The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks
碩士 === 國立中山大學 === 資訊工程學系研究所 === 99 === In the VANET environment, the security of traffic information between vehicles is very important. The messages need to be real-time, and the complexity of authentication should be low. Our proposed method focus on the identity verification based on bilinear pai...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/66840826834725308680 |
id |
ndltd-TW-099NSYS5392027 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099NSYS53920272015-10-19T04:03:18Z http://ndltd.ncl.edu.tw/handle/66840826834725308680 The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks 利用IBC及Chameleon Hashing設計車輛網路認證機制 Liang-Chih Chen 陳亮志 碩士 國立中山大學 資訊工程學系研究所 99 In the VANET environment, the security of traffic information between vehicles is very important. The messages need to be real-time, and the complexity of authentication should be low. Our proposed method focus on the identity verification based on bilinear pairing, therefore, vehicles, roadside units (RSUs), central authorities (CAs) and trust authority (TA) can verify the identity of each other. After the identity authentication, RSUs will broadcast messages containing chameleon hashing values of verified vehicles, to the other RSUs and vehicles. In the future, vehicles can communicate with the verified vehicles, and verify the messages by these chameleon hashing values. The advantages of the propose method is mainly: 1. Based on the identity-based cryptography (i.e. IBC), the vehicles, RSUs, CAs and TA can verify the message each other. 2. The vehicles can verify the source and legitimacy of the public/private key. 3. The vehicles do not need to show any certificate to verify the identity, avoiding the certificate is exposed for a long time and causing attacks. 4. We can verify the messages through chameleon function and does not need to wait for RSU to verify, it would have good latency performance. 5. We don’t need to re-verify the identity and consult the common keys when the vehicles hand off within the different cover ranges of the RSUs. 6. Not only within the RSUs, our proposal but also can execute in somewhere without RSU. Finally, our proposal method can fulfill the authentication, data integrity, non-repudiation, condition-privacy and untraceable. Wen-Shyong Hsieh 謝文雄 2011 學位論文 ; thesis 47 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中山大學 === 資訊工程學系研究所 === 99 === In the VANET environment, the security of traffic information between vehicles is very important. The messages need to be real-time, and the complexity of authentication should be low. Our proposed method focus on the identity verification based on bilinear pairing, therefore, vehicles, roadside units (RSUs), central authorities (CAs) and trust authority (TA) can verify the identity of each other. After the identity authentication, RSUs will broadcast messages containing chameleon hashing values of verified vehicles, to the other RSUs and vehicles. In the future, vehicles can communicate with the verified vehicles, and verify the messages by these chameleon hashing values.
The advantages of the propose method is mainly: 1. Based on the identity-based cryptography (i.e. IBC), the vehicles, RSUs, CAs and TA can verify the message each other. 2. The vehicles can verify the source and legitimacy of the public/private key. 3. The vehicles do not need to show any certificate to verify the identity, avoiding the certificate is exposed for a long time and causing attacks. 4. We can verify the messages through chameleon function and does not need to wait for RSU to verify, it would have good latency performance. 5. We don’t need to re-verify the identity and consult the common keys when the vehicles hand off within the different cover ranges of the RSUs. 6. Not only within the RSUs, our proposal but also can execute in somewhere without RSU. Finally, our proposal method can fulfill the authentication, data integrity, non-repudiation, condition-privacy and untraceable.
|
author2 |
Wen-Shyong Hsieh |
author_facet |
Wen-Shyong Hsieh Liang-Chih Chen 陳亮志 |
author |
Liang-Chih Chen 陳亮志 |
spellingShingle |
Liang-Chih Chen 陳亮志 The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks |
author_sort |
Liang-Chih Chen |
title |
The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks |
title_short |
The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks |
title_full |
The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks |
title_fullStr |
The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks |
title_full_unstemmed |
The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks |
title_sort |
authentication scheme based on ibc and chameleon hashing for vehicular ad-hoc networks |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/66840826834725308680 |
work_keys_str_mv |
AT liangchihchen theauthenticationschemebasedonibcandchameleonhashingforvehicularadhocnetworks AT chénliàngzhì theauthenticationschemebasedonibcandchameleonhashingforvehicularadhocnetworks AT liangchihchen lìyòngibcjíchameleonhashingshèjìchēliàngwǎnglùrènzhèngjīzhì AT chénliàngzhì lìyòngibcjíchameleonhashingshèjìchēliàngwǎnglùrènzhèngjīzhì AT liangchihchen authenticationschemebasedonibcandchameleonhashingforvehicularadhocnetworks AT chénliàngzhì authenticationschemebasedonibcandchameleonhashingforvehicularadhocnetworks |
_version_ |
1718094077683040256 |