期刊文献+

基于消息池的车联网信息安全高效认证算法

Efficient security authentication algorithms for vehicle networking information based on message pool
下载PDF
导出
摘要 随着车联网技术的研究深入,信息安全已经成为车联网技术中非常重要的问题,而安全认证的效率直接关系到车联网技术的应用可行性。结合以上两个需求,提出了基于消息池的车联网信息安全高效认证算法,它一方面能有效地保障信息安全,同时又极大地提高了信息认证的效率,有很大的实际应用价值。 With the development of vehicle network technology,information security has become a very important issue in vehicle network technology,and the efficiency of safety certification is directly related to the feasibility of application of vehicle network technology.Based on the above two requirements,this paper proposes an efficient security authentication algorithm for vehicle network information based on message pool.On the one hand,it can effectively guarantee information security,and at the same time,it greatly improves the efficiency of information authentication,which has great practical application value.
作者 李楠 LI Nan(Department of Software Engineering,Fuzhou Software Vocational and Technical College,Fuzhou 350003,Fujian)
出处 《佛山科学技术学院学报(自然科学版)》 CAS 2020年第1期64-68,共5页 Journal of Foshan University(Natural Science Edition)
基金 福州软科学课题项目(2018SK0201)
关键词 车联网 信息安全 信息认证 效率 消息池 vehicle internet information security information authentication efficiency message pool
  • 相关文献

参考文献1

二级参考文献11

  • 1Bo Yu,Cheng-Zhong Xu,Bin Xiao.Detecting Sybil attacks in VANETs[J]. Journal of Parallel and Distributed Computing . 2013 (6)
  • 2ABBAS S,MERABTI M,LLEWELLYN J D, et al.Lightweight Sybil attack detection in MANETs. IEEE Systems Journal . 2013
  • 3Douceur J R.The Sybil attack. Proceedings of the 1st In-ternational Workshop on Peer-to-Peer Systems,IPTPS2002 . 2002
  • 4Tong ZhouR.R. Choudhury,Peng Ni.P <sup>2</sup>DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks. IEEE Journal on Selected Areas in Communications . 2011
  • 5Shan Chang,Yong Qi,Hongzi Zhu,Jizhong Zhao,Xuemin (Sherman) Shen.Footprint: Detecting Sybil Attacks in Urban Vehicular Networks. IEEE Transactions on Parallel and Distributed Systems . 2012
  • 6N. Borisov."Computational puzzles as sybil defenses,". Peer-to-Peer Computing . 2006
  • 7Chen Chen,Wang X,Han Wei-li,et al.A robust detection of the Sybil attack in urban VANETs. The 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009) . 2009
  • 8Chaurasia B K,Verma S.Infrastructure based authentication in VANETs. International Journal of Multimedia and Ubiquitous Engineering . 2011
  • 9ZHANG L,GAO D,FOH C H.A Survey of Abnormal Traffic Information Detection and Transmission Mechanisms in VSNs. International Journal of Distributed Sensor Networks . 2014
  • 10PIRO C,SHIELDS C,LEVINE B N.Detecting the Sybil Attack in Mobile Ad Hoc Networks. Secure Comm . 2006

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部