車聯(lián)網中匿名認證方案與安全協(xié)議的研究
[Abstract]:Vehicle networking is a solution that enables vehicles to connect to the network in real time and obtain many kinds of information. It is the manifestation of the Internet of things in intelligent transportation. By installing a vehicle-mounted communication unit on a vehicle and placing a network base station around a road, information can be exchanged safely and quickly between vehicles and network servers. As an important part of the future intelligent transportation system, vehicle networking aims to achieve two main purposes. First, the vehicle can obtain the real-time traffic condition and the vehicle condition through the vehicle network in order to reduce the traffic accident and improve the traffic efficiency. Second, the vehicle can access the Internet while driving, provide news, social, entertainment and other network services to drivers, and improve the driving experience. Vehicle networking is a kind of mobile ad-organization network, which will face various network threats in the communication process. These threats may interfere with network communications to undermine the availability of car networking, or falsify or tamper with information to deceive vehicle users. Due to the particularity of the application environment, these threats may affect the normal running of vehicles and even lead to serious traffic accidents. Moreover, the vehicle network has a large network structure and open wireless channel, the identity, location and other privacy information of vehicle users are exposed to the network every moment. If these privacy information can not be protected, the communication in the vehicle network will cause the privacy leakage of the users, affect the security of the system of the vehicle network, and bring a lot of trouble to the vehicle users. Therefore, aiming at the problem of network security in vehicle networking, this paper deeply studies the anonymous authentication scheme and security protocol of vehicle networking. The main content includes the following aspects. 1. This paper introduces the development and application prospect of vehicle networking, and summarizes the system framework and research methods of vehicle networking safety research. This paper investigates the research status of privacy protection and safety problems in vehicle networking, analyzes the advantages and disadvantages of each research work, and summarizes the safety problems. An efficient conditional privacy protection and security authentication scheme is proposed. A pseudonym based signature is used for identity authentication and batch authentication is used to improve communication and computing efficiency. Then a strict security analysis is carried out to show that the scheme can resist different kinds of attacks and meet the security requirements of vehicle networking. Finally, the performance of the proposed scheme is evaluated in terms of computational cost and communication overhead. The results show that the proposed scheme is more suitable for communication services in vehicle networking than other existing schemes. From the point of view of vehicle route, based on the idea of K anonymity, a novel vehicle location privacy protection scheme is proposed by using the method of virtual location and path confusion. When a vehicle uses a location-based service, location information is sent to the server as part of the LBS request. When the vehicle network faces possible network attackers and malicious servers, simply changing the pseudonym of the vehicle can not completely guarantee that the location information will not be leaked. In this paper, the concept of virtual location is introduced, and the location of the surrounding vehicle is used to achieve the effect of locus confusion, and then the location privacy of the vehicle is protected. And the traffic simulation experiment is designed in this paper, and the performance of the scheme is analyzed and compared. The results show that the proposed scheme has obvious performance advantages over other types of location privacy protection schemes.
【學位授予單位】:安徽大學
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:U463.6;U495;TP309
【相似文獻】
相關期刊論文 前4條
1 姜參;;基于非中心化網絡的匿名認證模型自動化設計[J];制造業(yè)自動化;2010年06期
2 陳立全;何營營;王玲玲;;M2M網絡上的改進直接匿名認證方案[J];東南大學學報(自然科學版);2012年04期
3 蔡慶玲;詹宜巨;劉洋;唐焯宜;;通用可組合安全的匿名認證密鑰交換協(xié)議[J];深圳大學學報(理工版);2010年04期
4 ;[J];;年期
相關博士學位論文 前4條
1 沈韓;移動互聯(lián)網中匿名認證協(xié)議的設計與安全性分析[D];武漢大學;2016年
2 劉金業(yè);移動通信環(huán)境下的匿名認證研究[D];北京郵電大學;2013年
3 王曉亮;P2P網絡匿名認證與追蹤技術研究[D];湖南大學;2011年
4 姜春林;無線漫游網絡音視頻通信匿名認證研究[D];中南大學;2012年
相關碩士學位論文 前10條
1 江麗軍;基于TPM的可信DAA認證模型的研究[D];河北大學;2015年
2 趙婧;基于k-假名集合的用戶匿名身份認證協(xié)議[D];西安電子科技大學;2014年
3 陳保光;基于Android的匿名IM系統(tǒng)的設計與實現(xiàn)[D];河南大學;2015年
4 趙培;VANETs安全匿名認證及相關技術研究[D];合肥工業(yè)大學;2015年
5 黎水凡;面向VANET的條件匿名認證方案研究[D];湖南科技大學;2016年
6 陳少輝;面向體域網的雙向匿名認證協(xié)議研究[D];西安電子科技大學;2015年
7 溫靖宇;車聯(lián)網中匿名認證方案與安全協(xié)議的研究[D];安徽大學;2017年
8 李霄文;匿名認證體系的優(yōu)化設計與驗證[D];南京理工大學;2009年
9 甄鴻鵠;可信匿名認證的研究與應用[D];解放軍信息工程大學;2009年
10 王藝霖;基于代理環(huán)簽名的匿名認證研究[D];云南大學;2012年
,本文編號:2119598
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2119598.html