基于云协助环签名的车联网安全通信方案
本文选题:安全通信 + 隐私保护 ; 参考:《中国地质大学(北京)》2016年硕士论文
【摘要】:自1886年1月德国工程师研制成功的真正意义上的汽车出现在世人眼前,汽车发展经历了100多年的风雨。从蒸汽到柴油到汽油乃至今天的电力驱动,汽车经历了全手动、半自动到无人驾驶时期。人们日常生活不可或缺的其他交通工具,正在被车辆悄然代替并取代[1]。车辆数量急剧增加,这使我们看到越来越多的问题出现:能源浪费、废气污染、道路压力大、运输效率低、车辆管理监控难、数据庞大难以处理、安全隐私隐患等。车联网(IoV)技术在很大程度上解决了如今存在的交通堵塞、交通事故频发等问题。在实现车与车V2V、车与路边设施V2I通信的过程中,车辆自组织网(Ad-Hoc)给予了关键的技术支持。但是无线网络连接导致车间通信完全暴露在空气中,其开放性严重威胁着车辆的安全和隐私。国内外诸多学者展开了对于车联网隐私安全的研究。对于车辆的隐私安全,可以分为两类:位置隐私保护、身份隐私保护。目前从三个方面着手:LBS位置隐私保护、网络访问认证控制、安全通信[2]。通过系统分析针对不同的隐私威胁的解决方法:LBS隐私保护常用算法K-匿名;基于云架构的证书认证;群签、环签等可以实现安全通信。分析不同模型优缺点,本文提出一种基于云协助认证的环签名模型,结合改进的环签名技术,提出RSU节点辅助成环策略,构建多层云身份认证和假名管理系统。增加计算难度、延长攻击查询时间、降低攻击风险,有效的防止隐私泄露,保证通信安全。该模型的仿真实验是于Cygwin上安装NS2网络仿真工具进行仿真。通过对车辆通信过程中随机产生车辆和RSU节点,进行随机干预和模仿通信。初步实验结果表明改进的环签名技术在RSU辅助下,形成环的概率提高了很多,通过系统的多层云身份认证体系,在一定程度上提高了车辆的通信安全和身份隐私保护[3]。本文中作者的主要工作和贡献:1、详细介绍车联网有关概念,拆解其关键技术;分析车联网安全和隐私面临的各类攻击和威胁;隐私保护研究现状;介绍隐私保护常用算法、加密技术、协议标准和典型解决方案等2、改进已有环签名算法,加入RSU辅助成环,融合多层云认证体系,构建此模型同时实现车联网的身份隐私和通信安全。3、搭建网络仿真环境,进行初步仿真实验。
[Abstract]:Since January 1886, German engineers successfully developed the true meaning of the automobile appeared in the eyes of the world, automobile development has experienced more than 100 years of wind and rain. From steam to diesel to gasoline to today's electric drive, cars have gone through full manual, semi-automatic to driverless periods. Other means of transportation, which are indispensable to people's daily lives, are being quietly replaced by vehicles [1]. The number of vehicles increases rapidly, which makes us see more and more problems: energy waste, exhaust gas pollution, high road pressure, low transport efficiency, difficult vehicle management and monitoring, huge data difficult to deal with, hidden dangers of safety and privacy, and so on. Vehicle networking (IoV) technology solves the problems of traffic jams and traffic accidents to a great extent. In the process of realizing the communication between vehicle and vehicle V2V, vehicle and roadside facility V2I, Ad-Hoc gives the key technical support. However, wireless network connection makes workshop communication completely exposed to the air, and its openness seriously threatens the safety and privacy of vehicles. Many scholars at home and abroad have carried out research on the privacy security of vehicle networking. For vehicle privacy security, can be divided into two categories: location privacy protection, identity privacy protection. At present, there are three aspects: privacy protection of LBS location, network access authentication control, secure communication [2]. Through the systematic analysis of the solutions to different privacy threats, the common privacy protection algorithms K- anonymity, certificate authentication based on cloud architecture, group tags, ring tags and so on, can realize secure communication. After analyzing the advantages and disadvantages of different models, this paper proposes a ring signature model based on cloud assisted authentication. Combined with the improved ring signature technology, the RSU node-assisted ring-forming strategy is proposed to construct multi-layer cloud identity authentication and pseudonym management system. Increase computational difficulty, extend attack query time, reduce attack risk, effectively prevent privacy disclosure, and ensure communication security. The simulation experiment of this model is carried out by installing NS2 network simulation tools on Cygwin. The vehicle and RSU nodes are randomly generated in the course of vehicle communication, and the random intervention and imitation communication are carried out. The preliminary experimental results show that the improved ring signature technique can improve the probability of ring formation with the help of RSU, and improve the communication security and privacy protection of the vehicle to some extent through the multi-layer cloud identity authentication system of the system. In this paper, the author's main work and contribution: 1, detailed introduction of the concept of car networking, dismantling of its key technologies; analysis of various attacks and threats to the security and privacy of vehicle networking; current status of privacy protection research; introduction of common algorithms for privacy protection, Encryption technology, protocol standards and typical solutions, etc. 2, improve the existing ring signature algorithm, add RSU auxiliary ring, merge multi-layer cloud authentication system, The model is constructed to realize the identity privacy and communication security. 3. The network simulation environment is built and the preliminary simulation experiment is carried out.
【学位授予单位】:中国地质大学(北京)
【学位级别】:硕士
【学位授予年份】:2016
【分类号】:U495
【相似文献】
相关期刊论文 前10条
1 佘晓丽;高国梁;杨健;;安全通信开发风险及措施探讨[J];铁路通信信号工程技术;2014年01期
2 林琪,卢昱;处方信息的安全通信[J];指挥技术学院学报;2001年01期
3 鲍江宏;安全支持提供者接口在网络安全通信中的应用[J];华南理工大学学报(自然科学版);2002年06期
4 张庆军;包伟华;;工业网络功能安全通信技术研究[J];仪器仪表标准化与计量;2007年01期
5 王明志;;开放环境中的安全通信[J];铁路通信信号工程技术;2009年04期
6 王宏斌;;安全通信中间件的实现方法[J];机电产品开发与创新;2012年02期
7 Horst-Dieter Kraus;安全保护的先例——以广泛的应用领域挑战标准[J];现代制造;2003年19期
8 李炜键;;基于无线网络的仓储管理系统安全通信分析[J];电力信息化;2011年09期
9 覃征,李顺东,阎礼祥;电子商务中非字母文字的信息隐匿安全通信算法[J];西安交通大学学报;2001年08期
10 祝俊琴;孙瑞;;浅析信息数据的安全与加密技术[J];硅谷;2011年06期
相关会议论文 前10条
1 郑重;李少华;刘亚斌;李敬东;;安全通信中的抗重播机制的研究与实现[A];第十八次全国计算机安全学术交流会论文集[C];2003年
2 于秀兰;丁晓诚;李影;英春;刘东;周彬;魏冰;;电信行业数据业务中Web Service的安全[A];中国通信学会信息通信网络技术委员会2003年年会论文集[C];2003年
3 朱红儒;焦文娟;齐e,
本文编号:2095083
本文链接:https://www.wllwen.com/kejilunwen/jiaotonggongchenglunwen/2095083.html