当前位置:主页 > 科技论文 > 软件论文 >

车联网中匿名认证方案与安全协议的研究

发布时间:2018-07-13 13:56
【摘要】:车联网是一种可以使车辆实时连接到网络并获取多方面信息的解决方案,是物联网在智能交通中的表现形式。通过在车辆上装置车载通信单元并在道路周围布设网络基站,使车辆之间以及车辆和网络服务器之间可以安全快捷的交换信息。车联网作为未来智能交通系统的重要组成部分,旨在达到两个主要目的。第一,车辆通过车联网获取周边的实时交通状况和车辆情况,以减少交通事故的发生和改善交通效率。第二,车辆可以在行驶过程中接入互联网,向驾驶员提供新闻资讯、社交、娱乐等网络服务,改善驾驶体验。车联网是一种移动自组织网络,通信过程中会面临各种网络威胁。这些威胁可能会干扰网络通信以破坏车联网的可用性,也可能会伪造或篡改信息欺骗车辆用户。而由于车联网应用环境的特殊性,这些威胁都可能会影响车辆的正常行驶,甚至导致严重的交通事故。而且,车联网具有大规模的网络结构和开放的无线信道,车辆用户的身份、位置等隐私信息每时每刻都暴露在网络中。如果这些隐私信息不能被保护起来,车联网中的通信将会造成用户的隐私泄露,影响车联网的体系安全,并且给车辆用户带来很多麻烦。因此,本文针对车联网中的网络安全问题,深入研究车联网的匿名认证方案和安全协议,主要内容包括以下几个方面。1.介绍了车联网的发展状况和应用前景,概括了车联网安全研究的系统框架和研究方法。对车联网中的隐私保护和安全问题的研究现状进行了调研,分析了各个研究工作的优缺点,总结其中仍未能得到解决的安全问题。2.提出了一种高效的条件隐私保护和安全认证方案。方案使用基于假名的签名用于身份认证,并且利用批认证的方法提高通信和计算效率。然后对该方案进行了严格的安全分析,表明该方案可以抵抗不同种类的攻击,满足车联网的安全需求。最后从计算代价和通信开销两方面分别评估了该方案的性能,结果表明该方案比现存的其他方案更加适合于车联网中的通信服务。3.从车辆行驶路线的角度,以K匿名的思想为基础,采用虚拟位置和路径混淆的方法,提出一种新颖的车辆位置隐私保护方案。在车辆使用基于位置的服务时,会将位置信息作为LBS请求的内容之一发送到服务器。当车联网面临可能的网络攻击者和恶意服务器时,仅仅更改车辆的假名是不能够完全保证位置信息不被泄露的。本文引入虚拟位置的概念,利用周围车辆的位置达到轨迹混淆的效果,进而保护车辆的位置隐私。并且本文设计了交通仿真实验,对该方案进行了完善的性能分析及对比。结果表明,本文方案比现有其他各种类型的位置隐私保护方案都具有明显的性能优势。
[Abstract]:Vehicle networking is a solution that enables vehicles to connect to the network in real time and obtain many kinds of information. It is the manifestation of the Internet of things in intelligent transportation. By installing a vehicle-mounted communication unit on a vehicle and placing a network base station around a road, information can be exchanged safely and quickly between vehicles and network servers. As an important part of the future intelligent transportation system, vehicle networking aims to achieve two main purposes. First, the vehicle can obtain the real-time traffic condition and the vehicle condition through the vehicle network in order to reduce the traffic accident and improve the traffic efficiency. Second, the vehicle can access the Internet while driving, provide news, social, entertainment and other network services to drivers, and improve the driving experience. Vehicle networking is a kind of mobile ad-organization network, which will face various network threats in the communication process. These threats may interfere with network communications to undermine the availability of car networking, or falsify or tamper with information to deceive vehicle users. Due to the particularity of the application environment, these threats may affect the normal running of vehicles and even lead to serious traffic accidents. Moreover, the vehicle network has a large network structure and open wireless channel, the identity, location and other privacy information of vehicle users are exposed to the network every moment. If these privacy information can not be protected, the communication in the vehicle network will cause the privacy leakage of the users, affect the security of the system of the vehicle network, and bring a lot of trouble to the vehicle users. Therefore, aiming at the problem of network security in vehicle networking, this paper deeply studies the anonymous authentication scheme and security protocol of vehicle networking. The main content includes the following aspects. 1. This paper introduces the development and application prospect of vehicle networking, and summarizes the system framework and research methods of vehicle networking safety research. This paper investigates the research status of privacy protection and safety problems in vehicle networking, analyzes the advantages and disadvantages of each research work, and summarizes the safety problems. An efficient conditional privacy protection and security authentication scheme is proposed. A pseudonym based signature is used for identity authentication and batch authentication is used to improve communication and computing efficiency. Then a strict security analysis is carried out to show that the scheme can resist different kinds of attacks and meet the security requirements of vehicle networking. Finally, the performance of the proposed scheme is evaluated in terms of computational cost and communication overhead. The results show that the proposed scheme is more suitable for communication services in vehicle networking than other existing schemes. From the point of view of vehicle route, based on the idea of K anonymity, a novel vehicle location privacy protection scheme is proposed by using the method of virtual location and path confusion. When a vehicle uses a location-based service, location information is sent to the server as part of the LBS request. When the vehicle network faces possible network attackers and malicious servers, simply changing the pseudonym of the vehicle can not completely guarantee that the location information will not be leaked. In this paper, the concept of virtual location is introduced, and the location of the surrounding vehicle is used to achieve the effect of locus confusion, and then the location privacy of the vehicle is protected. And the traffic simulation experiment is designed in this paper, and the performance of the scheme is analyzed and compared. The results show that the proposed scheme has obvious performance advantages over other types of location privacy protection schemes.
【学位授予单位】:安徽大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:U463.6;U495;TP309

【相似文献】

相关期刊论文 前4条

1 姜参;;基于非中心化网络的匿名认证模型自动化设计[J];制造业自动化;2010年06期

2 陈立全;何营营;王玲玲;;M2M网络上的改进直接匿名认证方案[J];东南大学学报(自然科学版);2012年04期

3 蔡庆玲;詹宜巨;刘洋;唐焯宜;;通用可组合安全的匿名认证密钥交换协议[J];深圳大学学报(理工版);2010年04期

4 ;[J];;年期

相关博士学位论文 前4条

1 沈韩;移动互联网中匿名认证协议的设计与安全性分析[D];武汉大学;2016年

2 刘金业;移动通信环境下的匿名认证研究[D];北京邮电大学;2013年

3 王晓亮;P2P网络匿名认证与追踪技术研究[D];湖南大学;2011年

4 姜春林;无线漫游网络音视频通信匿名认证研究[D];中南大学;2012年

相关硕士学位论文 前10条

1 江丽军;基于TPM的可信DAA认证模型的研究[D];河北大学;2015年

2 赵婧;基于k-假名集合的用户匿名身份认证协议[D];西安电子科技大学;2014年

3 陈保光;基于Android的匿名IM系统的设计与实现[D];河南大学;2015年

4 赵培;VANETs安全匿名认证及相关技术研究[D];合肥工业大学;2015年

5 黎水凡;面向VANET的条件匿名认证方案研究[D];湖南科技大学;2016年

6 陈少辉;面向体域网的双向匿名认证协议研究[D];西安电子科技大学;2015年

7 温靖宇;车联网中匿名认证方案与安全协议的研究[D];安徽大学;2017年

8 李霄文;匿名认证体系的优化设计与验证[D];南京理工大学;2009年

9 甄鸿鹄;可信匿名认证的研究与应用[D];解放军信息工程大学;2009年

10 王艺霖;基于代理环签名的匿名认证研究[D];云南大学;2012年



本文编号:2119598

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2119598.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户1496f***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com