Toward a RSU-unavailable lightweight certificateless key agreement scheme for VANET

来源 :第八届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:chenmojay
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Vehicle ad-hoc network have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of lots of previous research works on security of vehicle-to-infrastructure communications,but in which there lacks considerations on how to secure vehicle-to-vehicle communications,particularly when infrastructure is unavailable.It is noted that those existing certificates verification schemes between vehicles,owing to the absence of participation from infrastructure,will be invalid or infeasible in the latter scenario.In this paper,we focus on secure vehicle-to-vehicle communications in no available infrastructure circumstance.Thus we propose a lightweight certificateless key agreement scheme without pairing to achieve mutual authentication between vehicles.In order to reduce the computation cost without mitigating security and to resist known attacks from vicious nodes,we simplify the certificateless key agreement processes to one round,and further prove the security of proposed scheme in the random oracle model.In terms of the simulation and analyses of computation cost and security overload,the proposed scheme is efficient and effective to lightweight security authentication services,especially for higher levels security requirements and without unavailable infrastructure in vehicle ad-hoc network.
其他文献
The security policy can exactlv reflect the security expectations of svstem models Besides.it is also an important method of remote attestation of computing environment.which is based on model behavio
Privacy-preserving data publication problem has attracted more and more attention in recent years.A lot of related research works have been done towards dataset with single sensitive attribute.However
会议
The lightweight mask scheme is a new tendency of the mask countermeasures.With this scheme,we propose several profiled and non-profiled power analyses against the RSM and RSM-Like schemes in the DPA C
In this paper,we propose a novel audio watermarking scheme which can recover the original audio carrier perfectly if the watermarked audio is modified.Besides,we can adjust the maximum tampered rate a
能量分析攻击实施的依据是密码设备的能量消耗依赖于设备所执行的密码算法的中间值。因此,如果试图抵御这种攻击,就要降低甚至消除这种依赖性。布尔掩码技术为目前最为流行的防御措施。针对带循环S盒掩码的AES密码芯片,提出了一种新的相关性功耗攻击方法.该方法首先利用方差分析找出明文盲化和S盒计算的时间点,然后通过比较盲化后的字节的汉明重量和实际测量功耗值的相关系数恢复掩码,最后针对S盒输入和输出的汉明距离进
Dependability analysis is an important step in designing and analyzing safety computer systems and protection systems.Introducing multi-processor and virtual machine increases the system faults comple
In the harsh environment where node density is sparse.the slow-moving nodes cannot effectivelv utilize the encountering opportunities to realize the self-organized identity authentications.and do not
访问控制策略是网络安全防范和保护的主要策略,其任务是保证网络资源不被非法使用和非法访问。针对静态职责策略与可用策略并存时由于互斥的安全与可用需求可能引发访问控制策略不一致性冲突问题,提出了一种优化的冲突消解方法.该方法基于静态裁剪减少所需考虑的策略数量;通过计算最小冲突覆盖集合以降低问题求解的规模;度量删除每一个静态职责分离策略和可用策略所引发的安全性与可用性损失,并以此评估各个冲突消解方案的优先
The weight hierarchy of a linear [n,k;q] code C over Fq is the sequence (d1,d2,…dk ),where dris the smallest support weight of a r-dimensional subcode of C.In this paper,by using the finite projective
JPEG-Compatibility steganalysis detects the presence of secret message embedded in the JPEG decompressed images and estimates the embedding rate.We propose a JPEG-Compatibility steganalysis algorithm