Font Size: a A A

Research On Secure And Efficient Authentication Method Based On Fog Computing For Vehicular Ad Hoc Network

Posted on:2023-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:L ChenFull Text:PDF
GTID:2532307043489034Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the application of intelligent transportation systems,vehicular ad hoc network(VANET)is playing a more and more important role in ensuring driving safety,improving traffic management,providing information services and reducing resource consumption.In VANET,vehicles can generate and collect traffic information using their own sensors,and actively share vehicle and road conditions,and surrounding information with other vehicles and roadside infrastructure,effectively improving driving safety and traffic management efficiency.However,the communication channel of the VANET is in the wireless network environment,and the communication between vehicles and between vehicles and infrastructure faces various threats and attacks.The message authentication mechanism can ensure the legitimacy of the message source and the integrity of the message,and it is considered as the first line of defense against attacks.Achieving secure,fast,efficient,and low-latency authentication in the dynamic vehicular network environment requires further exploration and research.A large number of researchers are working on leveraging fog computing to provide fast and efficient communications and services for vehicular networks.However,the existing authentication mechanisms have some problems,such as over idealization,strong security assumptions,dependence on hardware devices,large storage burden,high overhead,high delay and centralized management.The efficiency and security can not be well balanced and it is difficult to deploy in the actual scenario.From the perspective of efficiency and security,this dissertation designs an authentication mechanism more suitable for deployment in the actual environment.The contributions of this dissertation are as follows:1)In view of the problem of single point failure caused by high latency and centralized management in the existing authentication schemes,a new provably secure lightweight conditional privacy preserving authentication scheme based on fog computing is proposed in this dissertation.The scheme realizes fast and efficient authentication between large-scale vehicles by using fog computing,without requiring real-time online assistance from the trusted authority.It not only reduces the workload of the trusted authority,but also avoids the occurrence of a single point of failure.The vehicle’s key and pseudonym are generated by itself,and the vehicle does not need apply for key and pseudonym updates from the trusted authority in real time.It only needs the trusted authority or fog node to generate an identity token for the vehicle,thus avoiding the key escrow problem.At the same time,a formal security model is provided to prove that the scheme is secure.The performance evaluation shows that the scheme outperforms the related schemes in terms of computing and communication overhead.2)Aiming at the problems of overreliance on hardware devices,strong security assumptions and high overhead in the existing authentication schemes,an extensible and effective anonymous batch authentication scheme based on fog computing is proposed in this dissertation.This scheme does not need to load the system master key into the tamper proof device of each vehicle in advance,which effectively avoids the risk of system master key leakage due to side channel attacks.At the same time,considering the need to improve the security intensity of the whole system,a master key update algorithm is designed to update the system master key stored in the fog node.The master key update parameters can be transmitted in the public channel,so there is no problem of key distribution,and the update mechanism ensures that only the unrevoked fog node can obtain the latest system master key.The scheme achieves higher security and has better performance than related schemes in terms of overhead.
Keywords/Search Tags:Vehicular Ad Hoc Network, Authentication, Security, Fog Computing, Privacy Preserving
PDF Full Text Request
Related items