Font Size: a A A

The Research And Applications On Security And Privacy In Vehicular Ad-hoc Network

Posted on:2016-10-31Degree:MasterType:Thesis
Country:ChinaCandidate:J W KangFull Text:PDF
GTID:2272330461957117Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of communication technologies, the vehicles have been improved the sensing ability and increased the communication range by Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) technologies, which has been formed into Vehicular Ad Hoc Network (VANET). The VANET is an important part of Intelligent Transport System (ITS). The VANET not only improves the comfort of drivers, but also improves the road safety and traffic efficiency. Moreover, it minimizes the occurrence of accidents, which has caused widespread concern in both academic and industry.The VANET has high potential in the future ITS to support lots of applications, but the network size is too huge and the management is not an easy job. The openness and vulnerabilities of wireless networks, and the trajectory of vehicles being observed bring many security and privacy problems to VANET. Therefore, it is necessary to design efficient and reliable security protocols, and also need to provide effective privacy protection schemes.The traditional security and privacy schemes include anonymity protection (such as Mix-zone, silent period) and group signature. However, with the rapid development of cloud computing and social networks, the Cloud-assisted Vehicular Network (CVN) and Vehicular Social Network (VSN) have come out recently. The traditional schemes don not work well in the privacy protection resulting in serious privacy and security problems, which even is becoming one of the development bottlenecks of VANETs.In this paper, we focus on the actual problem in new scenarios of VANETs and try to design some privacy protection schemes. The main work of this paper are listed as follows.(1) Designing an accumulative pseudonym exchanging for location privacy enhancement in Vehicular Social Networks. By analyzing the shortcoming of the traditional privacy protection schemes and the social networks, we propose a new privacy protection scheme, which uses the meeting opportunities among vehicles to exchange their pseudonym by observing the social rule of vehicular trajectory.(2) Proposing an optimal roadside unit placement with location privacy enhancement in vehicular social network. As the new exchanged pseudonyms in aforementioned Mix-group scheme need to be activated by the help of RSUs, we design load balancing algorithm to optimize the RSU deployment and improve the level of privacy protection.(3) Analyzing the virtual machine migration attacks in cloud-assisted vehicular network and designing corresponding defenses. In cloud-assisted vehicular network, for the sake of uninterrupted vehicular services, the virtual machine of vehicles should migrate with the corresponding vehicles. As the third party service providers may disclose the location of virtual machine, so the location privacy leakage of vehicles may occur in cloud-assisted vehicular network. We analyze this location privacy leakage problem and design corresponding defense solutions.
Keywords/Search Tags:Vehicular Ad hoc network, cloud computing, social network, security andprivacy protection
PDF Full Text Request
Related items