车载自组织网络安全认证体系与信任模型研究-通信与信息系统专业论文.docxVIP

  • 7
  • 0
  • 约5.94万字
  • 约 70页
  • 2018-11-28 发布于上海
  • 举报

车载自组织网络安全认证体系与信任模型研究-通信与信息系统专业论文.docx

车载自组织网络安全认证体系与信任模型研究-通信与信息系统专业论文

上海交通大学工学硕士学位论文车载自组织网络安全认证体系与信任模型研究 上海交通大学工学硕士学位论文 车载自组织网络安全认证体系与信任模型研究 上海交通大学工学硕士学位论文车载自组织网络安全认证体系与信任模型研究 上海交通大学工学硕士学位论文 车载自组织网络安全认证体系与信任模型研究 第 第 PAGE IV 页 第 第 PAGE III 页 估算法的适用范围。 关键词:车载自组织网络,网络安全,认证体系,信任模型 Research on Authentication Architecture and Trust Model in VANET2 ABSTRACT VANET(Vehicular Ad-hoc NETwork) is a kind of Ad-hoc network used in traffic communications between vehicles to vehicles and vehicles to road-side infrastructures. Its a kind of MANETs(Mobile Ad-hoc NETwork) application used in the field of traffic. The original purpose of VANET is to increase security of road traffic and decrease the loss due to traffic accidents. As a result, it is its special application that makes it need a reliable network communication as well as a high demand of network security. In this thesis, we focus on authentication architecture and trust model of network security of VANET. We propose a kind of authentication architecture named of Street Regional Authentication Architecture. We analyses the identities and functions of each kind of nodes and design the process of authentication between different nodes. With the optimization and security analysis of the architecture, we then introduce the conception of trust models for VANET. After analysing the entity-centric based trust models of VANET, we propose a kind of trust model named Information 2 This thesis is supported by following projects: [1] National High-Tech Research and Development (863) Program. “ Research on Key Security Technology of Wireless Mesh Networks” (2006AA01Z436) [2] National High-Tech Research and Development (863) Program. “ Research on Real-time Intrusion Detection and Active Protection Mechanism of Ad Hoc Networks” (2007AA01Z452) Based Trust Model. We give a detailed design of the architecture and functions of each module of the trust model and then illustrate a simple case study for further optimization and security analysis. Our final simulation results confirm the optimization effe

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档