CD-DAA-MD: A Cross-domain DAA Scheme with Mimic Defense for Internet of Vehicles
被引:2
|
作者:
Chen, Liquan
论文数: 0引用数: 0
h-index: 0
机构:
Southeast Univ, Purple Mt Labs, Sch Cyber Sci & Engn, Nanjing, Peoples R ChinaSoutheast Univ, Purple Mt Labs, Sch Cyber Sci & Engn, Nanjing, Peoples R China
Chen, Liquan
[1
]
Miao, Yiwen
论文数: 0引用数: 0
h-index: 0
机构:
Southeast Univ, Purple Mt Labs, Sch Cyber Sci & Engn, Nanjing, Peoples R ChinaSoutheast Univ, Purple Mt Labs, Sch Cyber Sci & Engn, Nanjing, Peoples R China
Miao, Yiwen
[1
]
Yu, Chen
论文数: 0引用数: 0
h-index: 0
机构:
Southeast Univ, Purple Mt Labs, Sch Cyber Sci & Engn, Nanjing, Peoples R ChinaSoutheast Univ, Purple Mt Labs, Sch Cyber Sci & Engn, Nanjing, Peoples R China
Yu, Chen
[1
]
Liu, Suhui
论文数: 0引用数: 0
h-index: 0
机构:
Southeast Univ, Purple Mt Labs, Sch Cyber Sci & Engn, Nanjing, Peoples R ChinaSoutheast Univ, Purple Mt Labs, Sch Cyber Sci & Engn, Nanjing, Peoples R China
Liu, Suhui
[1
]
机构:
[1] Southeast Univ, Purple Mt Labs, Sch Cyber Sci & Engn, Nanjing, Peoples R China
来源:
2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS
|
2022年
关键词:
Internet of Vehicles;
Trusted computing;
Mimic defense;
Direct anonymous attestation;
Cross-domain attestation;
D O I:
10.1109/ICPADS56603.2022.00026
中图分类号:
TP18 [人工智能理论];
学科分类号:
081104 ;
0812 ;
0835 ;
1405 ;
摘要:
The direct anonymous attestation (DAA) scheme is a promising authentication scheme in a single trust domain. However, the existing schemes fail to effectively solve the problem of mutual authentication of vehicle nodes between different trust domains. This paper designs a cross-domain remote DAA scheme combined with a mimic defense mechanism (CD-DAA-MD) for the Internet of Vehicles (IoV). Specifically, the trust chain is constructed, and the mimic defense mechanism is combined with a trusted auditor (TA) to meet the urgent needs of the security of the IoV. Furthermore, a dynamic heterogeneous redundancy structure (DHR) composed of multiple heterogeneous executors is established, where the heterogeneous redundancy between each heterogeneous executor is applied to effectively enhance the security of the TA and simultaneously strengthen the trustworthiness of the TAs identity when participating in the cross-domain link We analogize the proof method that combines the random oracle model and the protocol judgment to evaluate the security issues at the protocol level, where a model based on the probability of heterogeneous executors being compromised is utilized. Simulation results show that our scheme effectively reduces the communication overhead without compromising security. The communication overheads of the TA-Join protocol in our scheme are reduced by about 15% compared with existing schemes. The efficiency of completing the entire cross-domain interactive authentication process is nearly 25% higher than the existing schemes.