Font Size: a A A

Design And Analysis Of Security Authentication And Key Agreement Protocol For Internet Of Vehicles

Posted on:2022-08-24Degree:MasterType:Thesis
Country:ChinaCandidate:T XuFull Text:PDF
GTID:2492306731487524Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
In recent years,with the wide application of big data,artificial intelligence technology and the advent of 5G era,Io V(Internet of Vehicles),as an essential part of intelligent transportation system,has attracted extensive attention from industry and academia.Due to the inherent open communication environment of Internet of vehicles,it is vulnerable to attack.Therefore,in order to ensure the safety of the Internet of vehicles,researchers need to design a safe and effective authentication protocol to authenticate vehicles before they are connected to the Internet of vehicles.At the same time,due to the strict real-time requirement of the Internet of vehicles,the designed protocol must be efficient.In this paper,a new security authentication and key agreement protocol for Internet of Vehicles is proposed based on the study of the current security problems encountered in Internet of Vehicles,and the security of the proposed protocol is proved by strict security analysis.The proposed protocol not only improves the security,but also reduces the overhead of the whole system.In comparison with other related works,the proposed protocol also shows advantages in some key performance indicators.The main research work and innovation points are as follows:1.This paper proposes a new three-factor authentication and key agreement protocol for Internet of Vehicles.The agreement with elliptic curve encryption algorithm as the core,through the use of passwords,smart CARDS and biometric information combination of greatly improving the security of the whole of the agreement,at the same time,this paper uses the idea of decentralization for reference,and no longer regards the Rode Side Unit(RSU)of the Internet of vehicles as a mere intermediate node.By installing tamper-proof devices(TPD)on the RSU,the Trusted Authority(TA)was able to reduce the computing burden.This protocol can be applied to a larger network.2.In view of other realistic requirements,other functions are provided in the protocol designed in this paper to meet some realistic requirements.It mainly includes the following two points: First,As legitimate users in the Internet of Vehicles environment may become malicious users due to some malicious behaviors,this paper can track malicious users and withdraw malicious users through the key information obtained in the authentication process;Second,since users have the need to change their passwords and the Io V should support multi-driver environment,this paper provides a flexible password modification function that enables users to easily change their passwords,and users can lend their cars to other drivers by changing their biological information to support the multi-driver environment.3.Based on the above results,this paper first conducted a strict formal theoretical proof of the proposed protocol based on the Random Oracle Model,and then conducted an informal security analysis on some evaluation indicators in the experiment on a hardware platform,the proposed agreement and agreement on the performance of the same type of comparison and analysis,in this paper,the work of this paper can be found in the resource costs,including computational cost and communication cost,security attributes and packet loss ratio and message delay.
Keywords/Search Tags:Identity Authentication, Internet of Vehicles, Security, Three-Factor, Biometric
PDF Full Text Request
Related items