车联网中匿名认证方案与安全协议的研究
[Abstract]:Vehicle networking is a solution that enables vehicles to connect to the network in real time and obtain many kinds of information. It is the manifestation of the Internet of things in intelligent transportation. By installing a vehicle-mounted communication unit on a vehicle and placing a network base station around a road, information can be exchanged safely and quickly between vehicles and network servers. As an important part of the future intelligent transportation system, vehicle networking aims to achieve two main purposes. First, the vehicle can obtain the real-time traffic condition and the vehicle condition through the vehicle network in order to reduce the traffic accident and improve the traffic efficiency. Second, the vehicle can access the Internet while driving, provide news, social, entertainment and other network services to drivers, and improve the driving experience. Vehicle networking is a kind of mobile ad-organization network, which will face various network threats in the communication process. These threats may interfere with network communications to undermine the availability of car networking, or falsify or tamper with information to deceive vehicle users. Due to the particularity of the application environment, these threats may affect the normal running of vehicles and even lead to serious traffic accidents. Moreover, the vehicle network has a large network structure and open wireless channel, the identity, location and other privacy information of vehicle users are exposed to the network every moment. If these privacy information can not be protected, the communication in the vehicle network will cause the privacy leakage of the users, affect the security of the system of the vehicle network, and bring a lot of trouble to the vehicle users. Therefore, aiming at the problem of network security in vehicle networking, this paper deeply studies the anonymous authentication scheme and security protocol of vehicle networking. The main content includes the following aspects. 1. This paper introduces the development and application prospect of vehicle networking, and summarizes the system framework and research methods of vehicle networking safety research. This paper investigates the research status of privacy protection and safety problems in vehicle networking, analyzes the advantages and disadvantages of each research work, and summarizes the safety problems. An efficient conditional privacy protection and security authentication scheme is proposed. A pseudonym based signature is used for identity authentication and batch authentication is used to improve communication and computing efficiency. Then a strict security analysis is carried out to show that the scheme can resist different kinds of attacks and meet the security requirements of vehicle networking. Finally, the performance of the proposed scheme is evaluated in terms of computational cost and communication overhead. The results show that the proposed scheme is more suitable for communication services in vehicle networking than other existing schemes. From the point of view of vehicle route, based on the idea of K anonymity, a novel vehicle location privacy protection scheme is proposed by using the method of virtual location and path confusion. When a vehicle uses a location-based service, location information is sent to the server as part of the LBS request. When the vehicle network faces possible network attackers and malicious servers, simply changing the pseudonym of the vehicle can not completely guarantee that the location information will not be leaked. In this paper, the concept of virtual location is introduced, and the location of the surrounding vehicle is used to achieve the effect of locus confusion, and then the location privacy of the vehicle is protected. And the traffic simulation experiment is designed in this paper, and the performance of the scheme is analyzed and compared. The results show that the proposed scheme has obvious performance advantages over other types of location privacy protection schemes.
【学位授予单位】:安徽大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:U463.6;U495;TP309
【相似文献】
相关期刊论文 前4条
1 姜参;;基于非中心化网络的匿名认证模型自动化设计[J];制造业自动化;2010年06期
2 陈立全;何营营;王玲玲;;M2M网络上的改进直接匿名认证方案[J];东南大学学报(自然科学版);2012年04期
3 蔡庆玲;詹宜巨;刘洋;唐焯宜;;通用可组合安全的匿名认证密钥交换协议[J];深圳大学学报(理工版);2010年04期
4 ;[J];;年期
相关博士学位论文 前4条
1 沈韩;移动互联网中匿名认证协议的设计与安全性分析[D];武汉大学;2016年
2 刘金业;移动通信环境下的匿名认证研究[D];北京邮电大学;2013年
3 王晓亮;P2P网络匿名认证与追踪技术研究[D];湖南大学;2011年
4 姜春林;无线漫游网络音视频通信匿名认证研究[D];中南大学;2012年
相关硕士学位论文 前10条
1 江丽军;基于TPM的可信DAA认证模型的研究[D];河北大学;2015年
2 赵婧;基于k-假名集合的用户匿名身份认证协议[D];西安电子科技大学;2014年
3 陈保光;基于Android的匿名IM系统的设计与实现[D];河南大学;2015年
4 赵培;VANETs安全匿名认证及相关技术研究[D];合肥工业大学;2015年
5 黎水凡;面向VANET的条件匿名认证方案研究[D];湖南科技大学;2016年
6 陈少辉;面向体域网的双向匿名认证协议研究[D];西安电子科技大学;2015年
7 温靖宇;车联网中匿名认证方案与安全协议的研究[D];安徽大学;2017年
8 李霄文;匿名认证体系的优化设计与验证[D];南京理工大学;2009年
9 甄鸿鹄;可信匿名认证的研究与应用[D];解放军信息工程大学;2009年
10 王艺霖;基于代理环签名的匿名认证研究[D];云南大学;2012年
,本文编号:2119598
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2119598.html