Vehicle network application node security authentication based on trusted computing and direct anonymous attestationAuthor(s): Ren Shuai, Zhao Xiangmo, Zhang Tao, Lou Zongzong
Security is a basic requirement for vehicle network or other networks. But there is little security strategy special for vehicle network. The existing network security strategy, which applies to fixed network very well, cannot satisfy the requirement of vehicle network. In this paper, trusted computing and direct anonymous attestation theories are adopted to establish protocol system of trusted vehicle information authentication, thus the security of authentication process for nodes in vehicle network can be improved. It is illustrated that the efficiency of verification can be increased and the possibility of being attacked can be decreased.