Font Size: a A A

Research On Vehicular Ad-hoc Networks Message Authentication Scheme Based On Elliptic Curve

Posted on:2021-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:B B WangFull Text:PDF
GTID:2392330623482031Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In order to solve the ever-increasing traffic safety problems in today's society,the Vehicular Ad-Hoc Networks has emerged at this historic moment and has quickly become a popular research subject in recent years.In the Vehicular Ad-Hoc Networks system,high-speed information exchange is performed through vehicles and vehicles or vehicles and other communications,sharing real-time information or current road condition information for vehicles,providing timely and reliable data conversion for vehicle drivers,and making decisions on possible situations in advance,which effectively guarantee the driving safety of the driver.However,due to the possibility of malicious routines in the Vehicular Ad-Hoc Networks,they use various types of attacks to disrupt the normal operation of the system and illegally spy on the user's privacy information.At the same time,the Vehicular Ad-Hoc Networks has high requirements for the immediacy of information and the vehicles themselves have fast mobile features,but the ability of many data in the Vehicular Ad-Hoc Networks to process data is extremely limited,which has become a prerequisite to limit the development of Vehicular Ad-Hoc Networks technology.It is imminent to design a secure and efficient Vehicular Ad-Hoc Networks message authentication solution.(1)Aiming at the security and efficiency problems in the Vehicular Ad-Hoc Networks,a message authentication solution for Vehicular Ad-Hoc Networks based on proxy re-signature was proposed.This solution uses proxy re-signature technology to protect the user's private information.The certification center converts the signature of the message from the vehicle node to the signature of the roadside unit to effectively protect the privacy information of the location of the vehicle node.Since the scheme does not involve a bi-linear pair that consumes a lot of energy and incorporates aggregate signature technology,the efficiency of the scheme is improved.At the same time,through the certification center,violators can also be held accountable,and conditional privacy protection has been achieved.(2)Based on the elliptic curve cryptography technology,a non bi-linear pair of vehicle networking message authentication resolution is proposed.This resolution uses random pseudonyms to achieve conditional privacy protection,and uses RSU as an aggregator to aggregate a series of signed messages for aggregate signature and aggregation verification,which effectively improved the authentication efficiency of message signatures.And a pre-calculation during the signature phase further reduced the computational overhead of the system.Compared with similar resolutions,this new resolution has higher efficiency and better security.
Keywords/Search Tags:Vehicular Ad-Hoc Networks, Proxy Re-signature, Elliptic Curve, Aggregate Signature, Privacy Protection
PDF Full Text Request
Related items