高级检索

    面向自动驾驶的高效可追踪的车联网匿名通信方案

    An Efficient and Traceable Anonymous VANET Communication Scheme for Autonomous Driving

    • 摘要: 自动驾驶汽车是人工智能与车联网相结合的产物.近年来,因自动驾驶汽车能极大地解放双手、提高交通效率和安全使其得到了工业界和学术界的广泛关注.然而,指令消息及车辆身份的隐私泄露问题严重阻碍了自动驾驶汽车的应用落地.解决该问题的最直接的方法是扩展使用车联网中基于假名的通信方案.但是,大多数此类方案不仅对车辆造成了较大的存储负担,也无法完全保护车辆身份隐私不被泄露.为此,提出了一个面向自动驾驶的高效可追踪的车联网匿名通信方案.在该方案中,车辆由一个多辆车共享的属性集合表示.由于属性集与车辆之间的一对多的关系,车辆的匿名性能自然地得到实现.该方案还能实现指令消息的保密性以及对恶意车辆的追踪.该方案在属性基加密方案中融合了认证加密,设计出了一种签密方案.该签密方案作为底层技术用来支持提出的匿名通信方案.该签密方案相较于现存的属性基签密方案是高效的,更适用于自动驾驶场景.最后,通过形式化的安全性分析和性能评估证明该通信方案是安全且高效的.

       

      Abstract: Autonomous vehicles are the result of the combination of artificial intelligence and VANET. Because the autonomous vehicle can greatly free hands and improve traffic efficiency and safety, it has attracted wide attention of industry and researchers recently. While privacy issues such as instructions and vehicle identification have seriously hindered the application of autonomous car. The direct way to solve this problem is to expand the pseudonym-based communication schemes in VANET. However, most of these schemes not only impose a large storage burden on the vehicle but also fail to fully protect the identity privacy of the vehicle from being disclosed. In this paper, we propose an efficient and traceable anonymous VANET communication scheme for autonomous driving. In this scheme, a car is denoted by a set of attributes shared by multiple cars. Because of the one-to-many relationship between the attribute set and the vehicle, the anonymity of the vehicle is naturally realized. In addition, this scheme realizes the confidentiality of instructions and malicious vehicle tracking. In this paper, authentication encryption is integrated into attribute-based encryption scheme and a signcryption scheme is designed as the underlying technology to support the proposed anonymous communication scheme. Compared with the existing attribute-based signcryption schemes, this signcryption scheme is efficient and more suitable for automatic driving scenarios. Finally, the communication scheme is proved to be safe and efficient by formal security analysis and performance evaluation.

       

    /

    返回文章
    返回