Title page for etd-0020114-171247


[Back to Results | New Search]

URN etd-0020114-171247
Author Kai-hsun Fan
Author's Email Address No Public.
Statistics This thesis had been viewed 5350 times. Download 16 times.
Department Computer Science and Engineering
Year 2013
Semester 1
Degree Master
Type of Document
Language English
Title The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device
Date of Defense 2014-01-17
Page Count 54
Keyword
  • Message Authentication
  • VANETs
  • Elliptic Curve Cryptosystem
  • Key Agreement
  • Chameleon Hashing
  • Abstract Studies were conducted on vehicular ad-hoc network (VANET) in recent years. VANET is a network that combines on-board wireless equipment and roadside fixed wireless equipment through wireless communication technology. In this environment, each vehicle can broadcast messages to other vehicles and inform drivers to change the correct route in order to enhance the efficiency of driving and to avoid accidents. Since vehicles communicate through wireless tunnel, many malicious attacks may occur during the transmission of messages. Therefore, ensuring the correctness of receiving messages and verifying the authenticity of the sender is necessary. Besides, we also need to protect the real identities of vehicles from revealing to guarantee the privacy. When vehicles broadcast messages, we usually use RSU to do message authentication that we can ensure messages integrity and broadcast messages by legitimate vehicles, rather than by the attacker’s malicious forgery.
        Vehicle’s identity verification and message authentication can be done through the help of RSU. According to cover range of RSU has limit, most of RSUs will be set on street lights or traffic lights which can provide electric power and network.In this paper, we propose the mechanism based on chameleon hashing and HMAC to do identity verification and message authentication under the environment without RSU.
        In our system, the secret value is retained by TA and TA will use its own secret values to calculate the chameleon hash value and pre-load the hash value and secret values to vehicles. The other vehicles can also verify the chameleon hash value to authenticate the security source. Besides, unlike methods of traditional anonymous authentication, we also combine chameleon hashing with Diffie-Hellman technologies to enhance performance for private communication. The method of our proposed is more think about how to combine theoretical and reality that not only overcome problems of related literature, but also meet the required safety of VANET.
    Advisory Committee
  • I-Chang Chou - chair
  • Lung-Jen Wang - co-chair
  • Wei-Kuang Lai - co-chair
  • Wen-Shyong Hsieh - advisor
  • Files
  • etd-0020114-171247.pdf
  • Indicate in-campus at 5 year and off-campus access at 5 year.
    Date of Submission 2014-01-20

    [Back to Results | New Search]


    Browse | Search All Available ETDs

    If you have more questions or technical problems, please contact eThesys