Anonymous authentication scheme under vehicular ad hoc network based on biometric encryption technology

A vehicle-mounted self-organizing and anonymous authentication technology, applied in the field of information security, can solve the problem of difficult to find a balance between information exchange and privacy protection

Inactive Publication Date: 2013-01-30
DALIAN UNIV OF TECH
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The technical problem to be solved by the present invention is to solve the problem that it is difficult to find a balance point between information exchange and privacy protection in the authentication process under VANET, to overcome the shortcomings of group signature technology, random silence scheme and blind signature scheme, and to propose a bio-encryption-based anonymous Authentication scheme to hide the MAC address of entity users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous authentication scheme under vehicular ad hoc network based on biometric encryption technology
  • Anonymous authentication scheme under vehicular ad hoc network based on biometric encryption technology
  • Anonymous authentication scheme under vehicular ad hoc network based on biometric encryption technology

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0069] Example 1: Research on the Average Anonymity of Users

[0070] The purpose of the experiment: To study the average number of anonymous users in the system. The larger the average number of anonymous users, the stronger the system's anonymous security protection for users.

[0071] Experiment introduction: In this experiment, the average number of anonymous users refers to how many other users can be found by any user in the network as their own anonymous users at a certain point in time. That is, from the attacker's point of view, if two users negotiate the MAC address with the server at the same time when the distance is relatively close, then after the negotiation, since both of them have changed the MAC address, the attacker cannot obtain the MAC address from the data frame. The MAC address infers which user the current data packet is sent to.

[0072] The calculation method of the average anonymous number of users is as follows: the inventor assumes that the set of...

example 2

[0075] Example 2: Research on the probability of users being attacked

[0076] Purpose of the experiment: Although the method of hiding the MAC address can ensure that the attacker cannot infer the identity of the user from the content of the data packet. But the attacker can still analyze the source of the data packets based on the location of the user, and then deduce the real identity of the user. Therefore, the inventor studies the probability of success of an assailant performing a correlation attack in the system.

[0077] Experiment introduction: This experiment focuses on studying the attacker's attack success rate. In the previous analysis, the inventor learned that using the method of MAC hiding can make it impossible for an external attacker to correlate the user's MAC address before and after, thereby protecting the user's real identity. In this experiment, the inventor focuses on studying the situation that the attacker simply correlates the user identity from t...

example 3

[0080] Example 3: Research on the entropy of the system

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anonymous authentication scheme under a vehicular ad hoc network based on a biometric encryption technology, belonging to the technical field of information security, and particularly relating to a biometric encryption algorithm and an MAC (Media Access Control) address hiding technology. The anonymous authentication scheme is characterized in that the biometric encryption technology is used for organically combining a biological template of a user with a secret key to generate a biological ciphertext; the biological ciphertext hides biological characteristics and information of the secret key, and is used for representing a unique identity of one user; the generation of the biological ciphertext is unidirectional, and the biological information and the encrypted secret key are mutually independent; and a new MAC address is generated while the users negotiate a session key, thus the subsequent anonymous communication is realized. The anonymous authentication scheme has the advantages and the beneficial effects that the biometric encryption technology solves the problem of leakage of the biological template, the unidirectional generation of the ciphertext ensures that an attacker can not crack the biological information through the secret key; and the MAC address hiding technology can protect the real identifies of the users, thus the anonymous communication is realized, and the higher service quality is ensured by easily updated characteristics.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to an anonymous authentication method, in particular to a biological encryption method and a MAC address hiding method. Background technique [0002] Mobile ad-hoc network (Ad-hoc Network) is a multi-hop, centerless, self-organizing wireless network. The entire network has no fixed infrastructure, each node is mobile, and can temporarily and dynamically maintain contact with other nodes in a specific time and space. Vehicular Ad-hoc Network (VANET) is a unified wireless communication network formed by mutual communication between vehicles and between vehicles and roadside nodes. VANET is the application of mobile ad hoc network on the road, it has the characteristics of the network: autonomy, dynamic network topology, limited network capacity and limited physical security. Its special applications, such as narrow roads, high-density node distribution, and high-speed move...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0823H04L63/0861H04W4/46H04W12/00H04W12/02H04W12/06
Inventor 姚琳林驰吴国伟邓方昱
Owner DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products