论文部分内容阅读
基于隐私保护的车联网身份认证系统面临各种攻击的威胁,其中最普遍的一种攻击就是Sybil攻击。现有的Sybil攻击检测方案中,大都需要路边基础设施的协助来检测Sybil攻击,车辆无法独立检测Sybil攻击。同时,使用撤销列表来防止恶意车辆再次攻击,给基于群签名的方案带来了较大的额外计算开销。为了解决以上问题,本文提出一种基于证书的身份认证方案,车辆从区域服务器完成注册后获取证书,实现车辆身份匿名认证,并能够独立检测Sybil攻击。恶意车辆身份撤销由区域服务器完成,避免使用撤销列表,使得车辆省去查找撤销列表的开销。
Privacy-based car networking authentication systems face a variety of attacks, the most common of which is Sybil. Most of the existing Sybil attack detection solutions require assistance from the roadside infrastructure to detect Sybil attacks and vehicles can not independently detect Sybil attacks. At the same time, the use of revocation lists to prevent malicious vehicles from re-attack poses significant additional computational overhead for group signature based schemes. In order to solve the above problems, this paper presents a certificate-based identity authentication scheme. Vehicles acquire the certificate from the regional server after completing the registration, realize the vehicle identity anonymous authentication, and can independently detect Sybil attacks. Malicious vehicle identity revocation done by the regional server to avoid the use of revocation list, eliminating the need for vehicles to find the revocation list overhead.