期刊文献+

具有隐私保护的动态高效车载云管理方案

Dynamic and efficient vehicular cloud management scheme with privacy protection
下载PDF
导出
摘要 由车辆自主形成的车载云用于交通传感数据的本地化处理和消耗,实现高时效性的智能交通管理。针对车载云的高度动态性、自组织性和高时效性特点及其车联网中用户身份和位置隐私保护需求带来的车载云管理挑战,设计了基于非对称群密钥协商协议的动态自组织车载云管理方案,通过车辆自组织的群密钥协商自动形成车载云,利用群密钥控制车载云服务提供与访问,利用群密钥更新动态管理车载云。该方案使用可追踪的一次性假名技术实现车辆的匿名认证和条件隐私保护,并在群密钥协商阶段只使用一次双线性,使运算实现了更高的效率;密钥协商和更新过程利用支持批量验证的轻量级签名实现高效的消息源认证和完整性认证,在确保效率的前提下保证自组织环境下车载云通信的安全性;密钥协商协议的动态密钥更新机制实现车载云中车辆的动态加入或退出,适应车载云的动态性特点。在随机预言机模型和求逆计算Diffie-Hellman(ICDH)问题困难假设下,证明了非对称群密钥协商方案满足选择明文安全性。安全性分析显示所提方案能够保护车辆用户的身份和位置隐私,能够实现恶意车辆的合法追踪,保证通信的保密性、完整性和防假冒以及车载云动态管理的前向安全性。性能对比分析证明所提方案在实现相同功能和满足相同安全性的情况下具有一定的通信和计算效率优势。 The vehicular cloud(VC)formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic,self-organizing and timely,in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed,where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services,and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users,and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition,the key negotiation and update process used lightweight signatures,supporting batch verification,to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud,adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman(ICDH)problem,it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users,realize the legal tracking of malicious vehicles,and ensure the confidentiality,integrity and anti-counterfeiting of communications,as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.
作者 肖敏 姚涛 刘媛妮 黄永洪 XIAO Min;YAO Tao;LIU Yuanni;HUANG Yonghong(School of Cyber Security and Information Law,Chongqing University of Posts and Telecommunications,Chongqing 400065,China;School of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China)
出处 《网络与信息安全学报》 2022年第6期70-83,共14页 Chinese Journal of Network and Information Security
基金 四川省重点研发计划(2020YFG0292)。
关键词 车载云 非对称群密钥协商 隐私保护 匿名认证 vehicular cloud asymmetric group key agreement privacy protection anonymous authentication
  • 相关文献

参考文献3

二级参考文献14

  • 1Dutta, Ratna,Barua, Rana.Provably secure constant round contributory group key agreement in dynamic setting. IEEE Transactions on Information Theory . 2008
  • 2Dent A W,Libert B,Paterson K G.Certificateless Encryption Schemes Strongly Secure in the Standard Model. Public Key Cryptography (PKC) 2008 . 2008
  • 3WU Q,MU Y,SUSILO W,et al.Asymmetric group key agreement. Annual International Conference on the Theory and Applications of Cryptographic Techniques . 2009
  • 4Zhang L,Wu Q,Qin B,et al.Identity-based authenticated asymmetric group key agreement protocol. Computing and Combinatorics . 2010
  • 5Bresson E,Catalano D.Constant Round Authenticated Group Key Agree-ment via Distributed Computation. Public Key Cryptography-PKC 2004 . 2004
  • 6ZHANG L,WU Q,QIN B,et al.Provably secure certificateless authenticated asymmetric group key agreement. International Conference on Information Security Practice and Experience . 2014
  • 7Lv X,Li H,Wang B.Authenticated asymmetric group key agreement based on certificateless cryptosystem. International Journal of Computer Mathematics . 2014
  • 8BOYD C,NIETO J M G.Round-optimal contributory conference key agreement. International Workshop on Public Key Cryptography . 2003
  • 9Al-Riyami SS,Paterson KG.Certificateless public key cryptography. Advances in Cryptography-Asiacry-pt’03 . 2003
  • 10Guiyi Wei,Xianbo Yang,Jun Shao.Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS . 2012

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部