| In recent years,the Internet of Things technology has developed rapidly.It uses sensors,radio frequency identification(RFID),and other technologies to realize the communication and interconnection between things and people.It is a technology in the three major fields of electronics,communications,and computers.The integration of the Internet and the many scenarios derived from this(such as nonstop toll,Internet of Vehicles,etc.)have greatly facilitated the lives of users.Therefore,it is also considered to be the third technological revolution in the development of information technology after computer science and the Internet.However,as a large number of terminal devices in the Internet of Things contain userrelated privacy information,security and privacy issues have become more and more worrying.Any attack or destruction of a single node in the Internet of Things will threaten the privacy of users or the security of the entire system.On the one hand,Io T devices communicate through open wireless channels,and external adversaries can monitor the channels to obtain communication messages? on the other hand,adversaries can pretend to be legitimate devices to participate in activities in the Io T system to obtain users’ private information.In order to ensure user privacy and system security,security authentication protocols came into being.The current research on the security of the Internet of Things mainly focuses on its different derivative scenarios.Among the many derivative scenarios,the ETC system and the Internet of Vehicles system are the current research hotspots.The existing security authentication protocols for these two types of scenarios generally have the characteristics of poor security,imperfect functions,and low efficiency.Therefore,designing a safe and efficient authentication protocol for ETC and car networking systems has great research value.The main research results of this article are as follows:(1)This thesis designs a lightweight RFID mutual authentication protocol for the ETC system.In the protocol design,this thesis combines a lightweight block cipher to ensure the confidentiality of communication data,and will not cause additional performance overhead to the label.In addition,this thesis uses a key update mechanism to prevent the location information of the tag from leaking.However,af-ter the introduction of the key update mechanism,external adversaries may launch desynchronization attacks on the system,causing tags and readers to fail to successfully authenticate each other’s identity.In order to resist the desynchronization attack,this thesis requires the reader to store the updated preshared value and the preshared value used in the last authentication at the same time.After the formal analysis of BAN logic,security analysis and efficiency analysis,this article shows that it can guarantee the security of the ETC system and the privacy of users.(2)This thesis designs a tworound identity based anonymous authentication key exchange protocol for the car networking system.The identity based key exchange protocol reduces the overhead caused by the management and distribution of public key certificates.However,the existing identity based authentication key exchange protocol does not provide the concealment of user identity.Since the authentication encryption algorithm itself can be regarded as a round of authentication key exchange protocol for concealing identity,this article combines and transforms the authentication encryption algorithm twice,so that the protocol of this article can provide the concealment of user identity.After analyzing the security and efficiency of the protocol in this article,it is shown that it can ensure the security of the Internet of Vehicles system,taking into account the requirements of both function and efficiency. |