Font Size: a A A

Research On Security Authentication Protocol In Internet Of Vehicle

Posted on:2021-02-02Degree:MasterType:Thesis
Country:ChinaCandidate:S Z LvFull Text:PDF
GTID:2392330647961863Subject:Engineering
Abstract/Summary:PDF Full Text Request
In the 21 st century,the intelligent transportation systems have effectively reduced traffic congestion and greatly improved the efficiency of transportation through reasonable allocation and scheduling.However,although intelligent transportation systems improve transportation convenience and reduce waste of resources,they bring various uncertain security and privacy issues at the same time.For example,once the communication data in the intelligent transportation system is tampered,a large number of vehicles get wrong information,which causes serious traffic accidents or causes the vehicle's private information to leak.As the key to information sharing in intelligent transportation systems,the security authentication protocol of the Internet of Vehicles plays a decisive role in the security of intelligent transportation systems.Therefore,this article mainly studied the security authentication protocol in the Internet of Vehicles.The specific research content is as follows:(1)Lightweight privacy protection V2 I authentication protocol.With the continuous popularization of Internet of Vehicles technology,in order to balance the security and efficiency of Internet of Vehicles,this paper proposed a lightweight privacy protection V2 I authentication protocol(PLVA).Specifically,before the vehicle was started,the roadside infrastructure on the road that the vehicle passes was converted into a one-dimensional vector and encrypted using Moore curve technology.The central certification authority performed operations on the encrypted one-dimensional vector,so that the vehicle can correctly obtain the required information from the roadside infrastructure,and used the obtained certification information to perform rapid identity verification.At the same time,the central certification authority knowed nothing about the vehicle's inquiry.In addition,performance evaluations showed that our lightweight privacy-protected V2 I authentication protocol was efficient in real-world connected car environments.(2)Dynamic anonymous identity V2 I authentication protocol.With the continuous development of attack technology and the gradual maturity of attacks on security devices,in order to protect against attacks on security devices,this paper proposeed the V2 I authentication scheme using elliptic curve discrete logarithm problem(ECDLP)dynamic anonymous authentication.The scheme ensured the safety of vehicle-to-infrastructure communication and enabled fast offline authentication.In particular,when vehicles were traveling between communication ranges of different roadside infrastructures,tamperresistant equipment was used to generate dynamic pseudonyms and dynamic keys for offline identity verification.As a result,roadside infrastructure could still authenticate legitimate vehicles even if the vehicle constantly changed its pseudonym.And the identity of the vehicle remained private even if all RSUs were compromised.In addition,not only this scheme was able to update the private information in the tamper-resistant device by using the elliptic curve discrete logarithm problem in the case of continuous updating of the attack means,but also the central certification authority in the scheme could legally track malicious vehicles.
Keywords/Search Tags:Intelligent transportation system, Internet of Vehicles, communication security, privacy protection
PDF Full Text Request
Related items