计算机科学 ›› 2020, Vol. 47 ›› Issue (5): 301-305.doi: 10.11896/jsjkx.190400119
张浩, 蔡英, 夏红科
ZHANG Hao, CAI Ying, XIA Hong-ke
摘要: 车辆自组织网络(Vehicular Ad-hoc Network,VANET)使交通系统更加智能和高效。信道的开放性以及车辆移动的高速性等特点,导致VANET存在诸如身份、传输数据以及位置等隐私信息泄露问题。目前,针对VANET的身份隐私泄露问题,越来越多的学者采用基于环签名的方案,但是车辆如何在行驶过程中与周围车辆组成签名环一直是一个难解决的问题。针对基础设施部署较完善地区,文中提出一种基于RSU(Road-Side Unit)辅助签名环形成的方案。该方案通过RSU收集覆盖区域内车辆的公钥并广播公钥集,从而确定区域内车辆的签名环,并利用双线性对映射实现RSU与车辆间消息传输的基于身份加密的过程。安全分析和实验证明,所提方案在基础设施较完善地区能够拥有较好的效率和安全性。
中图分类号:
[1]ZEADALLY S,HUNT R,CHEN Y S,et al.Vehicular ad hoc networks (VANETS):status,results,and challenges[J].Telecommunication Systems,2012,50(4):217-241. [2]TOOR Y,MUHLETHALER P,LAOUITI A,et al.Vehicle Ad Hoc networks:applications and related technical issues[J].IEEE Communications Surveys & Tutorials,2008,10(3):74-88. [3]HE D,ZEADALLY S,XU B,et al.An Efficient Identity-based Conditional Privacy-preserving Authentication Scheme For Vehicular Ad-hoc Networks[J].IEEE Transactions on Information Forensics and Security,2015,10(12):2681-2691. [4]CHIM T,YIU S,HUI L,et al.VSPN:VANET-based Secure and Privacy-preserving Navigation[J].IEEE Transactions on Computers,2014,63(2):510-524. [5]RAJPUT U,ABBAS F,OH H.A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET[J].IEEE Access,2016,PP(99):7770-7784. [6]DHAMGAYE A,CHAVHAN N.Survey on security challenges in VANET 1[J].International Journal of Computer Science & Network,2013,2(1):88-96. [7]WANG F,XU Y,ZHANG H,et al.2FLIP:A two-factor lightweight privacy-preserving authentication scheme for VANET[J].IEEE Transactions on Vehicular Technology,2016,65(2):896-911. [8]VIJAYAKUMAR P,AZEES M,DEBORAH L J.CPAV:Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks[C]// IEEE International Conference on Cyber Security & Cloud Computing.IEEE,2016. [9]RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//Advances in Cryptology-ASIACRYPT.2001:552-565. [10]PETZOLDT A,BULYGINS S,BUCHMANN J.A multivariate based threshold ring signature scheme[J].Applicable Algebra in Engineering,Communication and Computing,2013,24:255-275. [11]RAJBZADEH A,MARYAM S,MAHMOUD S,et al.A short identity-based proxy ring signature scheme from RSA[J]. Computer Standards & Interfaces,2015,38:144-151. [12]HAN Y,XUE N N,WANG B Y,et al.Improved Dual-ProtectedRing Signature for Security and Privacy of Vehicular Communications in Vehicular Ad-hoc Networks[J].IEEE Access,2018,6:9-20. [13] LIU J,YU Y,JIA J,et al.Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular Ad-Hoc networks[J].Tsinghua Science and Technology,2019,24(5):575-584. [14]SYFULLAH M,LIM M Y.Data broadcasting on Cloud-VA-NET for IEEE 802.11p and LTE hybrid VANET architectures[C]// International Conference on Computational Intelligence &Communication Technology.IEEE,2017:1-6. [15]GREESHMA T P,ROSHINI T V.A Review on Privacy Preserving Authentication in VANETs[C]// 2018 International Conference on Control,Power,Communication and Computing Technologies (ICCPCCT).Kannur,2018:235-238. [16]CAI Y,FAN Y,WEN D.An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks[J].IEEETran-sactions on Vehicular Technology,2015,65(1):266-277. [17]XIONG H,BEZNOSOV F,QIN Z.Efficient and Spontaneous Privacy-preserving Protocol for Secure Vehicular Communication[C]//Proceedings of ICC 2010.Cape Town,South Africa,2010:1-6. [18]SHAMIR A.Identity-based cryptosystems and signatureschemes[C]//Workshop on the Theory and Application of Cryptographic Techniques.Springer Berlin Heidelberg,1984:47-53. |
[1] | 钱心缘, 吴文渊. 基于R-SIS和R-LWE构建的IBE加密方案 Identity-based Encryption Scheme Based on R-SIS/R-LWE 计算机科学, 2021, 48(6): 315-323. https://doi.org/10.11896/jsjkx.200700215 |
[2] | 黄德玲,严余松,彭大芹. 城市车辆自组织网络中基于预测的地理位置路由协议 Geographic Routing Protocol Based on Prediction for Urban Vehicular Ad Hoc Networks 计算机科学, 2019, 46(7): 74-80. https://doi.org/10.11896/j.issn.1002-137X.2019.07.011 |
[3] | 陆杰,宋香梅,韩牟,周从华. 车载网中可抵制合谋攻击的批量认证方案 Batch Verification Scheme Defensing Collusive Attack in VANET 计算机科学, 2016, 43(6): 135-140. https://doi.org/10.11896/j.issn.1002-137X.2016.06.028 |
[4] | 明洋,王育民,庞辽军. 标准模型下可证安全的多身份单密钥解密方案 Provably Secure Multi-identity Single-key Decryption Scheme in the Standard Model 计算机科学, 2010, 37(3): 73-75. |
[5] | . 一种改进的PETKS原型方案及其扩展 计算机科学, 2009, 36(3): 58-60. |
[6] | 刘振华,胡予濮,张襄松. 标准模型下选择密文安全的基于身份加密方案 Chosen Ciphertext Secure Identity-based Encryption in the Standard Model 计算机科学, 2009, 36(10): 64-67. |
[7] | 杨莉 张弘 李玉山. 一种快速自适应RSUSAN角点检测算法 计算机科学, 2004, 31(5): 198-200. |
|