Font Size: a A A

Research On Authentication Scheme In Vehicular Ad-hoc Network

Posted on:2020-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y X ZhangFull Text:PDF
GTID:2392330578467333Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of communication technology,the Vehicular Ad-hoc Network(VANET),which is an important part of the new generation of intelligent transportation systems,has attracted more and more attention.Because of the openness of the entity communication environment and the vulnerability of wireless network communication,vehicular ad hoc networks are vulnerable to attacks,such as stealing and tampering with communication messages.Therefore,it is necessary for researchers to design secure communication authentication protocols to ensure secure communication in vehicular ad hoc networks.The main mission of this paper is to design a secure and effective vehicular ad-hoc networks authentication protocol by using the theoretical knowledge of cryptography.This paper briefly describes the possible attacks and security requirements of vehicular ad hoc networks,studies the security issues of authentication protocols in vehicular ad hoc networks,analyses several existing schemes,points out the potential security risks,and proposes corresponding improvement schemes.The new authentication protocol not only improves the security performance of the scheme,but also reduces the storage space,computing overhead and communication consumption.The specific research contents are as follows:Part 1 : In order to achieve the anonymity and non-traceability of vehicles in some protocols,the key related to the vehicle identity is used to encrypt the message,so that it is difficult to realize the effective identification of the vehicle identity and the entity cannot authenticate each other after the message is transmitted to the trusted authority,a lightweight key agreement authentication protocol is proposed.In this protocol,we used the random number selected by the vehicle and the roadside unit respectively with the master key of the trusted authority to generate the session key,which not only effectively solves the above operability problems,but also ensures that the session key is not leaked;the protocol can resist replay attack,off-line password guessing attack and so on,achieve the privacy protection of the vehicle,and ensure that legitimate vehicles cannot be tracked by malicious people.At the same time,BAN logic is used to prove that the protocol can achieve mutual authentication.Part 2:This paper analysis a class of authentication protocols used certificateless aggregate signatures,which takes the example proposed by Cui et al.Such protocols has the advantage of reducing the verification cost and the length of the signature by using the aggregated signature,so that it has obvious efficiency advantages in the vehicular ad hoc network environment limited by bandwidth and storage.The security of the scheme is analyzed under a reasonable attack model,in the attack,the challenger obtains the system parameters and the public key through the request of the legitimate user and sends it to the attacker,and the attacker obtains information by performing query operations on various stages of user creation,secret key reveal,key replacement,and signature,finally the attacker cooperates with the challenger to complete the forged signature operation on the malicious information,thereby proving that the protocol is not unforgeable.
Keywords/Search Tags:Vehicular Ad hoc network, key agreement, identity authentication, security analysis, aggregate signature
PDF Full Text Request
Related items