期刊文献+

基于车辆身份的车联网结构与安全 被引量:12

Security issues and system structure of internet of vehicles
下载PDF
导出
摘要 对车联网安全研究进行了综述,没有逐一分析车联网应用场景的具体安全需求,而是着眼于车联网系统本身的特点,提炼出了当前发展中所存在的主要问题,进而厘清了车联网在不同发展阶段的概念内涵及网络架构;在明确的车联网概念与结构的基础上分析其安全问题,提出了以车辆身份认证为基础的三层安全体系结构,并以此结构为基础,分析了相关工作的进展。最后,指出了随着通信技术与数据服务能力的发展,车联网结构和安全研究的新领域。 Instead of focusing on concrete security requirements of each IOV applying scenario, the architecture characteristics of the IOV networking systems were summarized, and the main security problems were extracted by analyzing the connotation and network architecture of IOV in different development stages. Then an identity authen- tication based three-tier security architecture over the clearly analyzed concept and structure was proposed, and the related IOV security research with the view of the presented three-tier security architecture were surveyed. Finally, some new developments and progresses over security of IOV were presented.
作者 王良民 李婷婷 陈龙 WANG Liang-min LI Ting-ting CHEN Long(School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, China Automotive Engineering Research Institute, Jiangsu University, Zhanjiang 212013, China Con-Innovation Centre of Information Support & Assurance Technology, Anhui University, Hefei 230601, China)
出处 《网络与信息安全学报》 2016年第2期41-54,共14页 Chinese Journal of Network and Information Security
基金 国家自然科学基金资助项目(No.61472001) 江苏省重点研发计划基金资助项目(No.BE2015136)~~
关键词 车联网 VANET 安全协议 身份认证 internet of vehicles, VANET, security protocol, identity authentication
  • 相关文献

参考文献6

二级参考文献196

  • 1MOKBEL M F. Privacy in location-based services: start-of-the-art and research directions[A]. Proceedings of 8th International Conference on Mobile Data Management (MDM'07)[C]. Mannheim, Germany, 2007. 228.
  • 2GEDIK B, LIN L. Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1-18.
  • 3LIU L. From data privacy to location privacy: models and algo- rithms[A]. Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB'07)[C]. Vienna, Austria, 2007. 1429-1430.
  • 4TOOR ~, P, LAOUITI A. Vehicle ad hoc networks applications and related technical issues[J]. IEEE Communication Surveys and Tutorials, 2008, 10(3):74-88.
  • 5ZHU H J, LU R X, SHEN X M, et al. Security in service-oriented vehicular networks[J]. IEEE Wireless Communication, 2009, 16(4): 16-22.
  • 6PAPADIMITRATOS P, BUTTYAN L, HOLCZER T, et al. Secure vehicular communications: design and architecture[J]. IEEE Commu- nications Magazine, 2008, 46( 11 ): 100-109.
  • 7CAPKUN S, HUBAUX J P, JAKOBSSON M. Secure and Pri- vacy-Preserving Communication in Hybrid Ad Hoc Networks[R]. EPEFL-IC Technical Report, 2004.
  • 8RAYA M, HUBAUX J P. The security of vehicular ad hoc net-works[A]. Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)[C]. NY, USA, 2005.11-21.
  • 9HOH B, GRUTESER M, HUI X, et al. Preserving privacy in GPS traces via uncertainty-aware path cloaking[A]. Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)[C]. 2007. 161-171.
  • 10WASEF A, SHEN X M. REP: Location privacy for VANET using random encryption periods[J]. ACM Mobile Networks and Applica- tions (MONET), 2010, 15(1): 172-185.

共引文献47

同被引文献81

引证文献12

二级引证文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部