| The Internet of Vehicles enables the system to achieve the function of assisting driving through corresponding processing of the collected information.Although the use of this system can bring convenience to people’s travel,the security problems caused by its own network openness and the variability of the topology have become increasingly prominent.In order to solve the security problems existing in the system,it is necessary to ensure the integrity of the data and the privacy of the user’s identity information.The introduction of signature authentication ensures the authenticity and integrity of the data,and the introduction of identity anonymization improves the privacy protection of user identity information,so the realization of the anonymous authentication scheme in the Internet of Vehicles has become one of the focuses of this paper;In addition,because of the high-speed movement of vehicle nodes in the vehicle networking environment,the vehicle authentication is easy to be disconnected,so in order to improve the anonymous authentication scheme of vehicle networking,the solution of the problem of vehicle node authentication disconnection has also become one of the focuses of this paper.First of all,this paper studies the current research status of the Internet of Vehicles signature authentication scheme at home and abroad.On this basis,it focuses on the analysis of the fast-moving characteristics of the Internet of Vehicles,the openness of the network,and the standards that have been proposed for the Internet of Vehicles.The authentication scheme in the Internet of Vehicles needs to be lightweight,batched and anonymized.Therefore,this paper proposes a group authentication scheme to improve the efficiency of authentication and realize the anonymity of member identity information,and introduces a tree structure to efficiently manage the dynamic addition,deletion and update of members.Finally,this paper analyzes the security of the selection message of the scheme and the correctness of the scheme through the provable safety theory,and verifies the authentication efficiency of the scheme with simulation experiments.Secondly,in view of the problem that vehicle nodes are prone to be interrupted during authentication,this paper proposes a fog calculation method to complete the authentication steps after the authentication is interrupted.The method first allows the Road Side Unit(RSU)to select an authenticated and sufficiently reliable vehicle from the neighbors of the vehicle where the authentication is interrupted as the fog computing node.The selection of the fog computing node can be completed by the fuzzy control system.Geographic location,available computing resources,and vehicle speed are used as input,and the decision value of the fog computing node is output through the fuzzy rules.If the decision value is within the threshold,the vehicle node can be used as the fog computing node,and the relevant information at the time of interruption will be forwarded For the fog computing node,the fog computing node completes the authentication steps after the vehicle whose authentication has been interrupted.Secondly,in order to improve the overall authentication efficiency of the scheme,the authentication method field is added to the request message to facilitate the system to select the appropriate authentication method in the authentication phase.Finally,the corresponding theoretical analysis and experimental simulation are used to prove that it can ensure privacy and security,and is superior in efficiency to other solutions. |