Title page for etd-0720111-175911


[Back to Results | New Search]

URN etd-0720111-175911
Author Liang-Chih Chen
Author's Email Address a19851108@gmail.com
Statistics This thesis had been viewed 5350 times. Download 8 times.
Department Computer Science and Engineering
Year 2010
Semester 2
Degree Master
Type of Document
Language English
Title The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks
Date of Defense 2011-07-07
Page Count 47
Keyword
  • Chameleon hashing function
  • VANET
  • Identity-based Cryptography
  • Message Authentication
  • Abstract In the VANET environment, the security of traffic information between vehicles is very important. The messages need to be real-time, and the complexity of authentication should be low. Our proposed method focus on the identity verification based on bilinear pairing, therefore, vehicles, roadside units (RSUs), central authorities (CAs) and trust authority (TA) can verify the identity of each other. After the identity authentication, RSUs will broadcast messages containing chameleon hashing values of verified vehicles, to the other RSUs and vehicles. In the future, vehicles can communicate with the verified vehicles, and verify the messages by these chameleon hashing values.
    The advantages of the propose method is mainly: 1. Based on the identity-based cryptography (i.e. IBC), the vehicles, RSUs, CAs and TA can verify the message each other. 2. The vehicles can verify the source and legitimacy of the public/private key. 3. The vehicles do not need to show any certificate to verify the identity, avoiding the certificate is exposed for a long time and causing attacks. 4. We can verify the messages through chameleon function and does not need to wait for RSU to verify, it would have good latency performance. 5. We don’t need to re-verify the identity and consult the common keys when the vehicles hand off within the different cover ranges of the RSUs. 6. Not only within the RSUs, our proposal but also can execute in somewhere without RSU. Finally, our proposal method can fulfill the authentication, data integrity, non-repudiation, condition-privacy and untraceable.
    Advisory Committee
  • Chung-Huang Yang - chair
  • Ming-Chao Chiang - co-chair
  • Lung-Jen Wang - co-chair
  • Wen-Shyong Hsieh - advisor
  • Files
  • etd-0720111-175911.pdf
  • indicate in-campus access in a year and off_campus not accessible
    Date of Submission 2011-07-20

    [Back to Results | New Search]


    Browse | Search All Available ETDs

    If you have more questions or technical problems, please contact eThesys