Font Size: a A A

Research And Application Of Message And Identity Authentication Scheme In Internet Of Vehicles

Posted on:2024-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:S YanFull Text:PDF
GTID:2542307124460274Subject:Electronic information
Abstract/Summary:PDF Full Text Request
With the rapid development of computer systems and wireless network communication technology,the application scope of intelligent transportation systems is continuously expanding,among which vehicular ad hoc networks are more widely used in smart cities.Vehicular ad hoc networks can improve road safety and traffic management by allowing secure information exchange between vehicles and infrastructure.However,the openness of the vehicular network makes message security and identity privacy issues a major concern.Therefore,achieving message and identity authentication has become one of the main tasks in the current vehicular network environment.Nevertheless,with the continuous development of vehicular networks,current cryptographic schemes are no longer sufficient to satisfy the needs of complex heterogeneous vehicular networks.Heterogeneous cryptography has become an important means to solve the problem of heterogeneous communication between different cryptographic systems.At the same time,with the increasing demand for timely data exchange in vehicular networks,the emergence of aggregation and equivalence testing techniques can reduce the computational burden of users and improve communication efficiency.In view of addressing the message and identity authentication in vehicular networks,we adopt signcryption technology as the core and conducts in-depth research in combination with different vehicular network application scenarios.This paper designs three secure and efficient message and identity authentication schemes.The specific research contents are as follows:(1)A message authentication scheme based on heterogeneous aggregate signature in vehicular networks is proposed.This scheme is based on heterogeneous aggregate signcryption technology,which achieves communication security between different cryptographic systems,and adopts aggregate technology to allow the receiver to aggregate multiple ciphertexts to improve processing speed.Under the random oracle model,the scheme is verified for indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen message attacks.Numerical simulations show that compared to existing schemes,this scheme has higher computational efficiency.(2)An identity anonymous authentication scheme based on edge computing for vehicular networks is presented.This scheme utilizes attribute-based encryption technology to achieve fine-grained data access control and secure sharing.Additionally,the scheme proposes outsourcing encryption and decryption algorithms to effectively reduce the computational burden on vehicles.The scheme ensures the security of vehicle identity and message integrity using anonymous identity signature technology.Moreover,it is proven to be secure under the random oracle model based on the computational Diffie-Hellman problem.(3)A message authentication scheme based on equality test in Internet of Vehicles is proposed.The scheme employs heterogeneous signcryption technology to achieve secure communication from Public Key Infrastructure(PKI)to Identity-Based Cryptosystem(IBC).By using equality test,different types of ciphertexts can be retrieved,which reduces the computational cost of accessing the same data for different users.Additionally,the scheme utilizes aggregation technology to reduce the computational load for data users by aggregating identical ciphertexts.Furthermore,based on the Bilinear Diffie-Hellman Inversion problem,the confidentiality and unforgeability of the proposed scheme are proven.The results of numerical simulation and analysis show that the scheme is effective.
Keywords/Search Tags:Internet of vehicles, Edge computing, Heterogeneous signcryption, Attribute-based encryption, Equality test
PDF Full Text Request
Related items