期刊文献+

城市环境下基于车辆分类的车载自组网隐私保护方案研究

Privacy protection scheme for VANET based on urban vehicle classification
下载PDF
导出
摘要 车载自组织网络的出现,在提高交通效率、改善交通环境的同时,也带来例如消息篡改、伪造和身份信息泄露等安全威胁.这就要求设计出更加符合车载网特性的消息认证方案.本文提出一种城市环境下的车载自组织网络隐私保护方案,其中包括对车辆进行分类,以及为不同类别的车辆分配不同的信任值的方法.在私人车辆认证的过程中采取一种假名多次签名方案对消息进行签名,在公用车辆和固定单元不需要身份隐私保护的情况下可以直接选用RSA签名方案对消息签名,在签名的同时都需要使用对信任值进行累加的策略来提高消息的可靠性.最后使用SUMO、MOVE和NS2进行联合仿真实验,结果表明该方案具有较好的灵活性,而且认证时间小于其他方案. The Vehicular Ad Hoc Network(VANET) enhances the traffic efficiency and improves the traffic envi-ronment,however,it brings up security threats such as information tampering,forgery,as well as privacy disclosure.Thus,the message authentication scheme consistent with characteristics of the VANET is in urgent need.In this pa-per,we take the option of privacy protection scheme for VANET based on vehicle classification in urban transportsystem,which includes classification and assignment of trust values for different types of vehicles.For private vehi-cles,a pseudonym multiple signature scheme is employed to sign the message;while for the public vehicles andRSUs without identity privacy protection requirement,we can use the RSA signature scheme to sign messages.At thesame time,the signature is required to accumulate the trust value of the strategy to improve the message reliability.Finally,SUMO,MOVE and NS2 are employed to jointly simulate the proposed scheme,and the result shows that thescheme is more flexible and less time-consuming compared with other schemes proposed in references of[19-20].
出处 《南京信息工程大学学报(自然科学版)》 CAS 2017年第5期480-489,共10页 Journal of Nanjing University of Information Science & Technology(Natural Science Edition)
基金 国家自然科学基金青年科学基金(61502030) 中央高校基本科研业务费(2016JBM020)
关键词 车辆分类 隐私保护 信任度量 假名 classification of vehicles privacy protection trust value measure pseudonym
  • 相关文献

参考文献4

二级参考文献30

  • 1赵金晶,朱培栋.Ad Hoc网络移动模型及其应用[J].计算机工程与科学,2005,27(5):15-16. 被引量:20
  • 2陈炜,龙翔,高小鹏.一种基于身份的移动自组网认证机制[J].北京航空航天大学学报,2006,32(7):869-872. 被引量:4
  • 3周一新,吕卫锋,诸彤宇.大城市环境下移动Ad Hoc网络通信技术的研究[J].计算机工程,2006,32(24):101-103. 被引量:6
  • 4KO Young Bac, Vaidya n h. Location-Aided Routing(LAR)in mobile Ad Hoc networks [C]// Proceeding of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM'98), Dallas, TX, USA. New York, NY, USA:ACM, 1998:66-75.
  • 5ZAPATA M G. Secure Ad Hoc On-demand Distance Vector(SAODV)Routing [R]. IETF Internet Draft.draft -guerrero-manet-saodv-oo.txt. 2001.
  • 6HU Yih Chun, PERRIG A, JOHNSON D B. Ariadne:A secure on-demand routing protocol for Ad Hoc networks [C]// Proceedings of the 8th Annual International Conference on Mobile Computing and Networking(MOBICOM' 02), Sep 23-26, Atlanta, GA, USA. New York,NY, USA: ACM 2002:12-23.
  • 7PAPADIMITRATOS P, Haas Z.Secure routing for mobile Ad Hoc networks [C]//Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS'02), Jan 27-31,2002, San Antonio. TX. USA. 2002:27-31.
  • 8ZHOU L, HAAS Z J. Securing Ad Hoc networks [J]. IEEE Network, 1999,13(6): 24-30.
  • 9LUO H, ZERFOS P, KONG J, et al. Self-securing Ad Hoc wireless networks [C]//Proceedings of the 7th International Symposium on Computers and Communications(ISCC'02), Jul 1-4, Taorminal Giardini Naxos, Italy. Piscataway NJ,USA: IEEE Computer Society, 2002: 567-574.
  • 10WEIMERSKIRCH A, THONET G. A distributed light-weight authentication model for ad-hoc networks [C]//Information Security and Cryptology: Proceedings of the 4th Imernational Conference on Infomation Security and Cryptology(ICISC ' 01 ), Dec 6-7 2001 ,SeouI,Repubfic of Korea. LNCS2288. Berlin, Germany: Springer-Verlag, 2001,341-354.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部