面向汽车信息物理系统的轻量级密码技术
发布时间:2021-09-23 23:18
近年来,随着经济的快速发展和人口的日益膨胀,汽车数量急剧增加,汽车在给人们提供便利的同时,也给道路交通系统带来严峻挑战,如:交通堵塞,事故频发等,这些都给人们的生命财产安全带来严重威胁。智能交通系统(ITS)通过车辆、道路、驾驶员的密切配合来提高交通运输效率,有效缓解交通阻塞,降低交通事故发生率,降低能源消耗,从而减轻环境污染。车辆自组织网络作为智能交通系统的核心基础,引起了政府,汽车制造业以及科研人员的广泛关注。车辆自组织网络在车辆单元、路边单元以及其他车辆之间构建大型移动多跳网络,在高速移动的环境下,实现车辆与车辆,车辆与基站之间的无线通信,通过彼此间发送安全信息数据包,缓解日益严重的交通问题。然而由于车辆自组织网络具有网络规模巨大、无线信道开放、移动轨迹可预见等特性,其更容易遭受攻击,暴露车辆隐私信息。因此提高车辆自组织网络信息传输的安全性,保护车辆隐私成为研究者的主要研究方向。车辆自组织网络具有高移动,网络拓扑变换频繁,不能容忍通信中的延迟等特性,使得椭圆曲线密码等传统的密码算法无法直接应用其中。针对上述问题,本文主要围绕面向汽车信息物理系统的轻量级密码协议展开研究,主要创新点...
【文章来源】:北京邮电大学北京市 211工程院校 教育部直属院校
【文章页数】:117 页
【学位级别】:博士
【文章目录】:
摘要
ABSTRACT
CHAPTER 1: INTRODUCTION
1.1 Background
1.2 Motivation
1.3 VANET Characteristics
1.4 VANETs Security Requirements
1.5 Mobility Management in Vehicular Network
1.6 Cyber Attacks in Automotive Technology
1.6.1 Attacks Related to Authentication
1.6.2 Attacks Related to Network Efficiency
1.6.3 Attacks Related to User’s Privacy
1.7 Research Objectives and Contribution
1.8 Research Contents and Thesis Structure
CHAPTER 2: LITERATURE REVIEW
2.1 Introduction
2.2 Asymmetric Algorithms for Automotive Security
2.3 Symmetric Cryptographic Protocols for Automotive Security
2.3.1 Blowfish
2.3.2 PBAS
2.3.3 Camellia
2.3.4 CAST
2.4 Lightweight Protocols for Automotive Security
2.5 Physical Layer Key Generation Schemes
2.6 Summary
CHAPTER 3: HB-PROTOCOL BASED ADVANCE SECURITY SYSTEM FOR PKES USINGMULTIPLE ANTENNAS
3.1 Introduction
3.2 Relay Attack
3.3 HB-Protocol
3.3.1 The LPN Problem
3.3.2 Basic Authentication Step of HB-Protocol
3.4 Methodology
3.4.1 Proposed MA-HB Scheme
3.4.2 Tag-end Modifications
3.4.3 Security Analysis of MA-HB Scheme
3.5 System Design and Results Analysis
3.5.1 Secret Encryption Keys
3.5.2 "Z-values" for Reader
3.5.3 Comparison of Tag's "Z-values" with the Reader's "Z-values"
3.6 Summary
CHAPTER 4: AUTHENTICATION FOR AUTOMOTIVE CYBER PHYSICAL SYSTEMS BASED ONMODIFIED HB PROTOCOL
4.1 Introduction
4.2 Physical Layer Based Authentication Protocols
4.3 Proposed HB-PL Authentication Process
4.4 Security Analysis of HB-PL Authentication
4.5 Simulation Results
4.6 Comparison
4.7 Summary
CHAPTER 5: SECURE KEY DISTRIBUTION FOR VEHICULAR NETWORK BASED ONKIRCHHOFF LAW JOHNSON NOISE
5.1 Introduction
5.2 KLJN Key Exchange
5.3 Life Time of the KLJN Key in Vehicular Communication Networks
5.4 MR-KLJN: Multiple-Resistor KLJN key exchange for vehicular network
5.5 Security Analysis of MR-KLJN
5.6 Simulation Results
5.7 Summary
CHAPTER 6: CONCLUSION
6.1 Vehicular Network Assessment
6.2 Solutions Towards Secure Vehicular Technology
6.3 Future Directions
REFERENCES
LIST OF PUBLICATIONS
ACKNOWLEDGEMENTS
Dedication
本文编号:3406619
【文章来源】:北京邮电大学北京市 211工程院校 教育部直属院校
【文章页数】:117 页
【学位级别】:博士
【文章目录】:
摘要
ABSTRACT
CHAPTER 1: INTRODUCTION
1.1 Background
1.2 Motivation
1.3 VANET Characteristics
1.4 VANETs Security Requirements
1.5 Mobility Management in Vehicular Network
1.6 Cyber Attacks in Automotive Technology
1.6.1 Attacks Related to Authentication
1.6.2 Attacks Related to Network Efficiency
1.6.3 Attacks Related to User’s Privacy
1.7 Research Objectives and Contribution
1.8 Research Contents and Thesis Structure
CHAPTER 2: LITERATURE REVIEW
2.1 Introduction
2.2 Asymmetric Algorithms for Automotive Security
2.3 Symmetric Cryptographic Protocols for Automotive Security
2.3.1 Blowfish
2.3.2 PBAS
2.3.3 Camellia
2.3.4 CAST
2.4 Lightweight Protocols for Automotive Security
2.5 Physical Layer Key Generation Schemes
2.6 Summary
CHAPTER 3: HB-PROTOCOL BASED ADVANCE SECURITY SYSTEM FOR PKES USINGMULTIPLE ANTENNAS
3.1 Introduction
3.2 Relay Attack
3.3 HB-Protocol
3.3.1 The LPN Problem
3.3.2 Basic Authentication Step of HB-Protocol
3.4 Methodology
3.4.1 Proposed MA-HB Scheme
3.4.2 Tag-end Modifications
3.4.3 Security Analysis of MA-HB Scheme
3.5 System Design and Results Analysis
3.5.1 Secret Encryption Keys
3.5.2 "Z-values" for Reader
3.5.3 Comparison of Tag's "Z-values" with the Reader's "Z-values"
3.6 Summary
CHAPTER 4: AUTHENTICATION FOR AUTOMOTIVE CYBER PHYSICAL SYSTEMS BASED ONMODIFIED HB PROTOCOL
4.1 Introduction
4.2 Physical Layer Based Authentication Protocols
4.3 Proposed HB-PL Authentication Process
4.4 Security Analysis of HB-PL Authentication
4.5 Simulation Results
4.6 Comparison
4.7 Summary
CHAPTER 5: SECURE KEY DISTRIBUTION FOR VEHICULAR NETWORK BASED ONKIRCHHOFF LAW JOHNSON NOISE
5.1 Introduction
5.2 KLJN Key Exchange
5.3 Life Time of the KLJN Key in Vehicular Communication Networks
5.4 MR-KLJN: Multiple-Resistor KLJN key exchange for vehicular network
5.5 Security Analysis of MR-KLJN
5.6 Simulation Results
5.7 Summary
CHAPTER 6: CONCLUSION
6.1 Vehicular Network Assessment
6.2 Solutions Towards Secure Vehicular Technology
6.3 Future Directions
REFERENCES
LIST OF PUBLICATIONS
ACKNOWLEDGEMENTS
Dedication
本文编号:3406619
本文链接:https://www.wllwen.com/kejilunwen/qiche/3406619.html