Font Size: a A A

Research On Conditional Privacy Preservation And Security Authentication Protocol For Internet Of Vehicles

Posted on:2023-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:H F WangFull Text:PDF
GTID:2532306623469714Subject:Engineering
Abstract/Summary:PDF Full Text Request
The Internet of Vehicles(IoV)is a new type of vehicular network system arising from the Internet of Things(IoT)and Intelligent Transportation Systems(ITS)with the upgrading of communication technologies.In particular,the commercial deployment of 5G technology has further strengthened the large-scale interconnection of sensing devices and systems.The 5G vehicular network utilizes Cellular vehicleto-everything(C-V2X)technology to enable connections between moving vehicles,between vehicles and infrastructure,and between vehicles and the cloud,thereby reducing traffic congestion and the possibility of accidents and improving traffic efficiency.achieve autonomous driving.At the same time,value-added services such as entertainment,audio and video can also be provided to improve people’s driving experience.However,high-intensity data transmission will bring serious resource overhead,and due to the openness and vulnerability of the vehicle network communication process,there are security and privacy risks in the Internet of Vehicles.Therefore,this thesis conducts in-depth research on the privacy,security,and efficiency issues arising from communication in 5G vehicular networks,and proposes two conditional privacy preservation and security authentication protocols for IoV.The main results of the research work of the thesis are as follows:(1).In this thesis,considering the delay sensitivity and security privacy issues of5 G vehicular networks,a certificateless aggregated signature(CLAS)protocol based on elliptic curve cryptography(ECC)is proposed for secure communication between vehicles and infrastructure.In order to prevent malicious vehicles from inserting invalid signatures into aggregated signatures to affect aggregated verification and interfere with normal vehicle communication,we use a binary search algorithm to identify invalid signatures,and use a cuckoo filter to build a revocation mechanism to prevent malicious vehicles from launching attacks again.Formal proof and security analysis show that the proposed CLAS scheme can meet the security and privacy requirements of efficient communication.In addition,the experimental results show that the proposed scheme has a certain improvement in computational and communication efficiency compared with the previous scheme.(2).In this thesis,considering the analysis and security sharing of emergency events in the Internet of Vehicles,this thesis proposes an edge computing-based Authentication and Key Agreement(AKA)scheme.Interference to ensure the legitimacy of the source of the message.First,this thesis designs an emergency event security sharing scheme suitable for 5G vehicular networks using authentication and key agreement protocol.Subsequently,edge computing and fuzzy logic technology are used to elect edge computing vehicles to sense and analyze traffic conditions,and transmit them securely through the AKA protocol.At the same time,the blockchain is used to complete the sharing of emergency events,and once malicious behavior is found,malicious vehicles can be traced back and revoked in time.This scheme can realize secure communication and fast emergency event sharing in the Internet of Vehicles,and the security of the scheme is proved under the random oracle model.Experimental results show that this scheme is superior to other schemes in computation and communication cost.
Keywords/Search Tags:Internet of Vehicles, Privacy preservation, Identity authentication, Authentication and key agreement, Blockchain
PDF Full Text Request
Related items