The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks

碩士 === 國立中山大學 === 資訊工程學系研究所 === 99 === In the VANET environment, the security of traffic information between vehicles is very important. The messages need to be real-time, and the complexity of authentication should be low. Our proposed method focus on the identity verification based on bilinear pai...

Full description

Bibliographic Details
Main Authors: Liang-Chih Chen, 陳亮志
Other Authors: Wen-Shyong Hsieh
Format: Others
Language:en_US
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/66840826834725308680
id ndltd-TW-099NSYS5392027
record_format oai_dc
spelling ndltd-TW-099NSYS53920272015-10-19T04:03:18Z http://ndltd.ncl.edu.tw/handle/66840826834725308680 The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks 利用IBC及Chameleon Hashing設計車輛網路認證機制 Liang-Chih Chen 陳亮志 碩士 國立中山大學 資訊工程學系研究所 99 In the VANET environment, the security of traffic information between vehicles is very important. The messages need to be real-time, and the complexity of authentication should be low. Our proposed method focus on the identity verification based on bilinear pairing, therefore, vehicles, roadside units (RSUs), central authorities (CAs) and trust authority (TA) can verify the identity of each other. After the identity authentication, RSUs will broadcast messages containing chameleon hashing values of verified vehicles, to the other RSUs and vehicles. In the future, vehicles can communicate with the verified vehicles, and verify the messages by these chameleon hashing values. The advantages of the propose method is mainly: 1. Based on the identity-based cryptography (i.e. IBC), the vehicles, RSUs, CAs and TA can verify the message each other. 2. The vehicles can verify the source and legitimacy of the public/private key. 3. The vehicles do not need to show any certificate to verify the identity, avoiding the certificate is exposed for a long time and causing attacks. 4. We can verify the messages through chameleon function and does not need to wait for RSU to verify, it would have good latency performance. 5. We don’t need to re-verify the identity and consult the common keys when the vehicles hand off within the different cover ranges of the RSUs. 6. Not only within the RSUs, our proposal but also can execute in somewhere without RSU. Finally, our proposal method can fulfill the authentication, data integrity, non-repudiation, condition-privacy and untraceable. Wen-Shyong Hsieh 謝文雄 2011 學位論文 ; thesis 47 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立中山大學 === 資訊工程學系研究所 === 99 === In the VANET environment, the security of traffic information between vehicles is very important. The messages need to be real-time, and the complexity of authentication should be low. Our proposed method focus on the identity verification based on bilinear pairing, therefore, vehicles, roadside units (RSUs), central authorities (CAs) and trust authority (TA) can verify the identity of each other. After the identity authentication, RSUs will broadcast messages containing chameleon hashing values of verified vehicles, to the other RSUs and vehicles. In the future, vehicles can communicate with the verified vehicles, and verify the messages by these chameleon hashing values. The advantages of the propose method is mainly: 1. Based on the identity-based cryptography (i.e. IBC), the vehicles, RSUs, CAs and TA can verify the message each other. 2. The vehicles can verify the source and legitimacy of the public/private key. 3. The vehicles do not need to show any certificate to verify the identity, avoiding the certificate is exposed for a long time and causing attacks. 4. We can verify the messages through chameleon function and does not need to wait for RSU to verify, it would have good latency performance. 5. We don’t need to re-verify the identity and consult the common keys when the vehicles hand off within the different cover ranges of the RSUs. 6. Not only within the RSUs, our proposal but also can execute in somewhere without RSU. Finally, our proposal method can fulfill the authentication, data integrity, non-repudiation, condition-privacy and untraceable.
author2 Wen-Shyong Hsieh
author_facet Wen-Shyong Hsieh
Liang-Chih Chen
陳亮志
author Liang-Chih Chen
陳亮志
spellingShingle Liang-Chih Chen
陳亮志
The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks
author_sort Liang-Chih Chen
title The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks
title_short The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks
title_full The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks
title_fullStr The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks
title_full_unstemmed The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks
title_sort authentication scheme based on ibc and chameleon hashing for vehicular ad-hoc networks
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/66840826834725308680
work_keys_str_mv AT liangchihchen theauthenticationschemebasedonibcandchameleonhashingforvehicularadhocnetworks
AT chénliàngzhì theauthenticationschemebasedonibcandchameleonhashingforvehicularadhocnetworks
AT liangchihchen lìyòngibcjíchameleonhashingshèjìchēliàngwǎnglùrènzhèngjīzhì
AT chénliàngzhì lìyòngibcjíchameleonhashingshèjìchēliàngwǎnglùrènzhèngjīzhì
AT liangchihchen authenticationschemebasedonibcandchameleonhashingforvehicularadhocnetworks
AT chénliàngzhì authenticationschemebasedonibcandchameleonhashingforvehicularadhocnetworks
_version_ 1718094077683040256