.Malicious attacks may lead to privacy data leakage and intelligent transportation system failure.In view of the above two problems,this thesis proposes the corresponding schemes:1.In order to realize the reliable communication between modules within connected and autonomous vehicles,this thesis proposes a secure and efficient authentication scheme between multiple modules based on the remote attestation of trusted computing.The scheme uses trusted computing to guarantee the security of private data and implement trusted state check.The scheme supports key negotiation and efficient message authentication among internal modules.The scheme supports efficient key updating and can realize efficient revocation of the compromised module.Experimental results show that this scheme can improve the efficiency of message authentication.The security analysis shows that this scheme can meet the requirement of rapid authentication of connected and autonomous vehicles.2.In order to realize the secure transmission of data between the internal applications of connected and autonomous vehicles and service providers,this thesis proposes a secure and efficient batch message authentication scheme based on chaotic mapping and signcryption.The service provider and the corresponding application within the vehicle can negotiate the session key based on the chaotic map.The internal application sends the signcryption message,and the service provider can implement the batch authentication and decryption of the message.The scheme supports key updating and can realize the efficient revocation of the compromised application.The security proof and performance analysis show that the scheme has good performance.
Keywords/Search Tags:connected and autonomous vehicles, authentication and key agreement, privacy protection, message authentication
PDF Full Text Request
Related items