帳號:guest(          離開系統
字體大小: 字級放大   字級縮小   預設字形  


作者姓名(英文):Tzu-Chun Lin
論文名稱(外文):Identity-based Secure V2V Group Communication Mechanism
指導教授姓名(英文):Nai-Wei Lo
口試委員姓名(英文):Chuan-Kai Yang
Jheng-Jia Huang
外文關鍵詞:Internet of VehiclesBroadcast EncryptionVehicular Ad-Hoc NetworkGroup Communication
  • 推薦推薦:0
  • 點閱點閱:31
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏收藏:0

As applications of the Vehicles communication transits from Vehicular Ad-hoc Network to Internet of Vehicles era, more and more vehicular and traffic applications arise: real-time traffic condition information, emergency accident information...and so forth. Thus, it is crucial to provide secure transmission channels for the data exchange of these IoV applications. IoV also utilizes broadcast communication primarily, especially for V2V communications. Providing fast and efficient broadcast communication has been a hot research topic.

In this thesis, we constructed a secure and efficient broadcast communication scheme for V2V communications. The message sender only needs to encrypt the message once before broadcasting, and all the eligible receivers in the group can decrypt the message after receiving it, thus lowering the computation and transmission resources requirements. Besides the lightweight encryption mechanism, the scheme also preserves privacy and avoids reply and impersonation attacks. We also provide a way to establish the group and re-grouping in the road entrance of limited access roads through Road Side Units to provide the highest re-grouping efficiency. At last, the mechanism also comes with dynamic group member joining, that the joining of a new member does not require re-keying every other member's public key to avoid the need for resource consumption.
RecommendationLetter ... i
ApprovalLetter ... ii
Abstract in Chinese ... iii
Abstract in English ... iv
Acknowledgements ... v
Contents ... vi
List of Figures ... viii
List of Tables ... ix
1 Introduction ... 1
2 Preliminaries ... 4
2.1 BilinearMaps ... 4
2.2 Identity-Based Broadcast Encryption . . . 4
2.3 Public Key Encryption ... 5
3 RelatedWork ... 8
4 ProposedMechanism ... 11
4.1 RSUBeaconVerificationProtocol . . . 13
4.2 GroupEstablishmentPhase... 13
4.3 GroupKeySetupPhase... 15
4.4 EncryptionPhase ... 16
4.5 DecryptionPhase ... 17
4.6 VehicleLeavingGroup ... 17
4.7 DynamicGroupJoining... 18
5 SecurityAnalysis ... 20
6 Conclusions ... 22
References... 23
[1] M. N. O. Sadiku, M. Tembely, and S. M. Musa, “Internet of vehicles: An introduction,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8, p. 11, February 2018.
[2] A. Dua, N. Kumar, and S. Bawa, “A systematic review on routing protocols for vehicular ad hoc networks,” Vehicular Communications, vol. 1, pp. 33–52, January 2014.
[3] S. Supriya and B. Bharathi, “Iov-a novel mechanism for initiating secure vehicle data transmission using pso with two phase authentication,” Journal of Ambient Intelligence and Humanized Computing, 2021.
[4] J. Snoeyink, S. Suri, and G. Varghese, “A lower bound for multicast key distribution,” vol. 1, pp. 422– 431, IEEE, November 2002.
[5] A. Mansour, K. M. Malik, A. Alkaff, and H. Kanaan, “Alms: Asymmetric lightweight centralized group key management protocol for vanets,” IEEE Transactions on Intelligent Transportation Sys- tems, vol. 22, pp. 1663–1678, March 2021.
[6] M. Bilal and S. G. Kang, “A secure key agreement protocol for dynamic group,” Cluster Computing, vol. 20, pp. 2779–2792, September 2017.
[7] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, pp. 39–68, 1 2007.
[8] L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, “A scalable robust authentication protocol for secure vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 59, no. 4, pp. 1606–1617, 2010.
[9] I. A. Kamil and S. O. Ogundoyin, “A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for lte-v-based internet of vehicles in smart cities,” Journal of Information Security and Applications, vol. 63, p. 102994, 2021.
[10] K. Lim, K. M. Tuladhar, X. Wang, and W. Liu, “A scalable and secure key distribution scheme for group signature based authentication in vanet,” in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 478–483, 2017.
[11] H. Tan, D. Choi, P. Kim, S. Pan, and I. Chung, “Secure certificateless authentication and road message dissemination protocol in vanets,” Wireless Communications and Mobile Computing, vol. 2018, 2018.
[12] H. Zhong, S. Zhang, J. Cui, L. Wei, and L. Liu, “Broadcast encryption scheme for v2i communication in vanets,” IEEE Transactions on Vehicular Technology, 2021.
[13] H. Aliev, H. Kim, and S. Choi, “A scalable and secure group key management method for secure v2v communication,” Sensors (Switzerland), vol. 20, pp. 1–31, November 2020.
[14] A. Fiat and M. Naor, “Broadcast encryption,” in Advances in Cryptology — CRYPTO’ 93 (D. R. Stinson, ed.), (Berlin, Heidelberg), pp. 480–491, Springer Berlin Heidelberg, 1994.
[15] D. Boneh and M. Franklin, “An efficient public key traitor tracing scheme,” in Advances in Cryptology — CRYPTO’ 99 (M. Wiener, ed.), (Berlin, Heidelberg), pp. 338–353, Springer Berlin Heidelberg, 1999.
[16] D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,” in Advances in Cryptology – CRYPTO 2005 (V. Shoup, ed.), (Berlin, Heidelberg), pp. 258–275, Springer Berlin Heidelberg, 2005.
[17] C. Delerablée, “Identity-based broadcast encryption with constant size ciphertexts and private keys,” in Advances in Cryptology – ASIACRYPT 2007 (K. Kurosawa, ed.), (Berlin, Heidelberg), pp. 200–215, Springer Berlin Heidelberg, 2007.
全文檔公開日期:2024/02/08 (本校及校內區域網路)
全文檔公開日期:2024/02/08 (校外網際網路)
全文檔公開日期:2024/02/08 (國家圖書館:臺灣博碩士論文系統)
第一頁 上一頁 下一頁 最後一頁 top
* *