面向汽車信息物理系統(tǒng)的輕量級密碼技術
發(fā)布時間:2021-09-23 23:18
近年來,隨著經(jīng)濟的快速發(fā)展和人口的日益膨脹,汽車數(shù)量急劇增加,汽車在給人們提供便利的同時,也給道路交通系統(tǒng)帶來嚴峻挑戰(zhàn),如:交通堵塞,事故頻發(fā)等,這些都給人們的生命財產(chǎn)安全帶來嚴重威脅。智能交通系統(tǒng)(ITS)通過車輛、道路、駕駛員的密切配合來提高交通運輸效率,有效緩解交通阻塞,降低交通事故發(fā)生率,降低能源消耗,從而減輕環(huán)境污染。車輛自組織網(wǎng)絡作為智能交通系統(tǒng)的核心基礎,引起了政府,汽車制造業(yè)以及科研人員的廣泛關注。車輛自組織網(wǎng)絡在車輛單元、路邊單元以及其他車輛之間構建大型移動多跳網(wǎng)絡,在高速移動的環(huán)境下,實現(xiàn)車輛與車輛,車輛與基站之間的無線通信,通過彼此間發(fā)送安全信息數(shù)據(jù)包,緩解日益嚴重的交通問題。然而由于車輛自組織網(wǎng)絡具有網(wǎng)絡規(guī)模巨大、無線信道開放、移動軌跡可預見等特性,其更容易遭受攻擊,暴露車輛隱私信息。因此提高車輛自組織網(wǎng)絡信息傳輸?shù)陌踩?保護車輛隱私成為研究者的主要研究方向。車輛自組織網(wǎng)絡具有高移動,網(wǎng)絡拓撲變換頻繁,不能容忍通信中的延遲等特性,使得橢圓曲線密碼等傳統(tǒng)的密碼算法無法直接應用其中。針對上述問題,本文主要圍繞面向汽車信息物理系統(tǒng)的輕量級密碼協(xié)議展開研究,主要創(chuàng)新點...
【文章來源】:北京郵電大學北京市 211工程院校 教育部直屬院校
【文章頁數(shù)】:117 頁
【學位級別】:博士
【文章目錄】:
摘要
ABSTRACT
CHAPTER 1: INTRODUCTION
1.1 Background
1.2 Motivation
1.3 VANET Characteristics
1.4 VANETs Security Requirements
1.5 Mobility Management in Vehicular Network
1.6 Cyber Attacks in Automotive Technology
1.6.1 Attacks Related to Authentication
1.6.2 Attacks Related to Network Efficiency
1.6.3 Attacks Related to User’s Privacy
1.7 Research Objectives and Contribution
1.8 Research Contents and Thesis Structure
CHAPTER 2: LITERATURE REVIEW
2.1 Introduction
2.2 Asymmetric Algorithms for Automotive Security
2.3 Symmetric Cryptographic Protocols for Automotive Security
2.3.1 Blowfish
2.3.2 PBAS
2.3.3 Camellia
2.3.4 CAST
2.4 Lightweight Protocols for Automotive Security
2.5 Physical Layer Key Generation Schemes
2.6 Summary
CHAPTER 3: HB-PROTOCOL BASED ADVANCE SECURITY SYSTEM FOR PKES USINGMULTIPLE ANTENNAS
3.1 Introduction
3.2 Relay Attack
3.3 HB-Protocol
3.3.1 The LPN Problem
3.3.2 Basic Authentication Step of HB-Protocol
3.4 Methodology
3.4.1 Proposed MA-HB Scheme
3.4.2 Tag-end Modifications
3.4.3 Security Analysis of MA-HB Scheme
3.5 System Design and Results Analysis
3.5.1 Secret Encryption Keys
3.5.2 "Z-values" for Reader
3.5.3 Comparison of Tag's "Z-values" with the Reader's "Z-values"
3.6 Summary
CHAPTER 4: AUTHENTICATION FOR AUTOMOTIVE CYBER PHYSICAL SYSTEMS BASED ONMODIFIED HB PROTOCOL
4.1 Introduction
4.2 Physical Layer Based Authentication Protocols
4.3 Proposed HB-PL Authentication Process
4.4 Security Analysis of HB-PL Authentication
4.5 Simulation Results
4.6 Comparison
4.7 Summary
CHAPTER 5: SECURE KEY DISTRIBUTION FOR VEHICULAR NETWORK BASED ONKIRCHHOFF LAW JOHNSON NOISE
5.1 Introduction
5.2 KLJN Key Exchange
5.3 Life Time of the KLJN Key in Vehicular Communication Networks
5.4 MR-KLJN: Multiple-Resistor KLJN key exchange for vehicular network
5.5 Security Analysis of MR-KLJN
5.6 Simulation Results
5.7 Summary
CHAPTER 6: CONCLUSION
6.1 Vehicular Network Assessment
6.2 Solutions Towards Secure Vehicular Technology
6.3 Future Directions
REFERENCES
LIST OF PUBLICATIONS
ACKNOWLEDGEMENTS
Dedication
本文編號:3406619
【文章來源】:北京郵電大學北京市 211工程院校 教育部直屬院校
【文章頁數(shù)】:117 頁
【學位級別】:博士
【文章目錄】:
摘要
ABSTRACT
CHAPTER 1: INTRODUCTION
1.1 Background
1.2 Motivation
1.3 VANET Characteristics
1.4 VANETs Security Requirements
1.5 Mobility Management in Vehicular Network
1.6 Cyber Attacks in Automotive Technology
1.6.1 Attacks Related to Authentication
1.6.2 Attacks Related to Network Efficiency
1.6.3 Attacks Related to User’s Privacy
1.7 Research Objectives and Contribution
1.8 Research Contents and Thesis Structure
CHAPTER 2: LITERATURE REVIEW
2.1 Introduction
2.2 Asymmetric Algorithms for Automotive Security
2.3 Symmetric Cryptographic Protocols for Automotive Security
2.3.1 Blowfish
2.3.2 PBAS
2.3.3 Camellia
2.3.4 CAST
2.4 Lightweight Protocols for Automotive Security
2.5 Physical Layer Key Generation Schemes
2.6 Summary
CHAPTER 3: HB-PROTOCOL BASED ADVANCE SECURITY SYSTEM FOR PKES USINGMULTIPLE ANTENNAS
3.1 Introduction
3.2 Relay Attack
3.3 HB-Protocol
3.3.1 The LPN Problem
3.3.2 Basic Authentication Step of HB-Protocol
3.4 Methodology
3.4.1 Proposed MA-HB Scheme
3.4.2 Tag-end Modifications
3.4.3 Security Analysis of MA-HB Scheme
3.5 System Design and Results Analysis
3.5.1 Secret Encryption Keys
3.5.2 "Z-values" for Reader
3.5.3 Comparison of Tag's "Z-values" with the Reader's "Z-values"
3.6 Summary
CHAPTER 4: AUTHENTICATION FOR AUTOMOTIVE CYBER PHYSICAL SYSTEMS BASED ONMODIFIED HB PROTOCOL
4.1 Introduction
4.2 Physical Layer Based Authentication Protocols
4.3 Proposed HB-PL Authentication Process
4.4 Security Analysis of HB-PL Authentication
4.5 Simulation Results
4.6 Comparison
4.7 Summary
CHAPTER 5: SECURE KEY DISTRIBUTION FOR VEHICULAR NETWORK BASED ONKIRCHHOFF LAW JOHNSON NOISE
5.1 Introduction
5.2 KLJN Key Exchange
5.3 Life Time of the KLJN Key in Vehicular Communication Networks
5.4 MR-KLJN: Multiple-Resistor KLJN key exchange for vehicular network
5.5 Security Analysis of MR-KLJN
5.6 Simulation Results
5.7 Summary
CHAPTER 6: CONCLUSION
6.1 Vehicular Network Assessment
6.2 Solutions Towards Secure Vehicular Technology
6.3 Future Directions
REFERENCES
LIST OF PUBLICATIONS
ACKNOWLEDGEMENTS
Dedication
本文編號:3406619
本文鏈接:http://sikaile.net/kejilunwen/qiche/3406619.html
最近更新
教材專著