| Edge computing achieves dynamic,real-time and intelligent computing service requirements by processing data and executing computing tasks on the edge of the network close to the data source.In recent years,as one of the main applications of edge computing technology,vehicular edge computing has been widely welcomed because of its important role in intelligent transportation system.Meanwhile,many security issues are brought into people’s vision.Among the many security issues faced,more and more people pay attention to how to ensure safe device access and communication.Aiming at how to ensure authentication and communication security in vehicle edge computing environment,the completed works of this thesis are as follows:1.Aiming at the problem that vehicle keys are easy to leak in vehicle edge computing environments,an anonymous authentication scheme with key insulation is proposed.The presented scheme achieves key insulation based on bilinear mapping.The vehicle only needs to update its private key in each time period,instead of updating the public key,and the server can use the fixed public key of the vehicle to verify the service request of the vehicle at any time period.The pseudo-random identity is used to achieve anonymity to third parties.At the same time,the authorization center can also verify and clear the identity of malicious vehicles based on pseudo-random identities and related parameters.Then formal analyses were utilized to demonstrate the confidentiality and unforgeability of the scheme.Finally,the comparisons with other similar schemes shows that the scheme has certain advantages in terms of security and performance.2.Aiming at the requirements of lightweight authentication and key agreement in the vehicle edge computing environment,an ECC-based anonymous authentication scheme is presented.The use of pseudo-random identities protects the user’s identity privacy and achieves anonymity to third parties.Through the utilize of smart cards,the security of is guaranteed after the reveal of user’s password.And the security of the scheme can be guaranteed even if the smart card bas been stolen.The use of timestamps makes the scheme resistant to replay attacks.Reasonable parameter setting can guarantee the privacy security of users in the case of leakage of user related parameters stored in the server’s database.BAN logic and informal analysis are used to analyze the correctness and safety of the scheme respectively.Finally,the comprehensive analysis and comparison show that the scheme has a good application value. |