计算机科学 ›› 2020, Vol. 47 ›› Issue (5): 301-305.doi: 10.11896/jsjkx.190400119

• 信息安全 • 上一篇    下一篇

VANET中基于RSU辅助签名环形成的方案

张浩, 蔡英, 夏红科   

  1. 北京信息科技大学计算机学院 北京100101
  • 收稿日期:2019-04-19 出版日期:2020-05-15 发布日期:2020-05-19
  • 通讯作者: 蔡英(ycai@bistu.edu.cn)
  • 作者简介:1639490356@qq.com
  • 基金资助:
    国家自然科学基金(61672106);中央引导地方科技发展专项(Z171100004717002)

RSU-based Assisting Ring Formation Scheme in VANET

ZHANG Hao, CAI Ying, XIA Hong-ke   

  1. School of Computer,Beijing Information Science & Technology University,Beijing 100101,China
  • Received:2019-04-19 Online:2020-05-15 Published:2020-05-19
  • About author:ZHANG Hao,born in 1995,master.His research field includes identity privacy protection of VANETs and so on.
    CAI Ying,Ph.D,professor,supervisor.Her main interests include cryptographic algorithms and computer security,social networking and privacy protection,connected cars and edge computing,etc.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61672106) and Special Program for Guiding Local Science and Technology Development by the Central Government (Z171100004717002).

摘要: 车辆自组织网络(Vehicular Ad-hoc Network,VANET)使交通系统更加智能和高效。信道的开放性以及车辆移动的高速性等特点,导致VANET存在诸如身份、传输数据以及位置等隐私信息泄露问题。目前,针对VANET的身份隐私泄露问题,越来越多的学者采用基于环签名的方案,但是车辆如何在行驶过程中与周围车辆组成签名环一直是一个难解决的问题。针对基础设施部署较完善地区,文中提出一种基于RSU(Road-Side Unit)辅助签名环形成的方案。该方案通过RSU收集覆盖区域内车辆的公钥并广播公钥集,从而确定区域内车辆的签名环,并利用双线性对映射实现RSU与车辆间消息传输的基于身份加密的过程。安全分析和实验证明,所提方案在基础设施较完善地区能够拥有较好的效率和安全性。

关键词: RSU, 车辆自组织网络, 基于身份加密, 签名环形成, 双线性对映射

Abstract: A vehicular ad-hoc network (VANET) makes the transportation system more intelligent and efficient.But due to the open wireless channel and the high-speed movement of vehicles,VANET has privacy leakage issues such as identity,transmission data and location.For the issue of identity privacy leakage of VANET,the existing researches use ring signature increasingly.However,how the vehicle forms a ring with the surrounding vehicles has always been a difficult issue to solve during the moving of vehicles.Therefore as for the area where the infrastructure is deployed well,a RSU-based assisting ring formation scheme is proposed.The public keys of the vehicles in the coverage area are collected by the RSU,thus determining the public key set and broadcasteds it to the vehicles in the area.And the use of bilinear pair mapping achieves the identity-based encryption process of the message transmission between RSU and vehicles.According to security analysis and experiments,the scheme can have better efficiency and security in areas with better infrastructure.

Key words: Bilinear pair mapping, Identity-based encryption, Ring formation, RSU, Vehicular ad-hoc network

中图分类号: 

  • TP309
[1]ZEADALLY S,HUNT R,CHEN Y S,et al.Vehicular ad hoc networks (VANETS):status,results,and challenges[J].Telecommunication Systems,2012,50(4):217-241.
[2]TOOR Y,MUHLETHALER P,LAOUITI A,et al.Vehicle Ad Hoc networks:applications and related technical issues[J].IEEE Communications Surveys & Tutorials,2008,10(3):74-88.
[3]HE D,ZEADALLY S,XU B,et al.An Efficient Identity-based Conditional Privacy-preserving Authentication Scheme For Vehicular Ad-hoc Networks[J].IEEE Transactions on Information Forensics and Security,2015,10(12):2681-2691.
[4]CHIM T,YIU S,HUI L,et al.VSPN:VANET-based Secure and Privacy-preserving Navigation[J].IEEE Transactions on Computers,2014,63(2):510-524.
[5]RAJPUT U,ABBAS F,OH H.A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET[J].IEEE Access,2016,PP(99):7770-7784.
[6]DHAMGAYE A,CHAVHAN N.Survey on security challenges in VANET 1[J].International Journal of Computer Science & Network,2013,2(1):88-96.
[7]WANG F,XU Y,ZHANG H,et al.2FLIP:A two-factor lightweight privacy-preserving authentication scheme for VANET[J].IEEE Transactions on Vehicular Technology,2016,65(2):896-911.
[8]VIJAYAKUMAR P,AZEES M,DEBORAH L J.CPAV:Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks[C]// IEEE International Conference on Cyber Security & Cloud Computing.IEEE,2016.
[9]RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//Advances in Cryptology-ASIACRYPT.2001:552-565.
[10]PETZOLDT A,BULYGINS S,BUCHMANN J.A multivariate based threshold ring signature scheme[J].Applicable Algebra in Engineering,Communication and Computing,2013,24:255-275.
[11]RAJBZADEH A,MARYAM S,MAHMOUD S,et al.A short identity-based proxy ring signature scheme from RSA[J]. Computer Standards & Interfaces,2015,38:144-151.
[12]HAN Y,XUE N N,WANG B Y,et al.Improved Dual-ProtectedRing Signature for Security and Privacy of Vehicular Communications in Vehicular Ad-hoc Networks[J].IEEE Access,2018,6:9-20.
[13] LIU J,YU Y,JIA J,et al.Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular Ad-Hoc networks[J].Tsinghua Science and Technology,2019,24(5):575-584.
[14]SYFULLAH M,LIM M Y.Data broadcasting on Cloud-VA-NET for IEEE 802.11p and LTE hybrid VANET architectures[C]// International Conference on Computational Intelligence &Communication Technology.IEEE,2017:1-6.
[15]GREESHMA T P,ROSHINI T V.A Review on Privacy Preserving Authentication in VANETs[C]// 2018 International Conference on Control,Power,Communication and Computing Technologies (ICCPCCT).Kannur,2018:235-238.
[16]CAI Y,FAN Y,WEN D.An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks[J].IEEETran-sactions on Vehicular Technology,2015,65(1):266-277.
[17]XIONG H,BEZNOSOV F,QIN Z.Efficient and Spontaneous Privacy-preserving Protocol for Secure Vehicular Communication[C]//Proceedings of ICC 2010.Cape Town,South Africa,2010:1-6.
[18]SHAMIR A.Identity-based cryptosystems and signatureschemes[C]//Workshop on the Theory and Application of Cryptographic Techniques.Springer Berlin Heidelberg,1984:47-53.
[1] 钱心缘, 吴文渊.
基于R-SIS和R-LWE构建的IBE加密方案
Identity-based Encryption Scheme Based on R-SIS/R-LWE
计算机科学, 2021, 48(6): 315-323. https://doi.org/10.11896/jsjkx.200700215
[2] 黄德玲,严余松,彭大芹.
城市车辆自组织网络中基于预测的地理位置路由协议
Geographic Routing Protocol Based on Prediction for Urban Vehicular Ad Hoc Networks
计算机科学, 2019, 46(7): 74-80. https://doi.org/10.11896/j.issn.1002-137X.2019.07.011
[3] 陆杰,宋香梅,韩牟,周从华.
车载网中可抵制合谋攻击的批量认证方案
Batch Verification Scheme Defensing Collusive Attack in VANET
计算机科学, 2016, 43(6): 135-140. https://doi.org/10.11896/j.issn.1002-137X.2016.06.028
[4] 明洋,王育民,庞辽军.
标准模型下可证安全的多身份单密钥解密方案
Provably Secure Multi-identity Single-key Decryption Scheme in the Standard Model
计算机科学, 2010, 37(3): 73-75.
[5] .
一种改进的PETKS原型方案及其扩展

计算机科学, 2009, 36(3): 58-60.
[6] 刘振华,胡予濮,张襄松.
标准模型下选择密文安全的基于身份加密方案
Chosen Ciphertext Secure Identity-based Encryption in the Standard Model
计算机科学, 2009, 36(10): 64-67.
[7] 杨莉 张弘 李玉山.
一种快速自适应RSUSAN角点检测算法

计算机科学, 2004, 31(5): 198-200.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!