簡易檢索 / 詳目顯示

研究生: 林子鈞
Tzu-Chun Lin
論文名稱: 基於車輛身分的安全車對車群體通訊機制
Identity-based Secure V2V Group Communication Mechanism
指導教授: 羅乃維
Nai-Wei Lo
口試委員: 楊傳凱
Chuan-Kai Yang
黃政嘉
Jheng-Jia Huang
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2022
畢業學年度: 110
語文別: 英文
論文頁數: 35
中文關鍵詞: 車聯網廣播加密車載隨意行動網路群體通訊
外文關鍵詞: Internet of Vehicles, Broadcast Encryption, Vehicular Ad-Hoc Network, Group Communication
相關次數: 點閱:308下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著車載隨意行動網路從車用網路邁入車聯網時代,透過裝置間訊息交換而延伸出來的的應用也越來越多,例如透過車輛的位置與速度獲得交通流暢度資訊,或是緊急事故資訊發布等等,而乘載這些資訊的車聯網應用的安全通訊傳輸管道也因此越來越重要。車聯網環境時常仰賴於廣播通訊,如何在安全又有效率的狀況下進行廣播通訊,成為一個很重要的研究課題。

    在這篇論文中,我們主要使用基於身分的廣播加密,為車對車通訊打造保有隱私且安全又有效率的廣播通訊協定,透過群體通訊加密機制中,訊息發起者針對每一個廣播訊息只要加密一次,即可發送廣播訊息給群體,讓所有指定的接收者解密,以降低使用的運算與傳輸資源,提升效率。在提供輕量加密機制的同時,也能保有隱私、抵禦重送攻擊與偽造攻擊。我們也提出了透過路邊通訊單元發出群體重組訊號,在車流交會量最大的道路入口處進行重組,以達到最高的群體重組效率。最後,我們也提出了在不更換所有群組成員的公開金鑰下動態加入此群體的方式,避免行駛其間有新成員加入即須所有人都更換金鑰的效能浪費。


    As applications of the Vehicles communication transits from Vehicular Ad-hoc Network to Internet of Vehicles era, more and more vehicular and traffic applications arise: real-time traffic condition information, emergency accident information...and so forth. Thus, it is crucial to provide secure transmission channels for the data exchange of these IoV applications. IoV also utilizes broadcast communication primarily, especially for V2V communications. Providing fast and efficient broadcast communication has been a hot research topic.

    In this thesis, we constructed a secure and efficient broadcast communication scheme for V2V communications. The message sender only needs to encrypt the message once before broadcasting, and all the eligible receivers in the group can decrypt the message after receiving it, thus lowering the computation and transmission resources requirements. Besides the lightweight encryption mechanism, the scheme also preserves privacy and avoids reply and impersonation attacks. We also provide a way to establish the group and re-grouping in the road entrance of limited access roads through Road Side Units to provide the highest re-grouping efficiency. At last, the mechanism also comes with dynamic group member joining, that the joining of a new member does not require re-keying every other member's public key to avoid the need for resource consumption.

    RecommendationLetter ... i ApprovalLetter ... ii Abstract in Chinese ... iii Abstract in English ... iv Acknowledgements ... v Contents ... vi List of Figures ... viii List of Tables ... ix 1 Introduction ... 1 2 Preliminaries ... 4 2.1 BilinearMaps ... 4 2.2 Identity-Based Broadcast Encryption . . . 4 2.3 Public Key Encryption ... 5 3 RelatedWork ... 8 4 ProposedMechanism ... 11 4.1 RSUBeaconVerificationProtocol . . . 13 4.2 GroupEstablishmentPhase... 13 4.3 GroupKeySetupPhase... 15 4.4 EncryptionPhase ... 16 4.5 DecryptionPhase ... 17 4.6 VehicleLeavingGroup ... 17 4.7 DynamicGroupJoining... 18 5 SecurityAnalysis ... 20 6 Conclusions ... 22 References... 23

    [1] M. N. O. Sadiku, M. Tembely, and S. M. Musa, “Internet of vehicles: An introduction,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8, p. 11, February 2018.
    [2] A. Dua, N. Kumar, and S. Bawa, “A systematic review on routing protocols for vehicular ad hoc networks,” Vehicular Communications, vol. 1, pp. 33–52, January 2014.
    [3] S. Supriya and B. Bharathi, “Iov-a novel mechanism for initiating secure vehicle data transmission using pso with two phase authentication,” Journal of Ambient Intelligence and Humanized Computing, 2021.
    [4] J. Snoeyink, S. Suri, and G. Varghese, “A lower bound for multicast key distribution,” vol. 1, pp. 422– 431, IEEE, November 2002.
    [5] A. Mansour, K. M. Malik, A. Alkaff, and H. Kanaan, “Alms: Asymmetric lightweight centralized group key management protocol for vanets,” IEEE Transactions on Intelligent Transportation Sys- tems, vol. 22, pp. 1663–1678, March 2021.
    [6] M. Bilal and S. G. Kang, “A secure key agreement protocol for dynamic group,” Cluster Computing, vol. 20, pp. 2779–2792, September 2017.
    [7] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, pp. 39–68, 1 2007.
    [8] L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, “A scalable robust authentication protocol for secure vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 59, no. 4, pp. 1606–1617, 2010.
    [9] I. A. Kamil and S. O. Ogundoyin, “A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for lte-v-based internet of vehicles in smart cities,” Journal of Information Security and Applications, vol. 63, p. 102994, 2021.
    [10] K. Lim, K. M. Tuladhar, X. Wang, and W. Liu, “A scalable and secure key distribution scheme for group signature based authentication in vanet,” in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 478–483, 2017.
    [11] H. Tan, D. Choi, P. Kim, S. Pan, and I. Chung, “Secure certificateless authentication and road message dissemination protocol in vanets,” Wireless Communications and Mobile Computing, vol. 2018, 2018.
    [12] H. Zhong, S. Zhang, J. Cui, L. Wei, and L. Liu, “Broadcast encryption scheme for v2i communication in vanets,” IEEE Transactions on Vehicular Technology, 2021.
    [13] H. Aliev, H. Kim, and S. Choi, “A scalable and secure group key management method for secure v2v communication,” Sensors (Switzerland), vol. 20, pp. 1–31, November 2020.
    [14] A. Fiat and M. Naor, “Broadcast encryption,” in Advances in Cryptology — CRYPTO’ 93 (D. R. Stinson, ed.), (Berlin, Heidelberg), pp. 480–491, Springer Berlin Heidelberg, 1994.
    [15] D. Boneh and M. Franklin, “An efficient public key traitor tracing scheme,” in Advances in Cryptology — CRYPTO’ 99 (M. Wiener, ed.), (Berlin, Heidelberg), pp. 338–353, Springer Berlin Heidelberg, 1999.
    [16] D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,” in Advances in Cryptology – CRYPTO 2005 (V. Shoup, ed.), (Berlin, Heidelberg), pp. 258–275, Springer Berlin Heidelberg, 2005.
    [17] C. Delerablée, “Identity-based broadcast encryption with constant size ciphertexts and private keys,” in Advances in Cryptology – ASIACRYPT 2007 (K. Kurosawa, ed.), (Berlin, Heidelberg), pp. 200–215, Springer Berlin Heidelberg, 2007.

    QR CODE