Font Size: a A A

The Scheme Of Secure Communication For IoV Based On Cloud-assisted Ring Signature

Posted on:2017-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:L Y MaFull Text:PDF
GTID:2272330482484345Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Since the end of January 1886 German engineers developed the true meaning of car firstly in the world successfully, the development of automobile experienced more than 100 years, from steam to diesel to gasoline and today the electric drive. Vehicles have experienced the full manual, semiautomatic to unmanned period. The vehicle has quietly replaced the other kinds of transport and more and more become indispensable riding instead of walking tool in people’s daily life. With the dramatic increase in the number of vehicles, more and more problems arise at the historic moment: energy waste, air pollution, road pressure, low transport efficiency, vehicle management is difficult to monitor and huge data is difficult to handle, vehicle safety and privacy etc. In order to solve these problems, make countless vehicles have unified the orderly management, there is an urgent need of some new technology, car networking arises at the historic moment.To a large extent, Io V has solved the current problems of traffic congestion, traffic disasters etc. The wireless communication network Ad-Hoc gives the key technical supporting in the process of realizing the communication for V2 I and V2 V. But the connection and communication of the wireless network is completely exposed in the air and its openness is a serious threat to the security and privacy of the future vehicles. It’s essential to establish a secure and green communication platform for the wide range of Io V and the unified management of vehicles.Many scholars at home and abroad are researching on privacy and security of Io V. The privacy protection of Io V can be divided into two categories: location privacy protection, identity privacy protection. From three aspects: LBS location privacy protection; network access authentication control; security communication. Through system analysis on different methods of privacy, K-anonymous LBS privacy protection commonly used algorithms, the certificate authentication of security communication which is based on cloud architecture, ring signature etc, analyzing advantages and disadvantages of different models and various methods, this article will put forward the new model of combination use which based on cloud architecture and ring signature, increase the calculation difficulty, extend the query time,reduce the risk of attack,prevent the privacy effectively.Author’s main work and contributions :1, introduced the related concepts of Io V, analyzes the research status of the current Io V, dismantling its key technology, the hardware implementation, model analysis, parameters and challenges; systematic analysis of network security and privacy of all kinds of attacks and threats of; analyzing the present study methods according to the specific attack; make the detailed classification of the contrast about the current research status of privacy protection; summarizes the privacy protection commonly used algorithms, encryption technology, the protocol standards2, ring signature algorithm, fusion cloud architecture, meanwhile achieve the identity privacy of Io V and security of location privacy3, design simulation platform, making simulation.
Keywords/Search Tags:security communication, privacy protection, ring signature, RSU assistance, cloud architecture
PDF Full Text Request
Related items