Font Size: a A A

Research On Anonymous Authentication Scheme Supporting Trust Evaluation In Internet Of Vehicles

Posted on:2022-11-15Degree:MasterType:Thesis
Country:ChinaCandidate:Q F ZhuFull Text:PDF
GTID:2512306758466964Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Vehicle ad hoc networks(Vanets)play an important role in reducing traffic congestion,reducing environmental pollution and increasing road usage.However,there are security risks such as information transmission and data exchange due to the wireless communication mode of its communication channel.Authentication is an effective way to solve the security problems of Vanets.However,how to protect the privacy of vehicle location after passing security authentication,ensuring the reliability of specific application scenarios is also a problem that needs to be solved,such as smart charging scenarios in smart cities.In addition,in the past,the authentication scheme had insufficient security,low certification efficiency,and large computational overhead.There is not much research on the trust evaluation of vehicles,and the trust value of vehicles is an important evaluation index in the application scenario of vehicle collaborative driving.Therefore,in view of the above problems,in this paper,we propose an anonymous authentication scheme that supports trust evaluation in Vanets.The details are as follows:(1)Anonymity authentication scheme that supports location privacy protection.In this paper,we propose an anonymous authentication scheme that supports location privacy protection,and applies specific scenarios to the intelligent charging environment in smart cities.First,when the vehicle and the roadside unit are safely and anonymously authenticated,their location privacy information is encrypted and uploaded to the nearby roadside unit,which is then sent to the traffic control center.Secondly,the monitoring equipment with the built-in physical unclonable function is fixed in the toll road section to truthfully record the passing vehicle information.The monitoring device sends the collected information to the traffic control center through a safety channel,and only after information is authenticated safely can it be considered valid.At the same time,the traffic control center will evaluate the vehicle trust value according to different indicators such as the vehicle's past behavior and operating status.Finally,the traffic control center combines the trust value of the vehicle with the information collected to make the final charge.The difficult problem of this scheme is based on the problem of discrete logarithm of elliptic curve and gives a detailed security analysis,which proves that this scheme can resist the enemy attack under the preset model.(2)Proxy vehicle anonymous authentication scheme that supports trust evaluation.In order to solve the problem that the vehicle cooperative driving that may exist in the above scheme and the existence of a large number of vehicles in the coverage of the roadside unit lead to the inefficient authentication of message authentication,an anonymous authentication scheme for proxy vehicles supporting trust evaluation is proposed.Specifically,the vehicle is first crediblely evaluated based on different indicators such as the historical behavior of the vehicle and the evaluation of other vehicles.Subsequently,a new proxy vehicle selection algorithm is designed according to the remaining resources of the vehicle and the level of trust value,and the proxy vehicle authentication message is used to reduce the pressure of the roadside unit to verify the message.In order to ensure the true identity of the vehicle during driving,this program supports conditional privacy protection.Finally,a detailed security analysis is given,which proves that the scheme can resist the attack under the adversarial model.A detailed analysis of both computational and communication costs shows that this scheme is superior to several other schemes.
Keywords/Search Tags:location privacy protection, anonymous authentication, trust evaluation, proxy vehicle
PDF Full Text Request
Related items