| Internet of Vehicles(Io V),a distributing network,allows connected vehicles to communicate with other internet-connected entities.There exists various challenges in traditional Io V,such as privacy leakage,transmission delay,and security issues.With the wide deployment of autonomous vehicle and continuous growth for Internet of Autonomous Vehicle(Io AV),many communication schemes are proposed to make an attempt on solving these problems.However,most schemes generally exist flaws and can not achieve a good balance among security,functionality and efficiency.The high-speed mobility of autonomous vehicle network and the dynamic distribution of vehicle clusters have not been considered.These schemes ignore the requirement of remote users securely accessing the autonomous vehicle and transmitting command.In view of above problems,this thesis puts forward the corresponding solutions.(1)Aiming at the existing problems of security issues,high performance overhead and the lack of functionalities in recent work,the thesis proposes a three-factor security authentication and key agreement scheme in Io AV.It can safely protect the communication among vehicles,cloud servers and users with low computing and communication cost.The proposed chaotic map-based authentication scheme enables legitimate user to securely access a vehicle.The statistics data stored in cloud server can support the commands of user,thus improving the driving strategy.The scheme also supports many functionality features such as the dynamic addition of vehicle and offline update of password.(2)In view of the fact that most researches do not consider the selection of vehicle cluster head and overlook security issues,the thesis proposes an algorithm for dynamic selection of cluster head.The thesis models three kinds of communication in Io AV.Then,an efficient two-level authentication and key agreement scheme is designed.This proposed scheme is in combination with symmetric encryption and physical unclonable function(PUF).It can be deployed to protect secure communication among service layer,cloud layer,and vehicle layer.The scheme is proved to be secure under ROR model.The discussion about performance analysis illustrates that our scheme is efficient. |