Font Size: a A A

Research On Authentication Protocol In Intelligent Transportation Network

Posted on:2021-11-30Degree:MasterType:Thesis
Country:ChinaCandidate:B YuanFull Text:PDF
GTID:2492306554466914Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
As the infrastructure of our country,transportation is closely related to the development of economy and technology.With the development of Internet,Internet of things,mobile communication and other technologies,Intelligent transportation system has been widely valued at home and abroad.In the intelligent transportation network,the Internet of vehicles is the core part of the transportation network,which greatly improves the efficiency of transportation operation.With the development of marine economy,Internet of vessels has become an important part of transportation network,and Radio Frequency Identification(RFID)technology in Internet of vessels also plays an important role in the development of shipping.But the Internet of vehicles and the Internet of vessels are in the open network of wireless communication,and there are many data sharing information and identity privacy information,so these information are facing the risk of being attacked and leaked.Authentication technology based on cryptography is often used as the first line of defense to protect network security,and plays an important role in communication security and privacy protection,authentication technology is mainly to verify the integrity of the message and the legitimacy of the identity.In this paper,aiming at the security problems in the RFID system of the Internet of vehicles and Internet of vessels and the shortcomings of the existing authentication protocols,we propose a secure and efficient authentication protocol respectively.The main work is as follows:(1)To solve the problem of high computation cost in the process of certificate and signature,Azees and others have proposed EAAP protocol.This paper first reviews EAAP protocol and analyzes its inability to resist location tracking attacks,as well as the fact that Trusted Authority(TA)may not be able to obtain the real identity information of malicious vehicles in case of disputes.Therefore,in order to solve the security problems of EAAP,an improved EAAP authentication protocol in the Internet of vehicles system is proposed.By using temporary shared key,bilinear pairing based authentication and other methods,the attacker’s location tracking attack through anonymous certificate is solved.Then a new condition tracking method is proposed to effectively find the real identity of malicious vehicles.And the protocol realizes the mutual authentication between OBU and RSU,which guarantees the validity of vehicle identity and the integrity of message.Finally,by analyzing and comparing the computation and communication overhead in the protocol,the performance of this protocol is improved compared with other protocols,and the problem of high computation overhead in the process of signature and authentication is solved.(2)In order to solve the problems of slow group label authentication and low label computing power,a group authentication protocol in RFID system of Internet of vessels is proposed.In the protocol,the back-end server can authenticate multiple tags in the group at the same time by using exclusive or summation operation,which effectively solves the problem of slow group tag authentication.By using the property of Chinese remainder theorem,the group shared key is updated.The protocol can also remove the damaged illegal tags in the group,and ensure the security of other tags and the whole system.In addition,a group label ownership transfer method is proposed.When the label ownership is transferred,the new and old owners can transfer safely.Finally,by analyzing the storage cost,calculation cost and communication cost of multiple protocols,this protocol has some advantages over other protocols in the overall performance,and the calculation cost of the label is the smallest,which solves the problem of small label calculation ability.
Keywords/Search Tags:Internet of vehicles, Internet of vessels, RFID, Communication security, Authentication technology
PDF Full Text Request
Related items