Font Size: a A A

Research On Mutual Authentication Scheme For Internet Of Vehicles

Posted on:2020-12-09Degree:DoctorType:Dissertation
Country:ChinaCandidate:C XuFull Text:PDF
GTID:1362330572473545Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The Internet of vehicles connects multiple industrial chains,including au-tomobiles,transportation,communications,energy and logistics.The founda-tion of Internet of vehicles includes Intranet,AD HOC network and mobile Internet.The Internet of vehicles interconnects with other things in the scene through vehicles according to standard protocols and communication standards.Therefore,the Internet of vehicles has the particularity of multi-communication scenarios and the diversity of complex applications.At present,the Internet of vehicles mutual trust and security certification has not formed a complete sys-tem,so it is urgent to realize multi-scene intelligent access and improve the multi-source interactive network of vehicle dynamic information.The Inter-net of vehicles environment communication scenarios mainly include five sce-narios:vehicle-vehicle,vehicle-roadside unit,vehicle-trusted center,vehicle-cloud and vehicle-roadside unit-trusted center.Existing authentication schemes all carry out research on different communication application scenarios.Ac-cording to the dynamic movement characteristics of vehicles in the Internet of vehicles,their communication behaviors can be divided into secure network access scenarios and real-time communication interaction scenarios.Aiming at the problem of identity anonymity protection and multi-node privacy protection in the network access scenario,the paper focuses on the re-search of anonymous handover authentication scheme and mass terminal group authentication scheme in the process of vehicle access to the network.Aiming at the problem of information sharing,reading and security transaction authenti-cation between nodes in real-time communication interaction scenes,the cross-domain authentication scheme of efficient information sharing scenes and the cross-domain authentication scheme of electric vehicles-charging pile security transaction are mainly studied.The main research results of this thesis are summarized as follows:(1)Anonymous access security authentication protocol for the Internet of vehicles.When the on-board unit requests various services from the cloud,in vehicle-trust center and vehicle-cloud communication scenarios,the access pro-cess and traditional authentication protocols still have certain complexity and security defects.In this paper,the key authentication agreement process under LTE/LTE-A network is optimized,and an anonymous handover access authen-tication protocol based on blind signature is proposed.In the Internet of vehi-cles,anonymity can effectively hide and protect the real identity of the vehicle.At the same time,it is necessary to realize security attributes such as message authentication,information integrity and identity traceability.Through com-parative analysis,it is found that the designed mutual authentication protocol satisfies more security attributes in the specific verification.The experimental results show that under the condition of satisfying more security attributes,it has better communication and computing performance and better application effect in the vehicle handover access scenario.(2)Group access security mutual authentication protocol for the Internet of vehicles.When a large number of on-board unit are connected to the network at the same time,if each device carries out independent identity authentication,it will lead to serious signaling congestion in the network.This paper proposes a group access authentication scheme based on aggregation proxy signature.In a group with multiple on-board devices,members can use the group method to verify the anonymous signature of the message,and the scheme can also determine whether the signature is generated by members of the group during the verification.At the same time,the paper designs a mutual authentication protocol with information level protection mechanism.Using the aggregate proxy signature can also effectively solve the needs of anonymity,privacy pro-tection and protection against attacks.Through comparative analysis,the de-signed group authentication and information protection scheme can simultane-ously verify multiple vehicles and equipment,minimize the signaling cost in the authentication process,and realize the group mutual authentication protection mechanism.The experimental results show that the proposed signature veri-fication function can complete five levels of information protection,and has a good application effect in the scene of batch on-board sensor access authenti-cation.(3)Cross-domain communication security authentication protocol for the Internet of vehicles.In a scene with high vehicle density,it is necessary to com-municate with network nodes of different sources such as base stations,sign-boards and traffic lights at the same time.Because of multiple cross-domain information read-write interactions,information security and transmission are likely to be threatened and broadcast storm may be caused.This paper pro-poses an authentication scheme for cross-domain communication,which uses key sharing and aggregation proxy signature to optimize the key agreement process between on-board unit and roadside unit.It reduces the number of sig-nal exchanges between large-scale vehicle-mounted equipment and network.Through comparative analysis,only the credible roadside unit can obtain the real identity of the car,making up for the traceability.The experimental results show that cross-domain authentication key agreement can improve the efficient sharing of traffic information in the Internet of vehicles,and has a good appli-cation effect on the management and storage of public key certificates in the scene with high density of on-board equipment According to the development trend of Internet of vehicles,the multi-source cross-domain communication of electric vehicles will grow explosively.For the cross-domain authentication of electric vehicles and charging piles,previous work mainly focused on net-work performance optimization management,and few studies considered the safety of electric vehicles and charging piles management.This paper proposes a mutual authentication scheme based on blockchain,with which a reliable and safe trading model for charging piles and electric vehicles is designed and im-plemented to support reasonable charging scheduling and mutual authentica-tion for electric vehicles and charging piles.Elliptic curve encryption is used to design hash function and lightning network is used as basic management.During the authentication agreement phase,the random number is generated to make the information transmitted be hashed several times.Through com-parative analysis,the designed four scheduling modes can be integrated with the current scheduling mechanism to effectively improve the safe and reliable trading mode.Experimental results show that after the implementation of the proposed scheme,blockchain records are shared within the network to effec-tively prevent tampering.It has better application effect in intelligent charging management.
Keywords/Search Tags:Internet of vehicles, Mutual Authentication, Information Security, Security Protocol
PDF Full Text Request
Related items