Font Size: a A A

Research On Security Mechanism And Key Technology Of Internet Of Vehicles

Posted on:2017-02-03Degree:DoctorType:Dissertation
Country:ChinaCandidate:Q WangFull Text:PDF
GTID:1312330542954976Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development and application of Internet of Things(IoT),Internet of Vehicles(IoV)is introduced and becomes an important branch of research priorities.In recent years,road bearing capacity of many cities has reached saturation with the sustainable growth in car ownership.The problem of traffic safety?transportation efficiency?environmental protection and other issues have become more and more severe.Since its features of significantly easing traffic congestion?improving transport efficiency and enhancing the capacity of existed traffic,IoV is expected with this context and combined with intelligent transport technology quickly.One of features in IoV is to solve security issues in traffic,and the primary factors affecting the development of IoV are security issues and security risks.Some security issues have already existed in traditional Internet;the others are aimed at IoV.Besides,Traditional Internet is the address-centric network,but IoV is based on data-centric network.So some small problems may be very harmful to IoV It is more complex to analyze IoV security issues and implement safety program for that reason.Adhering to technology inherited,it must be combined with the characteristics of IoV instead of simply use.This paper mainly to research security mechanisms and key technologies of IoV,the main research content and innovation are as follows:1.This paper points out that the security issue is key factor of affecting the development of IoV based on a systematically analysis of IoV development background.At the same time,it should be based on the network architecture and the use of systematic approach to study security issues facing by IoV following previous researches.This paper in turn proposes the architecture communication infrastructure and security models of IoV employing this method.And it designs a credible anonymous IoV authentication and platform configuration verification program under trusted computing environment.Meanwhile it makes the theoretical analysis and applied research of vehicles' positioning and location-aware.2.It proposes the architecture of IoV based on systemic analysis of IoT technical framework and intelligent transport technology.IoV is divided into the perceptual layer?the transport layer and the application layer from top to bottom.The perceptual layer acts as nerve endings of IoV,it perceives?collects and processes the data of vehicles and the traffic from the condition of vehicles?the perception of traffic and vehicle?the location ofvehicle?the perception between vehicles and other ways;the transport layer integrates different types of existed and evolving network,it makes use of cloud computing and big data and provides efficient and reliable data transmission services to application layer;the application layer is responsible for providing intelligent management of traffic?the security control of vehicles and high-traffic event warning services to IoV,it is divided into information services?security services and energy saving services.Then the communication framework of IoV is divided into perception layer network?public-access network?bearer network and traffic-control centers from bottom to top.It also divides perceptual layer network into VAN and V2 V.And the paper studies in depth focused on the communication mode of the interior of vehicles?V2V and V2 I on this basis.3.Te mechanism and method of IoV to localization and location-aware are proposed for networking features and requirements of IoV based on the analysis of existed theories and typical algorithms in wireless sensor network fields.And it presents the main evaluation index of IoV research.At the same time,in combination with localization requirements of IoV in the special environment,put forward the tunnel localization algorithm based on RSSI range-finding,and through the simulation analysis,to verify the authenticity and reliability of the algorithm.4.Security architecture of IOV is proposed based on the research of IoV architecture and the communication network architecture,then it divides into security of IoV?VANET and security of onboard Internet.Also it points out that security area of IoV is mainly related to vehicle location security?sensor and network security?communications security and electronic vehicle identification security and so on,and the security of vehicle ad hoc network mainly involves interference attacks?false information attack?tunnel attack and so on,then the security of onboard Internet mainly relates to vehicle safety?access network security and application security,etc.This paper puts forward relevant security technologies and associated solutions to these security issues,the security techniques used are digital signatures?authentication?data validation?trusted computing and so on.5.Based on trusted computing,trusted anonymous authentication model is put forward,and divides into vehicle authentication?vehicle platform authentication and vehicle platform integrity verification,in turn.Then an open standard IOV Vehicle Authentication Model is proposed through the systematic analysis of existed Internet authentication and resource authorization technology,it not only combines authentication and authorization,but also has good system compatibility?open architecture and function expansibility.On this basis,a program that can do trusted remote anonymous identity authentication and platform integrity verification to vehicle platform identity is designed,and main implementation steps are described in detail.
Keywords/Search Tags:Internet of Things(IoT), Internet of Vehicles(IoV), Vehicle Area Network(VAN), Vehicular Ad hoc Networks(VANET), Network Architecture, Network Security Model, Trusted Computing, Identity Authentication, Digital Signatures, Location-aware
PDF Full Text Request
Related items