基于區塊鏈的車載命名數據網絡安全機制研究
發布時間:2020-12-03 08:13
命名數據網絡NDN通信模型中的“命名內容”和“內容自證實”機制使得它更適合于高速移動的車載自組織網絡,現有的車載命名數據網絡(V-NDN)方案能夠解決網絡遭受的某些傳統攻擊問題,但同時也引入了一些新的安全問題。網絡中任何惡意車輛節點通過觀察興趣分組和數據分組中的內容名稱來生成虛假的內容,并緩存于中間節點以備將來請求或發送虛假內容以誤導其他車輛。另外,洪泛網絡中不存在內容的請求會導致興趣洪泛攻擊,如與交通安全相關的虛假信息會造成交通事故等。因此,解決網絡中可能存在的惡意攻擊對車聯網安全至關重要。針對以上問題,本論文基于區塊鏈中信息具有不可篡改的特點,將網絡中與交通安全相關的通信作為“交易”信息并將其保存于區塊鏈中,這樣,可以對信息進行驗證和審計,提出了一種解決上述安全問題的BV-NDN方案。本論文主要研究工作如下:1.為了建立網絡,設計了基于橢圓曲線密碼系統ECC的認證機制以及網絡中實體參與的許可區塊鏈,其中區塊鏈管理器驗證要加入網絡中的節點的身份,并將其身份信息和其他密碼學材料保存在區塊鏈存儲庫下的防篡改存儲中。2.為了驗證網絡中的車輛通信信息,設計了用于交通數據共享的通信協議,且只有...
【文章來源】:蘭州理工大學甘肅省
【文章頁數】:84 頁
【學位級別】:碩士
【文章目錄】:
中文摘要
Abstract
1.Introduction
1.1 Research Background and Significance
1.2 Research status at home and abroad
1.2.1 VANET security and privacy Standardization
1.2.2 Security and Privacy Requirements in VANET
1.2.3 VANET Security and Privacy problem
1.2.4 Security and Privacy Challenges for NDN-based Vehicular Network (V-NDN)
1.2.5 Existing Security and Privacy related solution in NDN
1.3 Major study Motivation and Contributions
1.4 Thesis Outline
2.Related Theory and basic principles
2.1 An overview of Vehicular ad-hoc network(VANET)
2.2 Named Data Networking Overview
2.2.1 Background
2.2.2 System architecture and Communication model
2.2.3 NDN routing and forwarding
2.3 VANET via NDN implementation(V-NDN)
2.3.1 Overview
2.3.2 Implementation Design
2.3.3 NDN Advantages over VANET Networking
2.3.4 Vulnerabilities on Security and Privacy in V-NDN
2.4 Blockchain technology
2.4.1 Background
2.4.2 Blockchain Core Technology
2.4.3 Structure of a block
2.4.4 Classification of Blockchain systems
2.4.5 Practical Byzantine Fault Tolerate Algorithm(PBFT)
2.4.6 Blockchains Efforts in VANET
2.5 Brief Summary
3.V-NDN Blockchain System Design and Implementation
3.1 Introduction
3.2 Encryption and verification algorithms:Elliptic Curve Cryptosystem
3.3 System Model
3.3.1 Network Model
3.3.2 Threaten Model
3.3.3 Security Requirements:Design Goals
3.4 V-NDN Blockchain design
3.4.1 Network Set Up and Initialization Phase
3.4.2 Communication model for vehicles in BV-NDN
3.4.3 Requesting an Interest packet
3.4.4 Revocation of Malicious Vehicles
3.5 Brief Summary
4.V-NDN Blockchain System Performance Evaluation
4.1 Security and Theoretical Analysis
4.2 Simulation set up
4.2.1 Simulation configuration
4.2.2 simulation parameters
4.3 Performance Metrics
4.4 Performance Evaluation Results
4.5 Brief Summary
Conclusions and Future Works
References
Acknowledgement
本文編號:2896232
【文章來源】:蘭州理工大學甘肅省
【文章頁數】:84 頁
【學位級別】:碩士
【文章目錄】:
中文摘要
Abstract
1.Introduction
1.1 Research Background and Significance
1.2 Research status at home and abroad
1.2.1 VANET security and privacy Standardization
1.2.2 Security and Privacy Requirements in VANET
1.2.3 VANET Security and Privacy problem
1.2.4 Security and Privacy Challenges for NDN-based Vehicular Network (V-NDN)
1.2.5 Existing Security and Privacy related solution in NDN
1.3 Major study Motivation and Contributions
1.4 Thesis Outline
2.Related Theory and basic principles
2.1 An overview of Vehicular ad-hoc network(VANET)
2.2 Named Data Networking Overview
2.2.1 Background
2.2.2 System architecture and Communication model
2.2.3 NDN routing and forwarding
2.3 VANET via NDN implementation(V-NDN)
2.3.1 Overview
2.3.2 Implementation Design
2.3.3 NDN Advantages over VANET Networking
2.3.4 Vulnerabilities on Security and Privacy in V-NDN
2.4 Blockchain technology
2.4.1 Background
2.4.2 Blockchain Core Technology
2.4.3 Structure of a block
2.4.4 Classification of Blockchain systems
2.4.5 Practical Byzantine Fault Tolerate Algorithm(PBFT)
2.4.6 Blockchains Efforts in VANET
2.5 Brief Summary
3.V-NDN Blockchain System Design and Implementation
3.1 Introduction
3.2 Encryption and verification algorithms:Elliptic Curve Cryptosystem
3.3 System Model
3.3.1 Network Model
3.3.2 Threaten Model
3.3.3 Security Requirements:Design Goals
3.4 V-NDN Blockchain design
3.4.1 Network Set Up and Initialization Phase
3.4.2 Communication model for vehicles in BV-NDN
3.4.3 Requesting an Interest packet
3.4.4 Revocation of Malicious Vehicles
3.5 Brief Summary
4.V-NDN Blockchain System Performance Evaluation
4.1 Security and Theoretical Analysis
4.2 Simulation set up
4.2.1 Simulation configuration
4.2.2 simulation parameters
4.3 Performance Metrics
4.4 Performance Evaluation Results
4.5 Brief Summary
Conclusions and Future Works
References
Acknowledgement
本文編號:2896232
本文鏈接:http://www.malleg.cn/kejilunwen/daoluqiaoliang/2896232.html

