期刊文献+

基于双线性对的车载网络可靠消息认证机制 被引量:3

Reliable Message Authentication Mechanism in Vehicular Network Based on Bilinear Pair
下载PDF
导出
摘要 针对车载网络消息发布和认证中存在的车辆隐私性保护和消息可靠性问题,提出一个消息认证及签署机制。给出一种利用自产生伪名进行消息签名的方案,能够兼顾车辆隐私保护与有效身份认证,并通过多个用户的共同签署,提高发布消息的可靠性。同时对该方案的安全性和效率进行分析。 Aiming at the privacy protection problem and message reliability problem in Vehicular Ad Hoc NETwork(VANET),a scheme for reliable message authentication and signature based on bilinear pair and pseudonym is proposed.The scheme uses self-generated pseudonym to sign each message,which can protect the user's privacy and be verified efficiently at the same time.A priori counter measure for improving message reliability is given.The security and efficient analysis is also proposed.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第10期137-139,142,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60573054)
关键词 车载网络 隐私保护 伪名机制 消息认证 双线性对 vehicular network privacy protection pseudonym mechanism message authentication bilinear pair
  • 相关文献

参考文献6

  • 1冯金生,薛广涛,李明禄.车载自组织网络中的被动地理路由算法[J].计算机工程,2009,35(17):115-116. 被引量:3
  • 2Raya M,Aziz A,Hubaux J P Efficient Secure Aggregation in VANETs[C] //Proc.of the 3rd International Workshop on Vehicular Ad Hoc Networks.New York,USA:ACM Press,2006:66-75.
  • 3Kamat P,Baliga A,Trappe W.An Identity-based Security Framework for VANETs[C] //Proc.of the 3rd International Workshop on Vehicular Ad Hoc Networks.New York,USA:ACM Press,2006:94-95.
  • 4Calandriello G,Papadimitratos P,Hubaux J P,et al.Efficient and Robust Pseudonymous Authentication in VANET[C] //Pros.of the 4th International Workshop on Vehicular Ad Hoc Networks.New York,USA:ACM Press,2007:19-28.
  • 5Ferrer J D,Wu Qianhong.Safety and Privacy in Vehicular Communications[M] //Bettini C,Jajodia S,Samarati P,et al.Privacy in Location-based Applications.Berlin,Germany:Springer-Verlag,2009:173-189.
  • 6Cui Shi,Duan Pu,Chan Choong-Wah.An Efficient Identity-based Signature Scheme with Batch Verifications[C] //Proc.of the 1st International Conference on Scalable Information Systems.New York,USA:ACM Press,2006.

二级参考文献4

  • 1Johnson D, Maltz D. Dynamic Source Routing in Ad Hoc Wireless Networks[M]. New York, USA: Kluwer Academic Publishers, 1996.
  • 2Perkins C E, Royer E M. Ad Hoc On-demand Distance Vector Routing[C]//Proc. of the 2rid IEEE Workshop on Mobile Computing Systems and Applications. New Orleans, LA, USA: [s. n.], 1999.
  • 3Karp B, Kung H T. GPSR: Greedy Perimeter Stateless Routing for Wireless Networks[C]//Proc. of MobiComm'00. Boston, USA: [s. n.], 2000.
  • 4Broch J, Maltz D A, Johnson D B, et al. A Performance Comparison of Multi-hop Wireless Ad Hoc Network Routing Protocols[C]// Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking. Dallas, Texas, USA: [s. n.], 1998.

共引文献2

同被引文献56

  • 1边永超,毕经平.基于IPv6的电动汽车状态感知系统[J].清华大学学报(自然科学版),2011,51(S1):1388-1392. 被引量:1
  • 2张远明,尚中飞,初志刚,初毅.基于蓝牙技术构建汽车远程诊断系统[J].吉林大学学报(信息科学版),2007,25(3):335-341. 被引量:4
  • 3Luo Jun,Hubaux J P.A Survey of Research in Inter-vehicleCommunications[C]//Proc.of Embedded Security in Cars-Securing Current and Future Automotive IT Applications.[S.1.]:Springer-Verlag,2004:111-122.
  • 4Raya M,Hubaux J P.The Security of Vehicular Ad Hoc Net-works[C]//Proc.of the 3rd ACM Workshop on Security of Ad Hocand Sensor Networks.[S.1.]:ACM Press,2005.
  • 5Dotzer F.Privacy Issues in Vehicular ad Hoc Networks[C]//Proc.of Privacy Enhancing Technologies Conference.[S.1.]:Springer,2006:197-209.
  • 6Lin Xiaodong,Sun Xiaoting.GSIS:A Secure and Privacy-presser-ving Protocol for Vehicular Communications[J].IEEETransactions on Vehicular Technology,2007,56(1):3442-3456.
  • 7Lin Xiaodong,Sun Xiaoting.TSVC:Timed Efficient and SecureVehicular Communications with Privacy Preserving[J].IEEETransactions on Wireless Communications,2008,7(12):4987-4998.
  • 8Lu Rongxing,Lin Xiaodong.ECPP:Efficient Conditional PrivacyPreservation Protocol for Secure Vehicular Communications[C]//Proc.of the 27th IEEE International Conference on ComputerCommunications.[S.1.]:IEEE Press,2008:1229-1237.
  • 9Studer A,Shi E,Bai F.Tacking Together Efficient Authentication,Revocation,and Privacy in VANETs[C]//Proc.of the 6th AnnualIEEE Communications Society Conference on Sensor,Mesh andAd Hoc Communications and Networks.[S.1.]:IEEE Press,2009:1-9.
  • 10Lu Rongxing,Lin Xiaodong.Sacrificing the Plum Tree for thePeach Tree:A Socialspot Tactic for Protecting Receiver-locationPrivacy in VANET[C]//Proc.of GLOBECOM’10.[S.1.]:IEEEPress,2010:1-5.

引证文献3

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部