Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (2): 41-54.doi: 10.11959/j.issn.2096-109x.2016.00029
• Comprehensive Reviews • Previous Articles Next Articles
Liang-min WANG1,3,Ting-ting LI1,Long CHEN2
Revised:
2016-02-01
Online:
2016-02-15
Published:
2020-03-26
Supported by:
CLC Number:
Liang-min WANG,Ting-ting LI,Long CHEN. Security issues and system structure of internet of vehicles[J]. Chinese Journal of Network and Information Security, 2016, 2(2): 41-54.
"
检测依据 | 方法 | 主要手段 | 优点 | 主要缺点 |
邻居关系 | Grover[ | 车辆邻居节点集合对比车辆邻居节点信号强度变化 | 分布式;不需RSU协助分布式;不需RSU协助 | 恶意节点不会忠实汇报邻居节点集合恶意车辆可能拥有多个OBU |
位置信息 | Yan[ | 车载雷达探测对方位置第三方车辆验证位置 | 分布式;不需RSU协助分布式;车辆自主检测 | 硬件成本高RSU确定第三方车辆 |
路径信息 | Chen[ | 利用RSU等为参照物,对比车辆路径 | 集中式;可全局检测 | RSU绝对可信;RSU负载增加;泄露车辆位置隐私 |
假名唯一 | Studer[ | 车辆一次只有一个假名TA执行假名对比 | 集中式;保护隐私 | 车辆更新/验证假名时,需要请求TA和RSU |
"
方法属性特点 | ||||||||||||
位置隐私保护方法 | 保护内容 | 预防攻击 | 隐私性能水平比较 | |||||||||
车辆身份 | 通信内容 | 轨迹 | 被动 | 主动 | 匿名性 | 无关联性 | 不可跟踪 | 顽健性 | ||||
特殊地形[ | √ | × | √ | √ | / | √ | 中 | 中 | 低 | |||
安静时段[ | √ | × | √ | √ | / | √ | 中 | 中 | 低 | |||
Mix-zone | 加密Mix-zone[ | √ | √ | √ | √ | / | √ | 中 | 低 | 低 | ||
通信代理[ | √ | √ | √ | √ | / | √ | 高 | 中 | 中 | |||
NF05方案[ | √ | √ | × | / | / | √ | 高 | 低 | 低 | |||
GSIS协议[ | √ | √ | × | √ | √ | √ | 高 | 低 | 中 | |||
ECPP协议[ | √ | √ | × | √ | √ | √ | 高 | 低 | 中 | |||
环签名[ | √ | √ | × | / | / | √ | 高 | 低 | 低 | |||
路径混淆[ | √ | × | √ | √ | / | √ | 中 | 低 | 中 | |||
随机加密[ | √ | √ | √ | √ | / | √ | 高 | 中 | 中 | |||
混合方案[ | √ | √ | √ | √ | / | √ | 高 | 高 | 中 |
[1] | ANIS L , AMIR Q , SAAD M NAUFAL M . Vehicular Ad-hoc networks for smart cities[M]. Berlin:Springer, 2015. |
[2] | YANG F , WANG S , LI J , et al. An overview of internet of vehi-cles China Communications, 2014,11(10): 1. |
[3] | HUANG H , XIAO S , MENG X . Application of RFID and SNMP technology in highway electronic toll collection system[C]// The 3rd IEEE International Conference on Computer Science and In-formation Technology (ICCSIT). c2010:383-385. |
[4] | AGARWAL A , GOEL N . GPS-RDS enabled location based smart transit[C]// The 13th International Conference on Intelligence in Next Generation Networks, c20091-5. |
[5] | LEE K H . The multiple impacts of the neighbourhood environment on the use of public bicycles by residents:an empirical study of Changwon in Korea[J]. International Journal of Urban Sciences, 2015,19:1-14. |
[6] | 2015年8月黑客大会:演示远程入侵汽车[EB/OL]. (2015-05-04). . |
Hackers conference in August 2015:demonstrate the remote inva-sion of cars[EB/OL]. (2015-05-04). . | |
[7] | 通用 Onstar(通用安吉星)服务系统[EB/OL]. (2016-02-09). . |
GM onstar service system[EB/OL]. (2016-02-09). . | |
[8] | 王良民, 茅冬梅, 梁军 . 基于 RFID 系统的隐私保护技术[J]. 江苏大学学报, 2012,33(6):690-695. |
WANG L M , MAO D M , LIANG J . Privacy preservation technology based on RFID[J]. Journal of Jiangsu University, 2012,33(6):690-695. | |
[9] | CHENG Y , DUAN L , ZHANG Q . Routing in internet of vehicles:a review[J]. IEEE Transactions on Intelligent Transportation Systems, 2015,16(5):1-14. |
[10] | REITE J L , ROBERTSON C , WADHERA N . Call center integrated printing device consumable cabinet device service:US8788373[p]. 2014-07-22. |
[11] | 陈实武 . 海关物流监控系统的电子关锁设计[D]. 武汉理工大学, 2006. |
CHEN S W . Electronic lock design of the customs logistics[D]. Wuhan University of Technology, 2006. | |
[12] | CHEN Y , DUAN L , ZHANG Q . Financial analysis of 4G network deployment[C]// IEEE Conference on Computer Communications (INFOCOM). c2015. |
[7] | VONG C M , WONG P K , WONG K I , et al. Inspection and control of vehicle emissions through internet of things and traffic lights[C]// International Conference on Connected Vehicles and Expo (IC-CVE). c2013:863-868. |
[12] | ABBOUD K , ZHUANG W . Impact of microscopic vehicle mobil-ity on cluster-based routing overhead in VANET[J]. IEEE Transac-tions on Vehicular Technology, 2015,64(12):1. |
ZHOU M . Intelligent monitoring system based on the multi- net-work integration[C]// International Conference on Intelligent Transportation,Big Data and Smart City (ICITBS), c2015. | |
[16] | LI X , WANG L . A rapid certification protocol from bilinear pair-ings for vehicular Ad hoc networks[C]// The 11th IEEE Interna-tional Conference on Trust,Security and Privacy in Computing and Communications,IEEE Computer Society, c2012:890-895. |
[17] | 王良民, 李晓君, 仲红 . VANET 中一种可撤销的车辆群组批认证方法[J]. 中国科学:信息科学, 2013(10):1307-1325. |
WANG L M , LI X J , ZHONG H . A revocable certification of vehi-cle group in VANET[J]. SCIENTIA SINICA Inforfmation, 2013(10):1307-1325. | |
[18] | CHEN L , JIA X , MENG L , et al. Expedite privacy-preserving emergency communication scheme for VANET[J]. International Journal of Distributed Sensor Networks,2013, 2013(1):59-72. |
[19] | DAIMI K , SAED M , BONE S . Mobile phones as computing devices:the viruses are coming[J]. Lecture Notes in Engineering &Computer Science, 2014,2211(1). |
[20] | KUMAR P V , MAHESHWARI M . Prevention of Sybil attack and priority batch verification in VANET[C]// International Conference on Information Communication and Embedded Systems (ICICES). c2014:1-5. |
[21] | 王良民 . 主动反应与自再生的容忍入侵关键技术研究[D]. 西安电子科技大学 2006. |
WANG L M . Study on key technology of active reaction and self-reproducing tolerance[D]. Xidian University, 2006. | |
[22] | 王良民, 姜顺荣, 郭渊博 . 物联网中移动 Sensor 节点漫游的组合安全认证协议[J]. 中国科学:信息科学, 2012(07):815-830. |
WANG L M , JIANG S R , GUO Y B . The secure authentication pro-tocol of mobile sensornodes combination in IoT[J]. SCIENTIA SINICA Inforfmation, 2012(7):815-830. | |
谢晴晴, 仲红, 王良民 , 等. 一种基于云平台的车联网RSU数据查询验证方法:CN201410648782.X[p]. 2016-02-18. | |
XIE Q Q , ZHONG H , WANG L M , et al. The secure authentication pro-tocol of mobile sensornodes combination in IoT[J]. SCIENTIA SINICA Inforfmation, 2012(7):815-830. | |
[24] | IEEE.1609.2-2013 - IEEE standard for wireless access in vehicular environments security services for applications and management messages[J]. IEEE, 2013:1-289. |
[25] | Secure vehicular communication project[EB/OL]. . |
[26] | CAR 2 CAR communication consortium[EB/OL]. . |
NOW-network on wheels project[EB/OL]. . | |
[28] | Privacy enabled capability in cooperative systems and safety appli-cations project[EB/OL]. . |
[29] | WASEF A , SHEN X . EMAP:expedite message authentication protocol for vehicular Ad hoc networks[J]. IEEE Transactions on Mobile Computing, 2013,12(1):78-89. |
[30] | RABIEH K , MAHMOUD M M E A , GUO T N , et al. Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs[C]// Journal of Artificial Intelligence Research, 2011,41(2): 297-327. |
[31] | RAYA M , AZIZ A , HUBAUX J P . Efficient secure aggregation in VANET[C]//International Workshop on Vehicular Ad hoc Networks. c2006:67-75 |
[32] | CHIM T W , YIU S M , HUI L C K , et al. SPECS:secure and pri-vacy enhancing communications schemes for VANET[J]. Ad hoc Networks, 2011,9(2):189-203. |
[33] | WASEF A , SHEN X . EMAP:expedite message authentication protocol for vehicular Ad hoc networks[J]. IEEE Transaction on Mobile Computing, 2013,12(1):78-89. |
[34] | 李晋国, 林亚平, 李睿 , 等. 车载自组织网络中基于椭圆曲线零知识证明的匿名安全认证机制[J]. 通信学报, 2013(5):52-61. |
LI J G , LIN Y P , LI R , et al. Automotive self-organizing networks based on the elliptic curve zero knowledge proof in the anonymous security authentication mechanism[J]. Journal on Communications, 2013(5):52-61. | |
[35] | ZHANG C , LU R , LIN X , et al. An efficient identity-based batch verification scheme for vehicular sensor networks[C]//IEEE IN-FOCOM. c2008:246-250. |
[36] | LU R , LIN X , ZHU H , et al. ECPP:efficient conditional privacy preservation protocol for secure vehicular communications[C]//IEEE INFOCOM. c2008:1229-1237. |
[37] | YANG J H , CHANG C C . An ID-based remote mutual authentica-tion with key agreement scheme for mobile devices on elliptic curve cryptosystem[J]. Computer & Security, 2009,28(3/4):138-143. |
[38] | 刘唐, 汪小芬, 肖国镇 . 基于无证书公钥的安全V2I通信协议[J]. 计算机科学, 2012,39(9):20-23. |
LIU T , WANG X F , XIAO G Z . Communication protocol of secu-rity V2I based on certificate less public key encryption[J]. Computer Science, 2012,39(9):20-23. | |
[39] | HUANG J L , YEH LY , CHIEN H Y . ABAKA:an anonymous batch authenticated and key agreement scheme for value-added services in vehicular Ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2011,60(1):248-262. |
[40] | SHIM K A . CPAS:an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks[J]. IEEE Transactions on Vehicular Technology, 2012,61(4):1874-1883. |
[41] | LIU Y , WANG L , CHEN H . Message authentication using proxy vehicles in vehicular Ad hoc networks[J]. Vehicular Technology IEEE Transactions on, 2015,64(8):3697-3710. |
[42] | SUN Y , LU R , LIN X , et al. An efficient pseudonymous authentica-tion scheme with strong privacy preservation for vehicular commu-nications[J]. IEEE Transactions on Vehicular Technology, 2010,59(7):3589-3603. |
[43] | ZHU X , JIANG S , WANG L , et al. Efficient privacy-preserving authentication for vehicular Ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2014,63(2):907-919. |
[44] | 王良民, 刘晓龙, 陈龙 , 等. 一种面向 5G 车联网的可多网接入OBU系统:CN201521014778.4[P]. 2015-12-09. |
WANG L M , LIU X L , CHEN L , et al. A multi-access network OBU system oriented 5G IoV:CN201521014778.4[P]. 2015-12-09. | |
[45] | GROVER J , GAUR M S , LAXMI V , et al. A sybil attack detection approach using neighboring vehicles in VANET[C]//The 4th Inter-national Conference on Security of Information and Networks. c2011:151-158. |
[46] | ABBAS S , MERABTI M , LLEWELLYN-JONES D . Lightweight sybil attack detection in MANET[J]. IEEE Systems Journal, 2013,7(2):236-248. |
[47] | YAN G , BISTA B B , RAWAT D B , et al. General active position detectors protect VANET security[C]//International Conference on Broadband and Wireless Computing,Communication and Applica-tions (BWCCA). c2011:11-17. |
[48] | YU B , XU C Z , XIAO B . Detecting sybil attacks in VANETs[J]. Journal of Parallel and Distributed Computing, 2013,73(6):746-756. |
[49] | CHEN C , WANG X , HAN W L , et al. A robust detection of the sybil attack in urban VANETs[C]//The 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS Workshops '09). c2009:270-276. |
[50] | PARK S , ASLAM B , TURGUT D , et al. Defense against sybil attack in vehicular Ad hoc network based on roadside unit sup-port[C]// Military Communications Conference (MILCOM 2009). c2009:1-7. |
[51] | GROVER J , GAUR M S , LAXMI V . A novel defense mechanism against sybil attacks in VANET[C]//The 3rd International Confer-ence on Security of Information and Networks. c2010:249-255. |
[52] | CHANG S , QI Y , ZHU H , et al. Footprint:detecting sybil attacks in urban vehicular networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(6):1103-1114. |
[53] | STUDER A , SHI E , BAI F , et al. TACKing together efficient au-thentication,revocation,and privacy in VANET[C]//The 6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad hoc Communications and Networks (SECON'09). c2009:1-9. |
[54] | ZHOU T , CHOUDHURY R R , NING P , et al. P2DAP-sybil attacks detection in vehicular Ad hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2011,29(3):582-594. |
[55] | XIA F , CHUN Y L , CHEN D X , et al. A method for defensing against multi-source Sybil attacks in VANET[J]. Peer-to-Peer Net-working and Applications, 2016,29(1):1-10. |
[56] | 张建明, 赵玉娟, 江浩斌 , 等. 车辆自组网的位置隐私保护技术研究[J]. 通信学报, 2012,33(8):180-189 |
ZHANG J M , ZHAO Y J , JIANG H B , et al. Study on location pri-vacy protection technology of VANET[J]. Journal on Communica-tions, 2012,33(8):180-189. | |
[57] | BUTTYáN L , HOLCZER T , VAJDA I . On the effectiveness of changing pseudonyms to provide location privacy in VANET[C]//Conference on ESAS. c2007:129-141. |
[58] | BUTTYáN L , HOLCZER T , WEIMERSKIRCH A , et al. Slow:a practical pseudonym changing scheme for location privacy in VANET[C]//IEEE Vehicular Networking Conference (VNC). c2009:1-8. |
[59] | FREUDIGER J , RAYA M , FLEGYHZI M , et al. Mix-zone for location privacy in vehicular networks[C]// The 1st International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS’07). c2007:1-7. |
[60] | SCHEUER F , FUCHS K P , FEDERRATH H . A safety-preserving mix zone for VANET[C]//The 8th International Conference on Trust,Privacy and Security in Digital Business. c2011:37-48. |
[61] | ZHANG J , MA L , SU W , et al. Privacy-preserving authentication based on short group signature in vehicular networks[C]// Confer-ence on ISDPE. c2007:138-142. |
[62] | LIN X , SUN X , HO P H , et al. GSIS:a secure and privacy- pre-serving protocol for vehicular communications[J]. IEEE Transac-tions Vehicular Technology, 2007,56(6):3442-3456. |
[63] | LU R , LIN X , ZHU H , et al. ECPP:efficient conditional privacy preservation protocol for secure vehicular communications[C]//Conference on IEEE INFOCOM. c2008:1229-1237. |
[64] | CHAURASIA B K , VERMA S . Conditional privacy through ring signature in vehicular Ad-hoc networks[M]. In Transactions on Computational Science XIII,Berlin:Springer, 2011:147-156. |
[65] | HOH B , GRUTESER M , XIONG H , et al. Preserving privacy in GPS traces via uncertainty-aware path cloaking[C]// The 14th ACM Conference on Computer and Communications Security. c2007:161-171. |
[66] | WASEF A , SHEN X . REP:location privacy for VANETs using random encryption periods[J]. Mobile Networks and Applications, 2010,15(1):172-185. |
[67] | SAMPIGETHAYA K , LI M , HUANG L , et al. Amoeba:robust location privacy scheme for VANET[J]. IEEE Journal on Selected Areas in Communications, 2007,25(8):1569-1589. |
[68] | LIU J , AU M , SUSILO W , et al. Linkable ring signature with un-conditional anonymity[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(1):157-165. |
[69] | LIN X , LI X . Achieving efficient cooperative message authentica-tion in vehicular Ad-hoc networks[J]. IEEE Transactions on Ve-hicular Technology, 2013,62(7):3339-3348. |
[70] | HORNG S J , TZENG S F , PAN Y , et al. B-SPECS+:batch verifica-tion for secure pseudonymous authentication in VANET[J]. IEEE Transactions on Information Forensics and Security, 2013,8(11):1860-1875. |
[71] | LEE B K , JEONG E H , JUNG I . A DTSA (detection technique against a Sybil attack) protocol using SKC (session key based cer-tificate) on VANET[J]. International Journal of Security and Its Ap-plications, 2013,7(3):1-10. |
[72] | FRANCESCO M , CHIASSERINI C F , CASETTI C , et al. A-VIP:anonymous verification and inference of positions in vehicular net-works[C]// IEEE INFOCOM Mini Conference. c2013:105-109. |
[73] | TIMPNER J , SCHüRMANN D , WOLF L . Secure smart phone-based registration and key deployment for vehicle-to-cloud com-munications[C]// The 2013 ACM workshop on Security,privacy &dependability for cyber vehicles. c2013:31-36. |
[74] | SHIVALDOVA V , SEPULCRE M , WINKELBAUER A , et al. A model for vehicle-to-infrastructure communications in urban envir-onments[C]// IEEE International Conference on Communication Workshop (ICCW). c2015:2387-2392. |
[75] | PHAN-HUY D , STERNAD M , SVENSSON T . Making 5G adap-tive antennas work for very fast moving vehicles[J]. Intelligent Transportation Systems Magazine, 2015,7(2):71-84. |
[76] | ZHENG X , CHEN W , WANG P . Big data for social transporta-tion[J]. IEEE Transactions on Intelligent Transportation Systems, 2015,99:1-11. |
[77] | QIAO J , SHEN X M , MARK J , et al. Enabling device-to-device communications in millimeter-wave 5G cellular networks[J]. IEEE Communications Magazine, 2015,53(1):209-215. |
[78] | MUMTAZ S , SAIDULHUP K M , ASHRAF M L , et al. Cognitive vehicular communication for 5G[J]. IEEE Communications Maga-zine, 2015,53(7):109-117. |
[79] | ZHU F , GAO F , ZHANG T , et al. Physical-layer security for full duplex communications with self-interference mitigation[J]. IEEE Transactions on Wireless Communications, 2015:1. |
[80] | MUKHERJEE A , FAKOORIAN SA , HUANG J , et al. Principles of physical layer security in multiuser wireless networks:a sur-vey[J]. IEEE Communication Surveys and Tutorials, 2014,16(3):1550-1573. |
[1] | Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO. Anonymous trust management scheme of VANET based on attribute signature [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 33-45. |
[2] | Cong YI, Jun HU. Novel continuous identity authentication method based on mouse behavior [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 179-188. |
[3] | Jie YI, Tengfei CAO, Shuai GAO, Jianqiang HUANG. Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 157-167. |
[4] | Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU. Hierarchical proxy consensus optimization for IoV based on blockchain and trust value [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153. |
[5] | Guanqun YANG, Yin LIU, Hao XU, Hongwei XING, Jianhui ZHANG, Entang LI. Credible distributed identity authentication system of microgrid based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 88-98. |
[6] | Xieli ZHANG, Yuefei ZHU, Chunxiang GU, Xi CHEN. Security protocol code analysis method combining model learning and symbolic execution [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 93-104. |
[7] | Yueyang YE, Xinglan ZHANG. Research on anonymous identity authentication technology in Fabric [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 134-140. |
[8] | Hao WANG,Tianhao WU,Konglin ZHU,Lin ZHANG. Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 27-35. |
[9] | Tangwei1 XU,Hailu ZHANG,Chuhuan LIU,Liang XIAO,Zhenmin ZHU. Reinforcement learning based group key agreement scheme with reduced latency for VANET [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 119-125. |
[10] | Yingying CHEN,Feng ZHANG,Wenbao JIANG,Xu ZHOU. P2P network identity authentication mechanism based on trusted alliance [J]. Chinese Journal of Network and Information Security, 2020, 6(2): 77-86. |
[11] | Ziwen ZHAO,Ayong YE,Junlin JIN,Lingyu MENG. Trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation [J]. Chinese Journal of Network and Information Security, 2019, 5(4): 52-62. |
[12] | Shudi CHEN,Youwen ZHU. Shoulder-surfing resistant PIN-entry method [J]. Chinese Journal of Network and Information Security, 2019, 5(1): 87-93. |
[13] | Qiuhan WU,Wei HU. Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain [J]. Chinese Journal of Network and Information Security, 2018, 4(9): 60-65. |
[14] | Chunyan LI,Jia ZHAO,Jiqiang LIU,Qiang ZHANG,Lei HAN. Blockchain-based taffic condition early-warning scheme for VANET [J]. Chinese Journal of Network and Information Security, 2018, 4(7): 39-47. |
[15] | Tian-han GAO,Yan-qiang LI. Survey on anonymous authentication mechanisms of VANET [J]. Chinese Journal of Network and Information Security, 2016, 2(8): 10-16. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|