Font Size: a A A

Research On Centerless Secure Authentication Scheme In VANET

Posted on:2015-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:H B FuFull Text:PDF
GTID:2268330428485678Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, Ad-hoc Network hasbecome a hot spot in network research field. In the wake of development andimprovement, Ad-hoc Network is playing a vital role in people’s habits of livingand way of working. It also provides flexible, rich and extensive network forpublic. VANET(Vehicular Ad-hoc Networks) is a practical application of Ad-hocnetwork used in traffic control field, and is also the foundation of ITS (Intelligentof Transportation Systems).In recent years, the development of auto industry is booming. For theperuse of car, automobile manufacturers is gradually moving toward anintelligent and entertainment development, which from the research oftraditional technical indicators, such as performance and external appearance,to combining with information technology, electronic technology, andcommunication technology. Meanwhile people propose that the traffic controlshould be scientific, intelligent, and convenient. At present, automobilemanufacturers, major research institutions and universities are involving in theresearch and design of intelligent traffic network system. They have completedplenty of work and have already gained some achievements. In the currentVANET research, lots of research focused on vehicle network routing protocol,MAC Link Layer communication protocol and the specific application service inApplication Layer. However, from scholars to the engineers totally overlookedVANET’s information security, identity authentication and some threats relatedto the network security, such as privacy protection.Due to VANET is a kind of wireless, open and self-organized network, thewhole network is vulnerable by online attackers. For instance, criminals alwaystamper and eavesdrop information on the network, destroy the normal operation of the network by denial-of-service attacks and Sybil attack, disruptthe whole order of traffic network or escape the law responsibility after theaccident through sending malicious messages. In order to ensure the safety ofvehicle network and reliably provide network services, it is necessary to studyand design a kind of security authentication mechanism which suitable to thefeatures of the vehicle network. In this thesis, we focus on the vehicle network,and summarize and tells about the related theories of overall architecture ofvehicle network, application service types and security requirements andfeatures. Moreover, we propose a new VANET centerless securityauthentication mechanism, which based on the existing studies of securityauthentication mechanism. Specifically, the contribution about this thesis areas follows:Firstly, this paper summarizes the development of VANET, analyzes thenetwork characteristics of vehicle network, and sort out the vehicle node’ssecurity requirements. We consider that the basic safety should meet thefollowing requirements: data origin authentication and integrity, non-reputationand security of node information. This is the standard and purpose we used indesigning the security authentication mechanism.Secondly, according to the analysis of security requirements and vehiclefeatures, we conclude some current trends kinds of security authenticationmechanism. There are in some general types: key pre-distribution authentication, distributed CA certification, self-organizedauthentication, Identity-based authentication and so on. Most of these are theplans on the process of Ad Hoc Network security authentication mechanismresearch, and they have their own special features. It has some value to thevehicle network, meanwhile many problems still exist. As a result, we putforward a kind of new program based on identity-based authentication, whichadd vehicle nodes role attribute in it. We first defined all vehicle nodes a roleattribute according to different functions and types. When authenticate identityin the nodes, we can through the judgment of the role properties to improve the whole security authentication mechanism efficiency.Thirdly, in this security authentication mechanism, in order to be able toindependently certificate among the vehicle nodes, we introduce a kind ofauthentication schemes according to the bilinear pairings of elliptic curve. Byregistrar information based on the vehicle nodes and relevant certifications, wecan be free to exchange information on the network, achieve certification. Thiskind of program can reduce the burden of the authentication service center,and realize a range of no central authentication.Last but not least, after the analysis of security and feasibility, throughcomparing with the existing authentication mechanism, the securityauthentication mechanism with vehicle nodes role attribute by this paper aremore fit for the real Vehicle Ad-Hoc Network. In the meantime, it can alsodecrease the overhead of the network communication among nodes, andreduce the certification time among nodes. There must be some practicalityand reference for the key negotiation scheme based on the bilinearpairings of elliptic curve among nodes. Above all, it is long way to research thesecurity authentication mechanism in the field of VANET. We still have far togo.
Keywords/Search Tags:VANET, security authentication scheme, Key management, bilinearpairings
PDF Full Text Request
Related items