Font Size: a A A

Research On Security Authentication Protocol Based On Internet Of Vehicles

Posted on:2022-12-16Degree:MasterType:Thesis
Country:ChinaCandidate:W W LuoFull Text:PDF
GTID:2492306743974119Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The Internet has brought tremendous changes to the ecology of the automotive industry.Therefore,the Internet of Vehicles and the Vehicle Ad Hoc Network were born.However,the explosive growth of the number of smart cars always accompanied by new vehicle communication security issues.Due to rapid changes of vehicle-to-vehicle topology,there are endless new types of attacks in the process of vehicle authentication and communication.It seriously threatens the safety of vehicle data and privacy.Focus on authentication security issues,a secure symmetric encryption optimization protocol based on the Internet of Vehicles has been designed.It can solve the problems in the public key encryption PKI authentication protocol effectively.For example,the problem of complex technical paths,the problem of low authentication efficiency and the problem of lengthy life cycle of communication.In addition,in order to solve the security flaws of the 5G AKA authentication protocol,a 5G AKA protocol based on message authentication code is proposed.This protocol can confuse attackers so that they cannot distinguish the true SQN failure message and cannot determine the exact location of the target node,which can strengthen the security of protocol.The main work and innovations of this paper include the following three aspects:(1)The importance of vehicle identity authentication data and privacy data in the current Internet of Vehicles has been pointed out and analyzed.Then,it introduces the identity authentication protocols of different communication scenarios under the Internet of Vehicles at home and abroad.Next,the three-layer architecture of the Internet of Vehicles and the network architecture of the VANET of the vehicle-mounted ad hoc network are introduced.Then,it discusses the current security threats and typical attack methods.Finally,the key technologies used in most of the current Internet of Vehicles safety certification protocols are introduced.(2)In order to solve the problem of inefficiency of identity authentication based on public key encryption.An optimized scheme based on VANET security symmetric encryption authentication protocol is proposed.The protocol innovatively utilizes the advantage that the efficiency of symmetric encryption and decryption is several times that of asymmetric encryption,which effectively reduces the computational overhead of the protocol.At the same time,random numbers and timestamp technology are used to ensure that the security of the protocol is not affected.Although the request message sent by the vehicle node is dynamically changing all the time,it can still guarantee the security and performance efficiency of the protocol.(3)Through the analysis of the 5G AKA protocol used in the direct communication technology 5G-NR-V2 X under C-V2 X,it points out that there is an identity authentication vulnerability caused by the lack of integrity protection of the service network name.In response to this vulnerability,a 5G AKA security protocol based on message authentication code is proposed.It adds a new random variable R to the authentication data acquisition of vehicle nodes and uses the message authentication code to encrypt the permanent identifier named SUPI.It can effectively prevent the insecurity caused by the plaintext transmission of SUPI after being questioned.For the MAC failure message in the 5G AKA authentication protocol,it innovatively generates a forged authentication token and sends it to the service network.Therefore,it impossible for the attacker to distinguish the true sequence failure message and cannot determine the exact location of the target node.This way can guarantee the security of this protocol.Finally,safety simulation experiments are carried out on the above two optimization schemes.Compared with other security protocols,the above schemes have achieved the expected security goals,and they can effectively reduce computational overhead.
Keywords/Search Tags:Vehicle Ad Hoc Network, Identity Authentication, Symmetric Encryption, 5G Communication, 5G AKA Protocol
PDF Full Text Request
Related items