当前位置:主页 > 科技论文 > 路桥论文 >

面向车载雾服务的隐私保护认证方法

发布时间:2022-02-21 23:17
  智能交通系统的主要目的是通过提供与交通管理相关的创新应用和服务来提高道路安全性,使用户能够更好地了解实时的交通情况,避开拥堵,减少事故发生概率等,从而更安全、更协调地驾驶汽车。目前已经部署了几种技术来维护和推广智能交通系统(ITS),包括嵌入式系统集成、传统云计算资源管理技术的部署。这使得车载云计算(VCC)较早地被提出,VCC是一种从车载自组织网络(VANET)发展而来的概念,并以自主方式形成,从而为智能交通系统的所有参与者提供广泛的应用和服务。物联网(IoT)的出现使得大规模移动设备之间的互连和通信成为可能,这些设备产生了大量异构数据,称为数据爆炸。也就是说,尽管云计算已经成为处理和存储这些数据的有效方式,但是,对实时或对延迟敏感的应用程序的需求不断增加以及网络带宽的限制等挑战仍然无法通过使用传统云计算来解决。为了解决上述问题,提出了一种称为“车载雾计算(VFC)”的新范例。车载雾计算被提出通过将传统的车载云服务移动到边缘节点来加速计算和存储。车辆雾服务(VFS)通过在道路上提供更高的安全性和许多需要较少延迟的应用(如交通管理等)来满足上述需求。这种新模式可能面临与安全和隐私相关的... 

【文章来源】:北京交通大学北京市211工程院校教育部直属院校

【文章页数】:94 页

【学位级别】:硕士

【文章目录】:
致谢
英文摘要
摘要
序言
奉献
缩写词列表 LIST OF ABBREVIATIONS
1 INTRODUCTION
    1.1 MOTIVATION
    1.2 PROBLEMS
    1.3 METHODOLOGY
    1.4 OBJECTIVES AND CONTRIBUTIONS
    1.5 THESIS ORGANIZATION
2 BACKGROUND KNOWLEDGE
    2.1 OVERVIEW OF VEHICULAR AD HOC NETWORKS
        2.1.1 Classification of Ad Hoc Networks
        2.1.2 Vehie Ad Hoc Network(VANET)
        2.1.3 Vehicular Network Architecture
        2.1.4 Characteristics
        2.1.5 Security and Privacy Challenges
        2.1.6 Classification of Attacks
    2.2 AN OVERVIEW OF VEHICLE FOG COMPUTING
        2.2.1 Vehicular Fog Computing Architecture
        2.2.2 Cloud Servers
        2.2.3 RSUs as Fog nodes
        2.2.4 Vehicles
        2.2.5 Vehicular Fog Computing Applications
        2.2.6 VFC Security and Privacy Challenges
        2.2.7 Security Requirements
    2.3 APPLIED CRYPTOGAPHY TO VFS
        2.3.1. Basics Security Concepts
        2.3.2. A Brief Introduction to Cryptography
        2.3.3. Cryptography Schemes
    2.4 LATTICE-BASED CRYPTOGRAPHY
        2.4.1 Overview of Post-Quantum Cryptography
        2.4.2 Lattice-Based Cryptography
        2.4.3 Definition
        2.4.4 Hard Lattice Problems
        2.4.5 Learning With Errors (LWE)
        2.4.6 Ring Learning With Errors (RLWE)
    2.5 CONCLUSION
3 RELATED WORK
    3.1. RING LEARNING WITH ERROR-BASED PASSWORD AUTHENTICATED KEY EXCHANGE(RLWE-PAK)
    3.2. ATTACK MODELS AND SECURITY REQUIREMENTS
    3.3. AUTHENTICATION SCHEMES IN VANETS AND VFC
        3.3.1. Authentication Schemes in VANETS
        3.3.2. Authentication Schemes in Vehicular Fog Computing (VFC)
    3.4. CONCLUSION
4 PRIVACY-PRESERVING AUTHENTICATION APPROACH FOR ACCESSINGVEHICLE FOG SERVICE
    4.0 LIGHTWEIGHT CERTIFICATELESS ANONYMOUS AUTHENTICATION MECHANISM
        4.0.1 System Model
        4.0.2 System Mechanism
    4.1 V2IAuthentication Process
        4.1.1 Phase-Ⅰ: Registration Phase
        4.1.2 Phase-Ⅱ: Initialization Phase
        4.1.3 Phase-Ⅲ: V2I Authentication Phase
        4.1.4 Phase-Ⅳ: Revocation and Tracing Phase
    4.2 RESULT ANALYSIS OF LNCA
        4.2.1 Security Analysis of our Protocol
        4.2.2 Fundamental Security Analysis
    4.3 SVO-BASED FORMAL ANALYSIS OF MUTUAL AUTHENTICATION
        4.3.1 Grammatical components ofSVO logic
        4.3.2 Initial Assumptions
    4.4 Performance Analyis
        4.4.1 Computation and Communication Overheads
        4.4.2 Initialization Phase
        4.4.3 V2I Verification Phase
        4.4.4 Storage Overheads of TA,OBU and RSU
        4.4.5 Simulation of Verification Phase
5 CONCLUSION AND FUTURE WORK
    5.1 SUMMARY
    5.2 FUTURE WORK
        5.2.1 Designing the V2X Secure communication
        5.2.2 Differential Privacy in Fog Computing Service
参考文献 REFERENCES
作者简历及攻读硕士/博士学位期间取得的研究成果 AUTHOR PROFILE AND RESEARCH ACHIEVEMENTS OBTAINNED DURING THESTUDY FOR A MASTER'S/DOCTORAL DEGREE
学位论文数据集 DATASET FOR THE MASTER'S THESIS



本文编号:3638208

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/daoluqiaoliang/3638208.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户de261***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com