检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:侯琬钰 孙钰 李大伟 崔剑 关振宇 刘建伟 Hou Wanyu;Sun Yu;Li Dawei;Cui Jian;Guan Zhenyu;Liu Jianwei(School of Cyber Science and Technology,Beihang University,Beijing 100191;Key Laboratory of Ministry of Industry and Information Technology for Cyberspace Security(Beihang University),Beijing 100191)
机构地区:[1]北京航空航天大学网络空间安全学院,北京100191 [2]空天网络安全工业和信息化部重点实验室(北京航空航天大学),北京100191
出 处:《计算机研究与发展》2021年第10期2265-2277,共13页Journal of Computer Research and Development
基 金:国家自然科学基金项目(32071775,62002006)。
摘 要:针对目前5G车联网中车辆之间(vehicle-to-vehicle,V2V)通信的认证与密钥协商方案算法复杂、时延高的问题,提出一种基于物理不可克隆函数(physical unclonable function,PUF)的5G车联网V2V匿名认证与密钥协商协议.协议通过引入轻量级PUF避免了V2V认证中的数字签名操作,并精简通信步骤,成功减轻车辆的计算和通信开销.协议还借助PUF实现了车辆的车载单元(on board unit,OBU)和5G SIM卡的绑定,解决了身份假冒问题.同时,通过构建身份索引表,实现监管部门通过5G服务网(serving work,SN)对车辆的伪身份溯源,满足条件匿名性要求.使用形式化工具AVISPA验证了协议在Dolve-Yao模型下的安全性,并在计算开销、通信开销、安全性方面优于已有的车联网匿名通信协议,可为5G车联网的V2V通信提供基本安全保障.In order to solve complex algorithm and high time delay for vehicle-to-vehicle(V2V)communication in 5G vehicle-to-everything(V2X),an anonymous V2V authentication and key agreement protocol based on physical unclonable function(PUF)is proposed.By using lightweight PUF,vehicles can avoid digital signature,key storage and certificate escrow to reduce the overhead of calculation and storage.At the same time,our protocol only needs one-way communication between two vehicles and 5G service network(SN)and one handshake communication between two vehicles to complete V2V authentication and key agreement scheme,which can greatly reduce the communication overhead and time delay.What's more,PUF binds the on board unit(OBU)of vehicle to the 5G SIM card,which can resist identity forgery attacks.Through the construction of identity index table,the regulatory authority can track the source of vehicles'pseudo identities through 5G SN,which satisfies conditional anonymity.The security of the proposed protocol is proved in the Dolve-Yao model by AVISPA which is a formal analysis tool.Also,it is superior to the existing 5G V2X anonymous communication protocols in terms of computation overhead,communication overhead and security.Our protocol can provide essential security for V2V communication in 5G V2X.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.52