期刊文献+

一个易扩展的匿名车载网信息鉴别方案 被引量:5

A Scalable Anonymous Authentication Protocol for VANET
下载PDF
导出
摘要 为了解决车载通信网中信息的可认证性、匿名性、不可链接性和可追踪性等安全需求,根据车载通信网规模大、易变动和低时延的特点,提出了一种易扩展的安全高效的信息鉴别方案。该方案采用移动通信模式的群组管理,以基于身份的签密算法和群签名为基础,实现了车辆可以在不泄露隐私的前提下动态地加入一个群,并且可以在群中进行信息的批量验证,使信息认证时间不以车辆数的变多而增加。安全分析和实验仿真表明,该方案比现存方案可操作性强,效率高并且安全性好。 In order to resolve the information security problem in vehicular ad hoc networks(VANET) and improve traffic efficiency,a privacy-preserving and scalable scheme was proposed for VANET messages authentication,in which identity(ID)-based signcryption was used to help vehicles to securely receive a secret member key from an RSU,and then the vehicles could anonymously send messages on behalf of the group.Furthermore,batch technique was employed to accelerate the verification.Extensive simulation was conducted to confirm the efficiency of the scheme in various application scenarios.The results showed that the scheme is better than other existed programs.
作者 刘辉 李晖
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2012年第3期131-136,共6页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(61103143 61003300) 中央高校基本科研业务经费专项资助项目(K50510010030)
关键词 鉴别 车载通信 群签名 签密 authentication vehicular communication group signature identity(ID)-based signcryption
  • 相关文献

参考文献12

  • 1Raya M, Hubaux J. Securing vehicular ad hoc networks [ J ]. Computer Security,2007,15 ( 1 ) :39 - 68. 被引量:1
  • 2Daza V, Domingo-Ferrer J, Sebe F, et al. Trustworthy priva- cy-preserving car-generated announcements in vehicular ad hoc networks [ J ]. IEEE Transactions on Vehicular Technolo- gy ,2009,58 (4) : 1576 - 1886. 被引量:1
  • 3Lin Xiaodong, Sun Xiaoting, Ho P H, et al. GSIS : A secure and privacy-preserving protocol for vehicular communications [ J ]. IEEE Transactions on Vehicular Technology, 2007,56 ( 6 ) : 3442 - 3456. 被引量:1
  • 4Zhang Chenxi, Lin Xiaodong, Lu Rongxing, et al. RAISE : An efficient RSU-aided message authentication scheme in vehic- ular communication networks [ C ]. The IEEE International Conference on Communications, Beijing, China, 2008 : 1451 - 1457. 被引量:1
  • 5Lu Rongxing, Lin Xiaodong, Zhu Haojin, et al. ECPP : Effi- cient conditional privacy,preservation protocol for secure ve- hicular communications[ C ]. The IEEE International Confer- ence on Computer Communications, Phoenix, AZ, United States ,2008 : 1229 - 1237. 被引量:1
  • 6Zhang Chenxi, Lu Rongxing, Lin Xiaodong, et al. An efficient identity-based batch verification scheme for vehicular sensornetworks[ C]. The IEEE International Conference on Com- puter Communications Phoenix, AZ, United States ,2008:246 - 250. 被引量:1
  • 7刘辉,李晖,马占欣.一个安全高效的车载网认证方案[J].西南交通大学学报,2011,46(2):315-320. 被引量:4
  • 8Sun Jinyuan, Zhang Chi, Zhang Yanchao, et al. An Identity- based security system for user privacy in vehicular Ad Hoc networks [ J ]. IEEE Transactions on Parallel and Distributed Systems ,2010,21 (9) : 1227 - 1239. 被引量:1
  • 9Yep L Y, Chen Y C, Huang J L. PAACP : A portable privacy- preserving authentication and access control protocol in ve- hicular ad hoc networks [ J ]. Computer Communications, 2011,34:447 - 456. 被引量:1
  • 10Zhang Lei, Wu Qiaohong, Solanas A. A scalable robust au- thentication protocol for secure vehicular communications [ J]. IEEE Transactions on Vehicular Technology,2010,59 (4) :1606 - 1617. 被引量:1

二级参考文献19

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179 被引量:1
  • 4Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81 被引量:1
  • 5Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433 被引量:1
  • 6Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53 被引量:1
  • 7Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229 被引量:1
  • 8Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002 被引量:1
  • 9Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158 被引量:1
  • 10Nalla D., Reddy K. C.. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report2003/066, IACR, 2003 被引量:1

共引文献75

同被引文献59

  • 1边永超,毕经平.基于IPv6的电动汽车状态感知系统[J].清华大学学报(自然科学版),2011,51(S1):1388-1392. 被引量:1
  • 2张远明,尚中飞,初志刚,初毅.基于蓝牙技术构建汽车远程诊断系统[J].吉林大学学报(信息科学版),2007,25(3):335-341. 被引量:4
  • 3Bissmeyer N,Stresing C,Bayarou K M.Intrusion detection in VANETs through verification of vehicle movement data[C]//Proc of IEEE Vehicular Networking Conference.[S.l.]:IEEE Press,2010:166-173. 被引量:1
  • 4Gerla M,Kleinrock L.Vehicular networks and the future of the mobile Internet[J].Computer Networks,2011,55(2):457-469. 被引量:1
  • 5Liu Nianbo,Liu Ming,Lou Wei,et al.PVA in VANETs:stopped cars are not silent[C]//Proc of IEEE INFOCOM.[S.l.]:IEEE Press,2011:431-435. 被引量:1
  • 6Lequerica I,Martinez J A,Ruiz P M.Efficient certificate revocation in vehicular networks using NGN capabilities[C]//Proc of the 72nd IEEE Vehicular Technology Conference Fall.[S.l.]:IEEE Press,2010:1-5. 被引量:1
  • 7Laberteaux K P,Haas J J,Hu Y C.Security certificate revocation list distribution for VANET[C]//Proc of the 5th ACM International Workshop on Vehicular Internet Working.New York:ACM Press,2008:88-89. 被引量:1
  • 8Papadimitratos P P,Mezzour G,Hubaux J P.Certificate revocation list distribution in vehicular communication systems[C]//Proc of the 5th ACM International Workshop on Vehicular Internet Working.New York:ACM Press,2008:86-87. 被引量:1
  • 9Haas J J,Hu Y C,Laberteaux K P.Efficient certificate revocation list organization and distribution[J].IEEE Journal on Selected A-reas in Communications,2011,29(3):595-604. 被引量:1
  • 10Eckhoff D,German R,Sommer C,et al.Slotswap:strong and affordable location privacy in intelligent transportation systems[J].IEEE Communications Magazine,2011,49(11):126-133. 被引量:1

引证文献5

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部