تعداد نشریات | 38 |
تعداد شمارهها | 1,251 |
تعداد مقالات | 9,066 |
تعداد مشاهده مقاله | 8,150,765 |
تعداد دریافت فایل اصل مقاله | 4,910,476 |
یک طرح بهبود یافته احراز اصالت، با حفظ گمنامی مشروط در شبکههای اقتضایی بین خودرویی | ||
پدافند الکترونیکی و سایبری | ||
مقاله 1، دوره 3، شماره 2، مرداد 1394، صفحه 1-12 اصل مقاله (1011.1 K) | ||
نویسندگان | ||
سید مرتضی پورنقی* 1؛ مصطفی برمشوری2؛ محمود گردشی3 | ||
1دانشجوی دکترا، دانشگاه قم، قم، ایران | ||
2کارشناسی ارشد، دانشکده علوم کامپیوتر، دانشگاه تهران، تهران، ایران | ||
3استادیار، دانشگاه جامع امام حسین(ع)، تهران، ایران | ||
تاریخ دریافت: 16 آذر 1393، تاریخ بازنگری: 31 خرداد 1402، تاریخ پذیرش: 28 شهریور 1397 | ||
چکیده | ||
شبکههای اقتضایی بین خودرویی (VANET) میتوانند در ارتباط میان وسایل نقلیه و مدیریت ترافیک بهبود مناسبی ایجاد کنند. احراز اصالت پیامهای منتشر شده توسط خودروها، از مهمترین مسائل پیشرو در شبکههای VANET میباشد، زیرا ارسال پیامهای اشتباه میتواند باعث بروز تصادفات و تغییر الگوی ترافیکی شبکه گردد. طرحهای بسیار زیادی برای احراز اصالت در شبکههای VANET ارائه شدهاند که هر کدام دارای مزایا و معایبی میباشند، اما معرفی یک طرح احراز اصالت امن و کارآمد در شبکههای VANET از مسائل باز تحقیقاتی بوده و مهمترین چالش در این شبکهها به شمار میآید. در این مقاله ابتدا به معرفی انواع روشهای احراز اصالت در شبکههای VANET میپردازیم و سپس طرح ارائه شده توسط لی و لای را مورد تجزیه و تحلیل قرار میدهیم و سه سناریوی حمله به این طرح را معرفی میکنیم که امکان جعل امضای کاربر را به مهاجم میدهد. در ادامه یک طرح بهبودیافته از طرح لی و لای را پیشنهاد میدهیم که دارای ملزومات امنیتی و کارآیی مناسبی میباشد سپس آن را شبیه سازی کرده و در پایان نتایج شبیهسازی طرح پیشنهادی خود را ارائه خواهیم کرد. | ||
کلیدواژهها | ||
شبکههای اقتضایی بین خودرویی (VANET)؛ احراز اصالت گمنام و مشروط؛ زوجسازی دو خطی؛ شناسه مستعار | ||
عنوان مقاله [English] | ||
An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs | ||
نویسندگان [English] | ||
Seyed Mortaza Pour Naghi1؛ Mostafa Barmashoori2؛ Mahmoud Ghardeshi3 | ||
1PhD student, Qom University, Qom, Iran | ||
2Master's degree, Faculty of Computer Science, University of Tehran, Tehran, Iran | ||
3Assistant Professor, Imam Hossein University, Tehran, Iran | ||
چکیده [English] | ||
Vehicular Ad-hoc Networks (VANETs) can improve the communication between vehicles and traffic management to control appropriate. Authentication of messages which is issued by each vehicle is the most important problem in VANETs, because the wrong messages can cause crashes and change the traffic patterns of network. Many authentication schemes have been proposed in VANETs, each of which has advantages and disadvantages. In this paper first we introduce, a brief overview of these schemes. Then we analyse an authentication scheme for VANETs which introduced by Lee and Lai and introduce three scenarios that show their scheme is vulnerable to forgery attack. These attacks motivated us to design a novel and secure TPD based authentication scheme satisfying all security requirements in VANETs. Moreover, we introduce a simulation and comparison expressing the efficiency and performance of the proposed scheme. | ||
کلیدواژهها [English] | ||
VANET, conditional privacy preserving authentication, bilinear pairing, pseudo dentity | ||
مراجع | ||
[1] D .Antolino Rivas, et al., “Security on VANETs: Privacy misbehaving nodes false information and secure data aggregation,” Journal of Network and Computer Applications, vol. 34, no. 6, pp. 1942-1955, 2011. [2] A. Menezes, “An introduction to pairing-based cryptography,” 1991. Online: http://www. math.uwaterloo.ca /ajmeneze/publications/pairings. Pdf (retrieved: January 2012). [3] D. Hankerson, V. Scott, and J. M. Alfred, “Guide to elliptic curve cryptography,” Springer, 2004. [4] I. Blake, et al., “ Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series), Cambridge University Press, 2005. [5] H. Xiong, et al., “Anonymous Authentication Protocols for Vehicular Ad Hoc Networks: An Overview,” Applied Cryptography and Network Security, 2012. [6] A. Wasef, Y. Jian, and X. Shen, “An Efficient Distributed Certificate Service Scheme for Vehicular Networks,” IEEE Transaction on Vehicular Technology, vol. 59, no. 2 , P. 553, 2010. [7] R. Lu, et al., “ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications,” INFOCOM 2008. The 27th Conference on Computer Communications IEEE, 2008. [8] D. Boneh, B. Lynn, and H. Shacham, “short signature from the weil pairing,” In proceedings of Asiacrypt, p. 2248, pp. 514-532, 2001. [9] X. Sun, L. Xiaodong, and H. Pin-Han, “Secure vehicular communications based on group signature and ID-based signature scheme,” Communications, 2007, ICC'07, IEEE International Conference on, IEEE, 2007. [10] H. Xiong, Z. Qin, and F. Li, “Identity-based Ring Signature Scheme based on quadratic residues,” High Technology Letters, vol. 15, no. 1, pp. 94-100, 2011. [11] H. Xiong, C. Zhong, and L. Fagen, “Efficient and multi-level privacy-preserving communication protocol for VANET,” Computers & Electrical Engineering vol. 38, no. 3, pp. 573-581, 2012. [12] C. Zhang, et al., “RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks,” Communications, 2008. ICC'08, IEEE International Conference on, IEEE, 2008. [13] C. Zhang, H. Pin-Han, and T. Janos, “On batch verification with group testing for vehicular communications,” Wireless Networks, vol. 17, no. 8, pp. 1851-1865, 2011. [14] Lee, Cheng-Chi, and L. Yan-Ming, “Toward a secure batch verification with group testing for VANET,” Wireless Networks, pp. 1-9, 2013. [15] H. Haj Salem, J. Chrisoulakis, M. Papageorgiou, N. Elloumi, and P. Papadakos, “The use of METACOR tool for integrated urban and interurban trac control,” Evaluation in corridor peripherique, Paris, Vehicle Navigation and Information Systems Conference, Proceedings, pp. 645-650, 1994. [16] K. Nagel and A. Schleicher, “Microscopic traffic modeling on parallel high performance computers,” Parallel Computing, vol. 20, no. 1, pp. 125-146, 1994. [17] S. Krau, “Microscopic modeling of trac Investigation of collision free vehicle dynamics,” Ph. D. thesis, Universitat zu Koln, 1998. [18] M. Treiber, A. Hennecke, and D. Helbing, “Congested trac states in empirical observations and microscopic simulations,” Phys. Rev. E 62, 2000. 18051824.doi:10.1103/PhysRevE.62.1805. Figure 9: Box chart of simulation time. [19] F. Bai, N. Sadagopan, and A. Helmy, “The fimportantg framework for analyzing the Impact of Mobility on Performance Of Routing protocols for Adhoc Networks,” Ad Hoc Networks vol. 1, pp. 383-403, 2003. Doi: 10.1016/S1570-8705(03)00040-4. [20] N. Aschenbruck, et al., “Bonnmotion: a mobility scenario generation and analysis tool,” Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, ICST (Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), 2010. [21] A. K. Saha and B. J. David, "Modeling mobility for vehicular ad-hoc networks,” Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, ACM, 2004. [22] R. Mangharam, et al., “GrooveSim: a topography-accurate simulator for geographic routing in vehicular networks,” Proceedings of the 2nd ACMinternational workshop on Vehicular ad hoc networks, ACM, 2005. [23] M. Feeley, H. Norman, and R. Suprio, “ealistic mobility for mobile ad hoc network simulation,” Ad-Hoc, Mobile, and Wireless Networks, Springer Berlin Heidelberg, pp. 324-329, 2004. [24] A. Mahajan, et al., “Evaluation of mobility models for vehicular ad-hoc network simulations,” IEEE International Workshop on Next Generation Wireless Networks (WoNGeN), 2006. [25] Zimmermann, Hans-Martin, G. Ingo, and R. Christian, “A voronoi-based mobility model for urban environments,” Wireless Conference 2005-Next Generation Wireless and Mobile Communications and Services (European Wireless), 11th European, VDE, 2005. [26] J. Miller and E. Horowitz, “A free real-time freeway trac simulator,” in: Intelligent Transportation Systems Conference, ITSC2007. IEEE, pp.18-23, 2007. [27] J. Härri, et al., “Vanet Mobi Sim: generating realistic mobility patterns for VANETs,” Proceedings of the 3rd international workshop on Vehicular ad hoc networks, ACM, 2006. [28] Krajzewicz, Daniel, and R. Christian, “Simulation of urban mobility (SUMO),” Centre for Applied Informatics (ZAIK) and the Institute of Transport Research at the German Aerospace Centre, 2007. [29] Karnadi, K. Feliz, H. M. Zhi, and L. Kun-chan “Rapid generation of realistic mobility models for VANET,” Wireless Communications and Networking Conference, WCNC 2007, IEEE, 2007. [30] K. Fall and K. Varadhan, Ns Notes and Documents 2011. URL:http://www.isi.edu/nsnam/ns/ns-documentation.html.IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006) (2013) | ||
آمار تعداد مشاهده مقاله: 623 تعداد دریافت فایل اصل مقاله: 266 |