面向汽車信息物理系統(tǒng)的輕量級(jí)密碼技術(shù)
發(fā)布時(shí)間:2021-09-23 23:18
近年來(lái),隨著經(jīng)濟(jì)的快速發(fā)展和人口的日益膨脹,汽車數(shù)量急劇增加,汽車在給人們提供便利的同時(shí),也給道路交通系統(tǒng)帶來(lái)嚴(yán)峻挑戰(zhàn),如:交通堵塞,事故頻發(fā)等,這些都給人們的生命財(cái)產(chǎn)安全帶來(lái)嚴(yán)重威脅。智能交通系統(tǒng)(ITS)通過(guò)車輛、道路、駕駛員的密切配合來(lái)提高交通運(yùn)輸效率,有效緩解交通阻塞,降低交通事故發(fā)生率,降低能源消耗,從而減輕環(huán)境污染。車輛自組織網(wǎng)絡(luò)作為智能交通系統(tǒng)的核心基礎(chǔ),引起了政府,汽車制造業(yè)以及科研人員的廣泛關(guān)注。車輛自組織網(wǎng)絡(luò)在車輛單元、路邊單元以及其他車輛之間構(gòu)建大型移動(dòng)多跳網(wǎng)絡(luò),在高速移動(dòng)的環(huán)境下,實(shí)現(xiàn)車輛與車輛,車輛與基站之間的無(wú)線通信,通過(guò)彼此間發(fā)送安全信息數(shù)據(jù)包,緩解日益嚴(yán)重的交通問(wèn)題。然而由于車輛自組織網(wǎng)絡(luò)具有網(wǎng)絡(luò)規(guī)模巨大、無(wú)線信道開(kāi)放、移動(dòng)軌跡可預(yù)見(jiàn)等特性,其更容易遭受攻擊,暴露車輛隱私信息。因此提高車輛自組織網(wǎng)絡(luò)信息傳輸?shù)陌踩?保護(hù)車輛隱私成為研究者的主要研究方向。車輛自組織網(wǎng)絡(luò)具有高移動(dòng),網(wǎng)絡(luò)拓?fù)渥儞Q頻繁,不能容忍通信中的延遲等特性,使得橢圓曲線密碼等傳統(tǒng)的密碼算法無(wú)法直接應(yīng)用其中。針對(duì)上述問(wèn)題,本文主要圍繞面向汽車信息物理系統(tǒng)的輕量級(jí)密碼協(xié)議展開(kāi)研究,主要?jiǎng)?chuàng)新點(diǎn)...
【文章來(lái)源】:北京郵電大學(xué)北京市 211工程院校 教育部直屬院校
【文章頁(yè)數(shù)】:117 頁(yè)
【學(xué)位級(jí)別】:博士
【文章目錄】:
摘要
ABSTRACT
CHAPTER 1: INTRODUCTION
1.1 Background
1.2 Motivation
1.3 VANET Characteristics
1.4 VANETs Security Requirements
1.5 Mobility Management in Vehicular Network
1.6 Cyber Attacks in Automotive Technology
1.6.1 Attacks Related to Authentication
1.6.2 Attacks Related to Network Efficiency
1.6.3 Attacks Related to User’s Privacy
1.7 Research Objectives and Contribution
1.8 Research Contents and Thesis Structure
CHAPTER 2: LITERATURE REVIEW
2.1 Introduction
2.2 Asymmetric Algorithms for Automotive Security
2.3 Symmetric Cryptographic Protocols for Automotive Security
2.3.1 Blowfish
2.3.2 PBAS
2.3.3 Camellia
2.3.4 CAST
2.4 Lightweight Protocols for Automotive Security
2.5 Physical Layer Key Generation Schemes
2.6 Summary
CHAPTER 3: HB-PROTOCOL BASED ADVANCE SECURITY SYSTEM FOR PKES USINGMULTIPLE ANTENNAS
3.1 Introduction
3.2 Relay Attack
3.3 HB-Protocol
3.3.1 The LPN Problem
3.3.2 Basic Authentication Step of HB-Protocol
3.4 Methodology
3.4.1 Proposed MA-HB Scheme
3.4.2 Tag-end Modifications
3.4.3 Security Analysis of MA-HB Scheme
3.5 System Design and Results Analysis
3.5.1 Secret Encryption Keys
3.5.2 "Z-values" for Reader
3.5.3 Comparison of Tag's "Z-values" with the Reader's "Z-values"
3.6 Summary
CHAPTER 4: AUTHENTICATION FOR AUTOMOTIVE CYBER PHYSICAL SYSTEMS BASED ONMODIFIED HB PROTOCOL
4.1 Introduction
4.2 Physical Layer Based Authentication Protocols
4.3 Proposed HB-PL Authentication Process
4.4 Security Analysis of HB-PL Authentication
4.5 Simulation Results
4.6 Comparison
4.7 Summary
CHAPTER 5: SECURE KEY DISTRIBUTION FOR VEHICULAR NETWORK BASED ONKIRCHHOFF LAW JOHNSON NOISE
5.1 Introduction
5.2 KLJN Key Exchange
5.3 Life Time of the KLJN Key in Vehicular Communication Networks
5.4 MR-KLJN: Multiple-Resistor KLJN key exchange for vehicular network
5.5 Security Analysis of MR-KLJN
5.6 Simulation Results
5.7 Summary
CHAPTER 6: CONCLUSION
6.1 Vehicular Network Assessment
6.2 Solutions Towards Secure Vehicular Technology
6.3 Future Directions
REFERENCES
LIST OF PUBLICATIONS
ACKNOWLEDGEMENTS
Dedication
本文編號(hào):3406619
【文章來(lái)源】:北京郵電大學(xué)北京市 211工程院校 教育部直屬院校
【文章頁(yè)數(shù)】:117 頁(yè)
【學(xué)位級(jí)別】:博士
【文章目錄】:
摘要
ABSTRACT
CHAPTER 1: INTRODUCTION
1.1 Background
1.2 Motivation
1.3 VANET Characteristics
1.4 VANETs Security Requirements
1.5 Mobility Management in Vehicular Network
1.6 Cyber Attacks in Automotive Technology
1.6.1 Attacks Related to Authentication
1.6.2 Attacks Related to Network Efficiency
1.6.3 Attacks Related to User’s Privacy
1.7 Research Objectives and Contribution
1.8 Research Contents and Thesis Structure
CHAPTER 2: LITERATURE REVIEW
2.1 Introduction
2.2 Asymmetric Algorithms for Automotive Security
2.3 Symmetric Cryptographic Protocols for Automotive Security
2.3.1 Blowfish
2.3.2 PBAS
2.3.3 Camellia
2.3.4 CAST
2.4 Lightweight Protocols for Automotive Security
2.5 Physical Layer Key Generation Schemes
2.6 Summary
CHAPTER 3: HB-PROTOCOL BASED ADVANCE SECURITY SYSTEM FOR PKES USINGMULTIPLE ANTENNAS
3.1 Introduction
3.2 Relay Attack
3.3 HB-Protocol
3.3.1 The LPN Problem
3.3.2 Basic Authentication Step of HB-Protocol
3.4 Methodology
3.4.1 Proposed MA-HB Scheme
3.4.2 Tag-end Modifications
3.4.3 Security Analysis of MA-HB Scheme
3.5 System Design and Results Analysis
3.5.1 Secret Encryption Keys
3.5.2 "Z-values" for Reader
3.5.3 Comparison of Tag's "Z-values" with the Reader's "Z-values"
3.6 Summary
CHAPTER 4: AUTHENTICATION FOR AUTOMOTIVE CYBER PHYSICAL SYSTEMS BASED ONMODIFIED HB PROTOCOL
4.1 Introduction
4.2 Physical Layer Based Authentication Protocols
4.3 Proposed HB-PL Authentication Process
4.4 Security Analysis of HB-PL Authentication
4.5 Simulation Results
4.6 Comparison
4.7 Summary
CHAPTER 5: SECURE KEY DISTRIBUTION FOR VEHICULAR NETWORK BASED ONKIRCHHOFF LAW JOHNSON NOISE
5.1 Introduction
5.2 KLJN Key Exchange
5.3 Life Time of the KLJN Key in Vehicular Communication Networks
5.4 MR-KLJN: Multiple-Resistor KLJN key exchange for vehicular network
5.5 Security Analysis of MR-KLJN
5.6 Simulation Results
5.7 Summary
CHAPTER 6: CONCLUSION
6.1 Vehicular Network Assessment
6.2 Solutions Towards Secure Vehicular Technology
6.3 Future Directions
REFERENCES
LIST OF PUBLICATIONS
ACKNOWLEDGEMENTS
Dedication
本文編號(hào):3406619
本文鏈接:http://sikaile.net/kejilunwen/qiche/3406619.html
最近更新
教材專著