计算机科学 ›› 2019, Vol. 46 ›› Issue (4): 177-182.doi: 10.11896/j.issn.1002-137X.2019.04.028
王青龙, 乔瑞, 段宗涛
WANG Qing-long, QIAO Rui, DUAN Zong-tao
摘要: 为了实现车联网中车辆身份的隐私保护,近年来人们提出了很多不同的匿名认证方案。Vijayakumar等于2018年提出了针对车联网的计算有效的隐私保留匿名交互认证(CPAV)及批量认证(ABV)方案,该方案可以实现车辆与RSU之间的匿名互认证以及RSU对车辆的匿名批量认证,能够抵抗假冒攻击、伪造攻击以及关联攻击,并且在必要时TA(Trusted Agency)能够追踪出已注册车辆的真实身份。文中对CPAV和ABV方案的安全性进行了深入分析,在CPAV方案中外部攻击者完全能够成功实施假冒攻击和伪造攻击,进而证明该方案不满足不可否认性,也不能实现对车辆的条件追踪。另外,因为该方案中使用的匿名身份是唯一的,导致该方案不能抵抗关联攻击,这表明该方案也不具有所谓的不可连接性。此外,还证明了批量认证方案也不能抵抗伪造攻击。
中图分类号:
[1]AZIMI R,BHATIA G,RAJKUMAR R,et al.Vehicular networks for collision avoidance at intersections[C]∥SAE world congress & exhibition.Carnegie Mellon University:Priyantha Mudalige,2011:406-416. [2]TANGADE S S,MANVI S S.A survey on attacks,security and trust management solutions in VANETs[C]∥4th IEEE International Conference on Computing,Communications nad Networking Technologies.Tiruchengode:IEEE Computer Society,2013:105-112. [3]JIANG S R,ZHU X Y,WANG L M.An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs.IEEE Transactions on Intelligent Transportation Systems,2016,17(8):2193-2205. [4]AI-SULTAN S M,AI-DOORI M H,AI-BAYATTI A,et al.A comprehensive survey on vehicular ad hoc network. Journal of Network and Computer Applications,2014,37(1):380-392. [5]QU F Z,WU Z H,WANG F Y,et al.A security and privacy review of VANETs.IEEE Transactions on Intelligent Transportation Systems,2015,16(6):2985-2996. [6]ZENG S K,HUANG Y,LIU X W.Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature[J].International Journal of Network Security,2015,9(12):135-141. [7]JIANG Y C,JI Y,LIU T H.An Anonymous Communication Scheme based on Ring Signature in VANETs[OL].https://arxiv.org/pdf/1410.1639.pdf. [8]LIN X,SUN X,HO P H,et al.GSIS:A secure and privacy pre- serving protocol for vehicular communications[J].IEEE Tran-sactions on Vehicular Technology,2007,56(6):3442-3456. [9]ZHANG L,WU Q,SOLANS A,et al.A scalable robust authentication protocol for secure vehicular communications[J].IEEE Transactions On Vehicular Technology,2009,59(4):1606-1617. [10]ZHANG C X,LU R X,LIN X D,et al.An efficient identity based batch verification scheme for vehicular sensor networks[C]∥International Conference on Computer Communications-2008.Phoenix:IEEE Press,2008:816-824. [11]KILTZ E,PIETRZAK K.Leakage resilient elgamalencryption∥International Conference on the Theory and Application of Cryptology and Information Security.Springer:Computer Science,2010:595-612. [12]ZHANG L,WU Q H,QIN B,et al.APPA:Aggregate privacy-preserving authentication in vehicular ad hoc networks∥International Conference on Information Security.Springer:Computer Science,2011:293-308. [13]ZHANG L,WU Q H,DOMINGO-FERRER J,et al.Distributed Aggregate Privacy-Preserving Authentication in VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(3):516-526. [14]ZHU X Y,JIANG S R,WANG L G,et al.Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks[J].IEEE Transactions on Vehicular Technology,2014,63(2):907-918. [15]JIANG S R,ZHU X Y,WANG L M.An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2016,17(8):2193-2204. [16]LO N W,TSAI J L.An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings[J].IEEE Transactions on Intelligent Transportation Systems,2016,17(5):1319-1328. [17]LU R,LIN X,ZHU H,et al.ECPP:Efficient conditional privacy-preservation protocol for secure vehicular communications[C]∥IEEE Conference on Computer Communications INFOCOM 2008.Phoenix:IEEE Press,2008:1229-1237. [18]MARA M,HUBAUX J P.Securing vehicular ad hoc networks[J].Journal of Computer Security,2007,15(1):39-68. [19]STUDER A,SHI E,BAI F,et al.Tacking together Efficient Authentication,Revocation,and Privacy in VANETs[C]∥Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor,Mesh,and Ad Hoc Communications and Networks (SECON 2009).Rome:IEEE Press,2009:22-26. [20]VIJAYAKUMAR P,CHANG V,JEGATHA DEBORAH L,et al.Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks[J].Future Generation Computer System,2018,78(3):943-995. |
[1] | 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩. 基于分层抽样优化的面向异构客户端的联邦学习 Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients 计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263 |
[2] | 汤凌韬, 王迪, 张鲁飞, 刘盛云. 基于安全多方计算和差分隐私的联邦学习方案 Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy 计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108 |
[3] | 吕由, 吴文渊. 隐私保护线性回归方案与应用 Privacy-preserving Linear Regression Scheme and Its Application 计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190 |
[4] | 陈晶, 吴玲玲. 多源异构环境下的车联网大数据混合属性特征检测方法 Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment 计算机科学, 2022, 49(8): 108-112. https://doi.org/10.11896/jsjkx.220300273 |
[5] | 王健. 基于隐私保护的反向传播神经网络学习算法 Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving 计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155 |
[6] | 李利, 何欣, 韩志杰. 群智感知的隐私保护研究综述 Review of Privacy-preserving Mechanisms in Crowdsensing 计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077 |
[7] | 宋涛, 李秀华, 李辉, 文俊浩, 熊庆宇, 陈杰. 大数据时代下车联网安全加密认证技术研究综述 Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era 计算机科学, 2022, 49(4): 340-353. https://doi.org/10.11896/jsjkx.210400112 |
[8] | 王美珊, 姚兰, 高福祥, 徐军灿. 面向医疗集值数据的差分隐私保护技术研究 Study on Differential Privacy Protection for Medical Set-Valued Data 计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032 |
[9] | 张振超, 刘亚丽, 殷新春. 适用于物联网环境的无证书广义签密方案 New Certificateless Generalized Signcryption Scheme for Internet of Things Environment 计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256 |
[10] | 吕由, 吴文渊. 基于同态加密的线性系统求解方案 Linear System Solving Scheme Based on Homomorphic Encryption 计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124 |
[11] | 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉. 基于差分隐私的K-means算法优化研究综述 Review of K-means Algorithm Optimization Based on Differential Privacy 计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008 |
[12] | 张海波, 张益峰, 刘开健. 基于NOMA-MEC的车联网任务卸载、迁移与缓存策略 Task Offloading,Migration and Caching Strategy in Internet of Vehicles Based on NOMA-MEC 计算机科学, 2022, 49(2): 304-311. https://doi.org/10.11896/jsjkx.210100157 |
[13] | 金华, 朱靖宇, 王昌达. 视频隐私保护技术综述 Review on Video Privacy Protection 计算机科学, 2022, 49(1): 306-313. https://doi.org/10.11896/jsjkx.201200047 |
[14] | 雷羽潇, 段玉聪. 面向跨模态隐私保护的AI治理法律技术化框架 AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection 计算机科学, 2021, 48(9): 9-20. https://doi.org/10.11896/jsjkx.201000011 |
[15] | 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞. 基于用户偏好和位置分布的假位置生成方法 Dummy Location Generation Method Based on User Preference and Location Distribution 计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069 |
|