Authentication Mechanism and Trust Model for Internet of Vehicles Paradigm

被引:0
|
作者
Liu Y.-B. [1 ]
Song X.-L. [1 ]
Xiao Y.-G. [1 ]
机构
[1] Chongqing Key Laoratory of Network Information Security Technology, Chongqing University of Posts and Telecommunications, Chongqing
来源
| 1600年 / Beijing University of Posts and Telecommunications卷 / 40期
关键词
Authentication mechanism; Internet of vehicles; Multi-communication scenarios; Trust model;
D O I
10.13190/j.jbupt.2017.03.001
中图分类号
学科分类号
摘要
The internet of vehicles paradigm aims to achieve efficient management, decision-making and control of intelligent transportation through real-time perception among humans, vehicles, roadside units and trusted center. Currently, the authentication mechanism and trust model have become one of the research focus difficulties of internet of vehicles security. The main problem is that the authentication mechanism and trust model only consider one single aspect of security performance, which cannot satisfy the diversified security demands of multi-communication scenarios. In order to address this problem, the article proposes an authentication methodology and a trust model oriented to internet of vehicles multi-communication scenarios. The basic idea of research work involves three aspects. Firstly, the research status and achievements of the methodology and trust model under multi-communication scenarios was summarized. Secondly, the outline of new research directions was drawn, the intrinsic characters of authentication was studied, the authentication mechanism as well as the theoretical framework based on gradient security demands was constructed, and the related protocols to achieve diversified authentication services for different scenarios from the view of security, timeliness and privacy was designed. Thirdly, message-based and behavior-based dynamic trust model was given to provide strong real-time and high accurate trust evaluation, which can offer technical support for malicious nodes detecting, Finally, the internet of vehicles paradigm is likely to run in the quantum communication environment in the future, the threshold quantum anonymous authentication and the research direction of quantum trust evolution decision mechanism. The authors also evaluate the security for related research techniques and look ahead the future development. © 2017, Editorial Department of Journal of Beijing University of Posts and Telecommunications. All right reserved.
引用
收藏
页码:1 / 18
页数:17
相关论文
共 50 条
  • [1] Peng H., An identity-based authentication model for multi-domain, Chinese Journal of Computers, 29, 8, pp. 1271-1281, (2006)
  • [2] Li J., Liu Z., Yang F., Internet of vehicles: the framework and key technology, Journal of Beijing University of Posts and Telecommunications, 37, 6, pp. 95-100, (2014)
  • [3] Suresh J.S., Jongkun L., A TPM-based architecture to secure VANET, Indian Journal of Science and Technology, 8, 15, pp. 215-234, (2015)
  • [4] Sumra I.A., Hasbullah H.B., Bin J.L., Et al., Comparative study of security hardware modules (EDR, TPD and TPM) in VANET, 3th National Information Technology Symposium, pp. 6-9, (2011)
  • [5] He D., Sherali Z., Xu B., Et al., An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks, IEEE Transactions on Information Forensics and Security, 10, 12, pp. 2681-2691, (2015)
  • [6] Zhu H., Pan W., Liu B., Et al., A lightweight anonymous authentication scheme for VANET based on bilinear pairing, 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 222-228, (2012)
  • [7] Chuang M.C., Lee J.F., TEAM: trust-extended authentication mechanism for vehicular ad hoc networks, International Conference on Consumer Electronics, Communications and Networks, pp. 1758-1761, (2011)
  • [8] Li Q., Feng D., Zhang L., Enhanced attribute-based authenticated key agreement protocol in the standard model, Chinese Journal of Computers, 36, 10, pp. 2156-2167, (2013)
  • [9] Goyal V., Pandey O., Sahai A., Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89-98, (2006)
  • [10] Waters B., Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, Public Key Cryptography-PKC 2011, pp. 53-70, (2011)