Font Size: a A A

Research On Authentication Protocol In The Internet Of Vehicles

Posted on:2024-05-27Degree:MasterType:Thesis
Country:ChinaCandidate:A M L WuFull Text:PDF
GTID:2542307178473934Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the vigorous development of automatic driving technology,the requirements for comprehensive network interconnection between vehicles,roads and infrastructure have been continuously improved.In order to meet the functional requirements of automatic driving and even driverless driving,the Internet of Vehicles technology came into being.As the core application in the field of intelligent transportation,the Internet of Vehicles technology provides technical support for improving the efficiency of intelligent transportation services.However,the Internet of Vehicles equipment will produce a large number of confidential data.If these data are stored in an untrusted environment,the system will face serious security and privacy problems.Safe and reliable data storage and transmission is the key to ensure the best system service.In addition,in the Internet of Vehicles applications,the amount of data generated is growing at a high speed,and the cost of reducing the delay should not be underestimated.Therefore,a safe and efficient authentication protocol is helpful to ensure vehicle data privacy and communication security.However,at present,lightweight access control schemes applied to the Internet of Vehicles environment are relatively rare,and the existing schemes still have many challenges.First of all,Internet of Vehicles devices are usually deployed in public places,and data transmission in an untrusted environment is vulnerable to various attacks.If key vehicle data is tampered with,it may seriously lead to traffic accidents.Secondly,because the Internet of Vehicles devices are resource-constrained,the access control and authentication scheme designed for these devices should be lightweight,and the authentication protocol should take into account the low latency of communication while ensuring security.Finally,it is an important basis to ensure the security of the Internet of Vehicles environment to be able to conduct security access and product traceability to the huge Internet of Vehicles supply chain.If there is a problem in the supply of Internet of Vehicles equipment,it will lead to the problem equipment entering the network,and mutual security authentication between equipment will be difficult to achieve.For this reason,this paper proposes two authentication protocols for the Internet of Vehicles environment,and compares and analyzes the security and performance with existing technologies,aiming at ensuring data privacy while reducing the delay cost and cost.The main contributions of this paper are as follows:(1)In order to solve the problems of excessive cost and privacy protection of communication between Internet of Vehicles devices,we propose an authentication protocol based on blockchain technology and mobile edge computing technology.Thanks to the decentralization and encryption characteristics of the blockchain,data is packaged into blocks and stored in distributed shared ledgers,which ensures the confidentiality and integrity of data.Mobile edge computing extends the function of cloud computing to the edge of the network,which is an effective solution to reduce the computing and communication costs of Internet of Vehicles applications.The informal security analysis shows that the protocol can resist message replay attack,message replacement attack,man-in-the-middle attack and other attacks.Compared with other existing schemes,the protocol has the characteristics of decentralization and lightweight,meets the expected requirements of high efficiency,security and delay sensitivity,and is applicable to the Internet of Vehicles environment.(2)In order to achieve secure access to the supply chain of the Internet of Vehicles,this paper designs an efficient and safe supply chain authentication mechanism for the Internet of Vehicles environment.This mechanism ensures the user’s login security by using fuzzy extractor,and ensures the access security by combining password hash function and bitwise XOR operation.In addition,because the centralization of existing technologies is prone to lead to single point of failure,we combine blockchain technology to store data,so that information cannot be forged and tampered with.It also integrates 5G technology to meet the bandwidth required for real-time data transmission in the supply chain,realize the rapid update and storage of data,and reduce its management costs.The Real-Or-Random(ROR)security model is used for formal security proof,and the results show that the proposed protocol is provably secure.The proposed scheme is verified from the aspects of confidentiality,anonymity to prove that it can meet the security requirements of the Internet of Vehicles supply chain and can effectively resist a variety of known attacks.Compared with the existing advanced authentication mechanism used in the supply chain,the result shows that the authentication scheme is not only safe and effective,but also greatly reduces the communication and computing costs,and is suitable for the supply chain of the Internet of Vehicles with huge amount of data.
Keywords/Search Tags:Internet of Vehicles, Blockchain, Mobile edge computing, Authentication protocol, Supply chain
PDF Full Text Request
Related items