Font Size: a A A

Research On Anonymous Authentication And Key Agreement Mechanism For Vehicular Ad Hoc Network

Posted on:2022-09-20Degree:DoctorType:Dissertation
Country:ChinaCandidate:J ZhangFull Text:PDF
GTID:1482306542463214Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Vehicular Ad Hoc Network(VANET)can provide various applications and services such as improving the driving experience,providing information service,reducing environmental pollution and improving traffic efficiency,thus promoting the development of intelligent transportation.However,VANET mainly adopts wireless communication technology,and its defects such as the usage of open communication channels and short valid communication distance limit the rapid development of the VANET.Authentication protocols can ensure the legitimacy of information sources and the integrity of messages,and are regarded as the key technology of defense from attackers.The existing authentication protocols have the problems of too strong security assumption and high overhead,meanwhile ignore the requirements of specific application scenarios such as multi cloud,5G edge computing and no base station coverage area.This dissertation mainly aims at the security and efficiency of the authentication protocol in VANET,and constructs the corresponding security and efficiency authentication scheme based on specific application scenarios.The main contributions are summarized as follows:1)Aiming at the problems of strong security assumption and high performance overhead in existing authentication schemes,this dissertation proposes a novel Chinese remainder theorem(CRT)-based conditional privacy-preserving authentication scheme.The proposed scheme uses the Chinese remainder theorem to dynamically generate domain keys.The proposed scheme avoids the security threat caused by tamper proof device(TPD)loading the system private key.In the random oracle model,the security analysis shows that the proposed scheme is secure against existential forgery under the adaptive-chosen-message attack.The performance analysis demonstrated the effectiveness of the proposed scheme against the compared existing schemes in terms of the computation and communication overhead.2)To solve the problem that the existing protocols are difficult to achieve efficient authentication between multiple vehicles and multiple cloud service providers(CSPs)simultaneously,this dissertation proposes a many-to-many authentication and key agreement scheme.The proposed scheme adopts hybrid encryption algorithm,which not only realizes efficient many-to-many authentication,but also resists an ephemeral secret leakage attack in key agreement scheme.Security analysis and performance analysis show that the proposed scheme has lower computation and communication overhead,and provides higher security than those of existing schemes.3)The cloud processing of large amounts of data brings long response time and high bandwidth requirements.To solve this problem,this dissertation proposes a conditional privacy-preserving authentication scheme based on 5G edge computing.In the proposed scheme,fuzzy logic mathematical method is used to select an optimal edge computing vehicle(ECV)to assist in collecting and processing the information of surrounding vehicles,so as to reduce the computation overhead and transmission delay of the system.Security analysis shows that the proposed scheme not only meets the security requirements of message integrity,authentication,identity privacy and traceability,but also can resist replay attack and man-in-the-middle attack.4)In view of the fact that the existing researches pay less attention to the vehicle communication and security problems in low density areas,this dissertation proposes an intelligent drone-assisted anonymous authentication and key agreement scheme.In the proposed scheme,the drone acts as an aerial base station,which can move with the vehicle and inform the road ahead in time after the session secret key is established.Formal analysis proves that the proposed scheme can resist a variety of known attacks.Performance evaluation shows that the proposed scheme has low computation and communication overhead,and control center(CC)also has a higher service rate.
Keywords/Search Tags:Vehicular Ad Hoc Network, Authentication, Key Agreement, Security, Conditional Privacy-preserving
PDF Full Text Request
Related items