CN109347852B - Lightweight Internet of vehicles trust evaluation method - Google Patents

Lightweight Internet of vehicles trust evaluation method Download PDF

Info

Publication number
CN109347852B
CN109347852B CN201811315880.6A CN201811315880A CN109347852B CN 109347852 B CN109347852 B CN 109347852B CN 201811315880 A CN201811315880 A CN 201811315880A CN 109347852 B CN109347852 B CN 109347852B
Authority
CN
China
Prior art keywords
trust
certificate
interaction
vehicles
evaluation value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811315880.6A
Other languages
Chinese (zh)
Other versions
CN109347852A (en
Inventor
刘志全
翁健
马建峰
李盈
兰奕明
魏凯敏
冯丙文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN201811315880.6A priority Critical patent/CN109347852B/en
Publication of CN109347852A publication Critical patent/CN109347852A/en
Application granted granted Critical
Publication of CN109347852B publication Critical patent/CN109347852B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a lightweight Internet of vehicles trust evaluation method, which specifically comprises the following steps: s1, when the previous interaction of the nodes is finished, both interaction parties generate a trust certificate containing a digital signature of the interaction party for the other party according to the interaction experience and send the trust certificate to the other party; s2, after receiving the new trust certificate, the two interacting parties verify the signature information and update the local storage to store at most eta pieces of trust certificate which is most beneficial to the two interacting parties, wherein eta belongs to Z+Is a system parameter; s3, when the potential interaction starts, both the potential interaction parties send the locally stored trust certificate to the other party to prove that the potential interaction parties are trusted; and S4, the two potential interaction parties verify the authenticity of the trust certificate through the digital signature information, derive the trust value of the other party according to the authenticity and decide whether to agree to interact with the trust certificate, and interact if and only if the two parties agree. The invention does not depend on a trust center and a road side unit, and better conforms to the large-scale and distributed characteristics of the Internet of vehicles.

Description

Lightweight Internet of vehicles trust evaluation method
Technical Field
The invention relates to the technical field of Internet of vehicles safety, in particular to a lightweight Internet of vehicles trust evaluation method.
Background
At present, traffic accidents, road congestion and environmental pollution become key problems in cities around the world, and the internet of vehicles plays a vital role in urban road traffic as a main application of the internet of things in the automobile industry and a core component of an intelligent traffic system.
However, due to the characteristics of large scale, open, distributed, sparse and highly dynamic, the internet of vehicles is vulnerable to malicious behaviors and attacks, and the security and reliability have gradually become bottlenecks restricting the further development of the internet of vehicles and concern whether the internet of vehicles can be applied to real road environments. The existing scheme mostly adopts digital signature and cryptography technology, and the reliability of the node (namely, a vehicle) and the quality of the message cannot be evaluated.
Trust management plays a vital role in the internet of vehicles, enabling each node to pre-evaluate the trust values of other nodes and messages to avoid serious consequences from malicious nodes and unrealistic messages. Currently, trust management in the internet of vehicles is still in the infancy stage, and only a few trust evaluation schemes are proposed. Based on the architecture, existing solutions can be roughly divided into two categories, namely infrastructure-based solutions and ad hoc solutions.
Li et al [ X.Li, J.Liu, X.Li, and W.Sun, "RGTE: A publication-based global trust establishment In VANETs," In Proceedings of the 5th International Conference on Intelligent network and Collabolitive Systems,2013, pp.210-214 ] propose a global trust establishment scheme RGTE for the Internet of vehicles, wherein the reputation management center is responsible for collecting trust information of all legal nodes and calculating reputation scores thereof. The model assumes that the reputation management center is completely credible and online in real time, requires higher maintenance cost, and has inherent defects of single-point failure, large time delay and the like. Wei et al [ Z.Wei, F.R.Yu, and A.Boukerche, "Trust based security enhancements for Vehicular ad hoc Networks," In Proceedings of the 4th International Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications,2014, pp.103-109 ] comprehensively consider direct Trust based on historical interactions and indirect Trust based on Trust recommendations, and propose a distributed Trust evaluation method for Vehicular networking where direct Trust is derived from Bayesian formulas and indirect Trust is derived from D-S evidence theory. This model requires the trusted people to gather trust recommendation information about the trusted people, often resulting in large time, bandwidth consumption.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provide a lightweight vehicle networking trust evaluation method, which does not depend on a trust center and a road side unit and better conforms to the large-scale and distributed characteristics of the vehicle networking.
The purpose of the invention is realized by the following technical scheme: a lightweight Internet of vehicles trust evaluation method specifically comprises the following steps:
s1, when the previous interaction of the nodes is finished, both interaction parties generate a trust certificate containing a digital signature of the interaction party for the other party according to the interaction experience and send the trust certificate to the other party;
s2, after receiving the new trust certificate, the two interacting parties verify the signature information and update the local storage to store at most eta pieces of trust certificate which is most beneficial to the two interacting parties, wherein eta belongs to Z+Is a system parameter;
s3, when the potential interaction starts, both the potential interaction parties send the locally stored trust certificate to the other party to prove that the potential interaction parties are trusted;
and S4, the two potential interaction parties verify the authenticity of the trust certificate through the digital signature information, derive the trust value of the other party according to the authenticity and decide whether to agree to interact with the trust certificate, and interact if and only if the two parties agree.
Preferably, in step S1, the specific format of the trust certificate is:
TC(B,A)=(ID(B),ID(A),RT(B,A),WG(B),TS(B,A),DS(B,A))
wherein B and A represent nodes, B is a prover, and A is a recipient; id (B) and id (a) represent unique identifiers of prover B and recipient a, respectively; RT (B, a) represents an evaluation value vector, in the specific format:
RT(B,A)=(RT(B,A,1),RT(B,A,2),…,RT(B,A,n))
where n represents the number of trust aspects, RT (B, A, i) (i ∈ [1, n ]) represents the evaluation value of the i-th trust aspect of the prover B to the recipient A; wg (b) represents a weight value vector in the following specific format:
WG(B)=(WG(B,1),WG(B,2),…,WG(B,n))
wherein WG (B, i) (i ∈ [1, n ]) represents the preference level of interest of prover B for the ith trust aspect; TS (B, a) represents a timestamp when TC (B, a) is generated; DS (B, a) represents digital signature information.
Further, the RT (B, a, i) is expressed as linguistic variables, including "very good", "general", "bad", and "very bad"; the WGs (B, i) are expressed as linguistic variables, including "very high", "medium", "low", and "very low".
Preferably, in step S2, after receiving the trust certificate TC (B, a) generated by the certifier B for itself, the recipient a first verifies the signature information DS (B, a), and then determines the magnitude relationship between the number nm (a) of locally stored trust certificates and η: if NM (A) < η, the receiver A stores TC (B, A) directly; if nm (a) ═ η, the recipient a calculates a weighted evaluation value corresponding to each trust certificate, and selects and stores the η pieces of trust certificates most favorable to the recipient a according to the weighted evaluation value, and deletes other trust certificates, wherein the trust certificates considered by the recipient a comprise TC (B, a) and the η pieces of trust certificates stored locally.
Preferably, in step S2, the specific step of calculating the weighted evaluation value by TC (B, a) is:
s2.1, converting RT (B, A, i) in TC (B, A) into fuzzy evaluation RF (B, A, i) and clear evaluation RC (B, A, i), wherein the specific format of the RF (B, A, i) is as follows:
RF(B,A,i)=(RF(B,A,i,1),RF(B,A,i,2),RF(B,A,i,3),RF(B,A,i,4))
wherein RF (B, A, i,1) is not less than 0 but not more than RF (B, A, i,2) is not less than RF (B, A, i,3) but not more than RF (B, A, i,4) is not less than 100; RC (B, a, i) is the symbol distance of RF (B, a, i), which can be derived from the following formula:
Figure GDA0001927186520000041
s2.2, converting WG (B, i) in TC (B, A) into fuzzy weight WF (B, i) and clear weight WC (B, i), wherein specific format of WF (B, i) is as follows:
WF(B,i)=(WF(B,i,1),WF(B,i,2),WF(B,i,3),WF(B,i,4))
wherein WF (B, i,1) is not less than 0 but not more than 0 and not more than WF (B, i,2) is not less than WF (B, i,3) but not more than WF (B, i,4) is not less than 10; WC (B, i) can be derived from the following formula:
Figure GDA0001927186520000042
s2.3, the blur evaluation value SF (B, a) corresponding to TC (B, a) can be calculated as:
Figure GDA0001927186520000043
the clear evaluation value SC (B, a) corresponding to TC (B, a) can be calculated as:
Figure GDA0001927186520000044
s2.4, the recipient a only considers the time decay weight WT (B, a) when selecting the most favorable trust attestation, which is calculated as:
Figure GDA0001927186520000045
wherein TN represents the current timestamp; TS (B, A) is the time stamp contained in TC (B, A); ω represents the time window size; theta is a time attenuation factor, and controls the attenuation speed of WT (B, A) along with the time difference;
s2.5, the weighted evaluation value SW (B, a) corresponding to TC (B, a) can be calculated as:
SW(B,A)=SC(B,A)*WT(B,A)。
preferably, in step S3, the specific format of the trust certificate set is as follows:
TCs(A)={TC(B1,A),TC(B2,A),…,TC(BNM(A),A)}
wherein NM (A) is less than or equal to eta.
Preferably, the step S4 includes the following steps:
s4.1, when the potential interaction starts, after a node C serving as a trustee receives a trust certificate set TCs (A) of a node A serving as a receiver, the trust certificate in the trust certificate set TCs (A), namely TC (B), is extracted first1,A)、TC(B2,A)、…、TC(BNM(A)A), if NM (A) < eta, the trust value TV (C, A) of the person who gives the trust to the person who receives the trust A is set toA constant τ ∈ [0, 1); otherwise, the trustee C verifies the authenticity of the trustee C through the digital signature information in each trust certificate, then derives a weighted evaluation value corresponding to each trust certificate and calculates the TV (C, A); similarly, the trust value TV (A, C) of the applicant A to the receiver C can be obtained;
s4.2, if and only if TV (C, A) ≧ TH (C) and TV (A, C) ≧ TH (A), node A interacts with node C, wherein TH (C), TH (A) epsilon [0,1] are the trust threshold of node C, node A respectively.
Preferably, in step S4, the messenger C considers an interest preference similarity weight WS (C, B) in addition to the time attenuation weight WT (B, a), the weight being derived from a weighted euclidean distance DS (C, B) of the interest preference vector between the messenger C and the prover B, and the specific calculation formula is:
Figure GDA0001927186520000051
WS(C,B)=1-DS(C,B)。
further, in step S4, the weighted evaluation value ST (C, B, a) corresponding to TC (B, a) may be calculated as:
ST(C,B,A)=SC(B,A)*WT(B,A)*WS(C,B)
similarly, the messenger C can derive TC (B)1,A)、TC(B2,A)、…、TC(BηA) a corresponding weighted evaluation value, and calculating a trust value TV (C, a) for the recipient a, the specific calculation formula being:
Figure GDA0001927186520000061
compared with the prior art, the invention has the following advantages and beneficial effects:
1. the invention adopts a complete self-organizing mode, three roles of a letter applier, a letter acceptor, a certifier and the like are converted in different evaluation stages, and the method does not depend on a trust center and a road side unit, thereby being more suitable for a large-scale and distributed vehicle networking environment.
2. The invention stores and provides trust information by the receiver without the need of the collector, thereby greatly reducing time and bandwidth consumption and realizing rapid and lightweight trust evaluation.
Drawings
FIG. 1 is a schematic diagram of main steps of an embodiment of a lightweight vehicle networking trust evaluation method of the present invention.
FIG. 2 is a simplified example of a lightweight Internet of vehicles trust evaluation method embodiment of the present invention.
Detailed Description
For better understanding of the technical solutions of the present invention, the following detailed description is provided for examples of the present invention with reference to the accompanying drawings, but the embodiments of the present invention are not limited thereto.
Examples
As shown in fig. 1-2, the present embodiment does not include a trust center and a road side unit, but only includes a large number of common nodes (i.e., vehicles), and the communication is performed therebetween in a wireless ad hoc network manner. Each node has the role of either an issuer, a receiver, or a prover and is subject to transformation during different evaluation phases.
Step S1, when the previous interaction of the node A, B is ended, B as a prover generates a trust certificate TC (B, a) for a as a recipient according to the interaction experience, and the specific format is:
TC(B,A)=(ID(B),ID(A),RT(B,A),WG(B),TS(B,A),DS(B,A)) (1)
wherein ID (B) and ID (A) represent unique identifiers of prover B and recipient A, respectively; RT (B, a) represents an evaluation value vector, in the specific format:
RT(B,A)=(RT(B,A,1),RT(B,A,2),…,RT(B,A,n)) (2)
where n represents the number of trust aspects, RT (B, A, i) (i e [1, n ]) represents the prover B's evaluation of the ith trust aspect of the recipient A, with the value represented as linguistic variables, such as "very good", "general", "bad", "very bad", etc.; wg (b) represents a weight value vector in the following specific format:
WG(B)=(WG(B,1),WG(B,2),…,WG(B,n) (3)
where WG (B, i) (i e [1, n ]) represents the prover B interest preference level for the ith trust aspect, which value is also expressed as linguistic variables, such as "very high", "medium", "low", "very low", etc.; TS (B, a) represents a timestamp when TC (B, a) is generated; DS (B, a) represents digital signature information.
Similarly, B as the recipient generates TC (B, a) for a as the prover and sends it to the prover a. Similarly, prover a also generates and sends trust attestation TC (a, B) to recipient B.
Step S2, after receiving trust certificate TC (B, A) generated by certifier B for self, receiver A firstly verifies signature information DS (B, A), then judges the magnitude relation between quantity NM (A) of local stored trust certificate and eta, wherein eta belongs to Z+As system parameters: if NM (A) < η, the receiver A stores TC (B, A) directly; if nm (a) ═ η, the recipient a calculates a weighted evaluation value corresponding to each trust certificate, and selects and stores η pieces of trust certificates most favorable to the recipient a according to the weighted evaluation value, and deletes other trust certificates, wherein the trust certificates calculated by the recipient a include TC (B, a) and the η pieces of trust certificates stored locally.
Taking the calculation of the weighted evaluation value corresponding to TC (B, a) as an example: the RT (B, a, i) in TC (B, a) can be converted into fuzzy evaluation RF (B, a, i) and clear evaluation RC (B, a, i) by the existing fuzzy simple additive weighting system [ s.y.chou, y.h.chang, and c.y.shen ], "a fuzzy simple additive weighting system under group definition-mapping for failure location selection with object/sub-attribute," European Journal of Operational resource, 2008, vol.189, No.1, pp.132-145 ] ], wherein the specific calculation steps of RF (B, a, i) are:
RF(B,A,i)=(RF(B,A,i,1),RF(B,A,i,2),RF(B,A,i,3),RF(B,A,i,4)) (4)
wherein RF (B, A, i,1) is not less than 0 and not more than RF (B, A, i,2) is not less than RF (B, A, i,3) and not more than RF (B, A, i,4) is not less than 100; RC (B, a, i) is the symbol distance of RF (B, a, i), which can be derived from the following formula:
Figure GDA0001927186520000081
similarly, WG (B, i) can be converted into fuzzy weight WF (B, i) and explicit weight WC (B, i), where WF (B, i) is in the specific format:
WF(B,i)=(WF(B,i,1),WF(B,i,2),WF(B,i,3),WF(B,i,4)) (6)
wherein WF (B, i,1) is not less than 0 but not more than 0 and not more than WF (B, i,2) is not less than WF (B, i,3) but not more than WF (B, i,4) is not less than 10; WC (B, i) can be derived from the following formula:
Figure GDA0001927186520000082
where j, k are both temporary variables for summation.
Subsequently, the blur evaluation value SF (B, a) corresponding to TC (B, a) can be calculated as:
Figure GDA0001927186520000083
the clear evaluation value SC (B, a) corresponding to TC (B, a) can be calculated as:
Figure GDA0001927186520000084
the recipient a only considers the time decay weight WT (B, a) when selecting the most favorable trust attestation, which is calculated by the formula:
Figure GDA0001927186520000091
wherein TN represents the current timestamp; TS (B, A) is the time stamp contained in TC (B, A); ω represents the time window size; θ is a time decay factor, controlling the rate at which WT (B, A) decays with time difference.
Therefore, the weighted evaluation value SW (B, a) corresponding to TC (B, a) can be calculated as:
SW(B,A)=SC(B,A)*WT(B,A) (11)
from equations (4) - (10), it can be inferred that the range of RC (B, A, i) is [0,100], and the ranges of WC (B, i), WT (B, A), SC (B, A), SW (B, A) are [0,1 ].
Similarly, the receivers A calculate separatelyWeighted evaluation value SW (B) corresponding to η pieces of trust certification stored locally1,A)、SW(B2,A)、…、SW(BηA), then from SW (B, A), SW (B)1,A)、…、SW(BηAnd A) selecting eta larger values, storing corresponding trust certificates, and deleting other trust certificates.
Step S3, when the potential interaction starts, the recipient a wants to interact with the node C as the issuer, and the recipient a first takes out the locally stored trust certificate, whose set is denoted as tcs (a), that is:
TCs(A)={TC(B1,A),TC(B2,A),…,TC(BNM(A),A)} (12)
wherein NM (A) is less than or equal to eta. The recipient a then sends tcs (a) to the originator C to prove itself trustworthy.
Similarly, node C, the recipient, sends tcs (C) to node a, the issuer, to prove itself trustworthy.
Step S4, after the trust certificate set TCs (A) of the receiver A is received by the sender C, the authenticity of the trust certificate is firstly verified through the digital signature information, and the trust certificate, namely TC (B), is extracted from the trust certificate1,A)、TC(B2,A)、…、TC(BNM(A)A), if NM (A) < η, the trust value TV (C, A) of the sender C to the receiver A is set to a smaller constant τ ∈ [0, 1); otherwise, the applicant C verifies the authenticity of each trust certificate by the digital signature information in the certificate, then derives a weighted evaluation value corresponding to each trust certificate and calculates TV (C, a).
Taking the weighted evaluation value ST (C, B, a) corresponding to TC (B, a) derived by the carrier C as an example: the applicant C considers the interest preference similarity weight WS (C, B) derived from the weighted euclidean distance DS (C, B) of the interest preference vector of the applicant C and the prover B, in addition to the time decay weight WT (B, a) (i.e., equation (10)), and the specific calculation formula is:
Figure GDA0001927186520000101
WS(C,B)=1-DS(C,B) (14)
therefore, the weighted evaluation value ST (C, B, a) corresponding to TC (B, a) can be calculated as:
ST(C,B,A)=SC(B,A)*WT(B,A)*WS(C,B) (15)
according to the methods described in equations (13) - (15), the messenger C can derive TC (B)1,A)、TC(B2,A)、…、TC(BηA) a corresponding weighted evaluation value, and calculating a trust value TV (C, a) for the recipient a, with the specific formula:
Figure GDA0001927186520000102
from equations (13) - (16), it can be deduced that the ranges of WS (C, B), ST (C, B, A), TV (C, A) are all [0,1 ].
If TV (C, A) ≧ TH (C) (where TH (C) epsilon [0,1] is the trust threshold for node C), then the donor C agrees to interact with the recipient A and vice versa.
Similarly, the node a as the trusted party can derive the trust value TV (a, C) for the trusted party C according to the trust certificate set tcs (C) provided by the node C as the trusted party, and decide whether to agree to interact with the trusted party C according to the magnitude relation with the self-trust threshold th (a).
Node A interacts with node C if and only if TV (C, A) ≧ TH (C) and TV (A, C) ≧ TH (A).
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.

Claims (8)

1. A lightweight Internet of vehicles trust evaluation method is characterized by comprising the following steps:
s1, when the previous interaction of the nodes is finished, both interaction parties generate a trust certificate containing a digital signature of the interaction party for the other party according to the interaction experience and send the trust certificate to the other party;
s2, after both interaction parties receive the new trust certification, the verification is carried outIt signs the information and updates the local store to hold at most η pieces of trust proof that are most favorable to itself, where η ∈ Z+Is a system parameter; in step S2, after receiving the trust certificate TC (B, a) generated by the certifier B for itself, the receiver a first verifies the signature information DS (B, a), and then determines the relationship between the number nm (a) of locally stored trust certificates and η: if NM (A) < η, the receiver A stores TC (B, A) directly; if NM (A) ═ eta, the receiver A calculates the weighted evaluation value corresponding to each trust certificate, selects the eta trust certificates most favorable to the receiver A for storage according to the weighted evaluation value, and deletes other trust certificates at the same time, wherein the trust certificates considered by the receiver A comprise TC (B, A) and the eta trust certificates stored locally;
s3, when the potential interaction starts, both the potential interaction parties send the locally stored trust certificate to the other party to prove that the potential interaction parties are trusted;
and S4, the two potential interaction parties verify the authenticity of the trust certificate through the digital signature information, derive the trust value of the other party according to the authenticity and decide whether to agree to interact with the trust certificate, and interact if and only if the two parties agree.
2. The lightweight internet of vehicles trust evaluation method of claim 1, wherein in step S1, the trust certificate has a specific format:
TC(B,A)=(ID(B),ID(A),RT(B,A),WG(B),TS(B,A),DS(B,A))
wherein B and A represent nodes, B is a prover, and A is a recipient; id (B) and id (a) represent unique identifiers of prover B and recipient a, respectively; RT (B, a) represents an evaluation value vector, in the specific format:
RT(B,A)=(RT(B,A,1),RT(B,A,2),...,RT(B,A,n))
where n represents the number of trust aspects, RT (B, A, i) (i ∈ [1, n ]) represents the evaluation value of the i-th trust aspect of the prover B to the recipient A; wg (b) represents a weight value vector in the following specific format:
WG(B)=(WG(B,1),WG(B,2),...,WG(B,n))
wherein WG (B, i) (i ∈ [1, n ]) represents the preference level of interest of prover B for the ith trust aspect; TS (B, a) represents a timestamp when TC (B, a) is generated; DS (B, a) represents digital signature information.
3. A lightweight internet of vehicles trust evaluation method according to claim 2, wherein the RT (B, a, i) is expressed as linguistic variables, including "very good", "general", "bad", and "very bad"; the WGs (B, i) are expressed as linguistic variables, including "very high", "medium", "low", and "very low".
4. The lightweight internet of vehicles trust evaluation method of claim 1, wherein in step S2, the specific step of calculating the weighted evaluation value by TC (B, a) is:
s2.1, converting RT (B, A, i) in TC (B, A) into fuzzy evaluation RF (B, A, i) and clear evaluation RC (B, A, i), wherein the specific format of the RF (B, A, i) is as follows:
RF(B,A,i)=(RF(B,A,i,1),RF(B,A,i,2),RF(B,A,i,3),RF(B,A,i,4))
wherein RF (B, A, i,1) is not less than 0 but not more than RF (B, A, i,2) is not less than RF (B, A, i,3) but not more than RF (B, A, i,4) is not less than 100; RC (B, a, i) is the symbol distance of RF (B, a, i), which can be derived from the following formula:
Figure FDA0002723367500000021
s2.2, converting WG (B, i) in TC (B, A) into fuzzy weight WF (B, i) and clear weight WC (B, i), wherein specific format of WF (B, i) is as follows:
WF(B,i)=(WF(B,i,1),WF(B,i,2),WF(B,i,3),WF(B,i,4))
wherein WF (B, i,1) is not less than 0 but not more than 0 and not more than WF (B, i,2) is not less than WF (B, i,3) but not more than WF (B, i,4) is not less than 10; WC (B, i) can be derived from the following formula:
Figure FDA0002723367500000022
s2.3, the blur evaluation value SF (B, a) corresponding to TC (B, a) can be calculated as:
Figure FDA0002723367500000023
the clear evaluation value SC (B, a) corresponding to TC (B, a) can be calculated as:
Figure FDA0002723367500000024
s2.4, the recipient a only considers the time decay weight WT (B, a) when selecting the most favorable trust attestation, which is calculated as:
Figure FDA0002723367500000031
wherein TN represents the current timestamp; TS (B, A) is the time stamp contained in TC (B, A); ω represents the time window size; theta is a time attenuation factor, and controls the attenuation speed of WT (B, A) along with the time difference;
s2.5, the weighted evaluation value SW (B, a) corresponding to TC (B, a) can be calculated as:
SW(B,A)=SC(B,A)*WT(B,A)
TC (B, A) represents that B of the prover generates a trust certificate for A as the receiver according to the interaction experience, and RT (B, A, i) represents the evaluation value of the ith trust aspect of the prover B to the receiver A; WG (B, i) represents the preference level of interest of prover B in the ith trust aspect.
5. The lightweight internet of vehicles trust evaluation method of claim 1, wherein in step S3, the specific format of the trust certificate set is:
TCs(A)={TC(B1,A),TC(B2,A),...,TC(BNM(A),A)}
where NM (A) ≦ η, NM (A) represents the number of trust attestations that the recipient A has locally stored.
6. The lightweight internet of vehicles trust evaluation method of claim 1, wherein the step S4 specifically comprises:
s4.1, when the potential interaction starts, after a node C serving as a trustee receives a trust certificate set TCs (A) of a node A serving as a receiver, the trust certificate in the trust certificate set TCs (A), namely TC (B), is extracted first1,A)、TC(B2,A)、...、TC(BNM(A)A), if NM (A) < η, the trust value TV (C, A) of the applicant C to the receiver A is set to a constant tau epsilon [0, 1); otherwise, the trustee C verifies the authenticity of the trustee C through the digital signature information in each trust certificate, then derives a weighted evaluation value corresponding to each trust certificate and calculates the TV (C, A); similarly, the trust value TV (A, C) of the applicant A to the receiver C can be obtained;
s4.2, if and only if TV (C, A) ≧ TH (C) and TV (A, C) ≧ TH (A), node A interacts with node C, wherein TH (C), TH (A) epsilon [0,1] are the trust threshold of node C, node A respectively.
7. The lightweight internet of vehicles trust evaluation method of claim 1, wherein in step S4, the messenger C considers an interest preference similarity weight WS (C, B) in addition to a time decay weight WT (B, a), the weight is derived from a weighted euclidean distance DS (C, B) of the interest preference vector between the messenger C and the prover B, and the specific calculation formula is:
Figure FDA0002723367500000041
WS(C,B)=1-DS(C,B)
WC (B, i) is a clear weight corresponding to WG (B, i) which represents the interest preference level of prover B in the ith trust.
8. The lightweight internet of vehicles trust evaluation method of claim 7, wherein in step S4, the weighted evaluation value ST (C, B, a) corresponding to TC (B, a) can be calculated as:
ST(C,B,A)=SC(B,A)*WT(B,A)*WS(C,B)
similarly, the messenger C can derive TC (B)1,A)、TC(B2,A)、...、TC(BηA) a corresponding weighted evaluation value, and calculating a trust value TV (C, a) for the recipient a, the specific calculation formula being:
Figure FDA0002723367500000042
TC (B, A) represents that B of the prover generates a trust certificate for A as the receiver according to the interactive experience;
SC (B, a) is a clear evaluation value corresponding to TC (B, a).
CN201811315880.6A 2018-11-07 2018-11-07 Lightweight Internet of vehicles trust evaluation method Active CN109347852B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811315880.6A CN109347852B (en) 2018-11-07 2018-11-07 Lightweight Internet of vehicles trust evaluation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811315880.6A CN109347852B (en) 2018-11-07 2018-11-07 Lightweight Internet of vehicles trust evaluation method

Publications (2)

Publication Number Publication Date
CN109347852A CN109347852A (en) 2019-02-15
CN109347852B true CN109347852B (en) 2020-12-11

Family

ID=65313869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811315880.6A Active CN109347852B (en) 2018-11-07 2018-11-07 Lightweight Internet of vehicles trust evaluation method

Country Status (1)

Country Link
CN (1) CN109347852B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110445788B (en) * 2019-08-09 2021-07-27 西安电子科技大学 Content-oriented trust evaluation system and method under vehicle-mounted ad hoc network environment
CN113115317A (en) * 2021-03-05 2021-07-13 暨南大学 Privacy protection method for vehicle trust score in Internet of vehicles
CN113380024B (en) * 2021-05-27 2022-09-02 重庆邮电大学 Reputation updating method and trust calculation method based on Internet of vehicles
CN116996521B (en) * 2023-09-28 2023-12-15 江西农业大学 Relay committee cross-chain interaction system and method based on trust evaluation model

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392373A (en) * 2014-12-02 2015-03-04 西安邮电大学 Interactive decision-making method based on key historical behaviors in cloud computing environment
CN106330910A (en) * 2016-08-25 2017-01-11 重庆邮电大学 Strong privacy protection dual authentication method based on node identities and reputations in Internet of vehicles

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404592A (en) * 2008-11-14 2009-04-08 西安交通大学 Total trust degree decision method based on history evidence window
CN102222305A (en) * 2011-06-13 2011-10-19 北京理工大学 Creditworthiness evaluation method under distributed environment
US10083291B2 (en) * 2015-02-25 2018-09-25 Verisign, Inc. Automating internet of things security provisioning
CN106412912B (en) * 2016-06-22 2017-11-10 长安大学 A kind of method for trust evaluation of nodes towards car networking
CN107665405B (en) * 2017-09-26 2021-04-20 北京邮电大学 Vehicle credit management method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392373A (en) * 2014-12-02 2015-03-04 西安邮电大学 Interactive decision-making method based on key historical behaviors in cloud computing environment
CN106330910A (en) * 2016-08-25 2017-01-11 重庆邮电大学 Strong privacy protection dual authentication method based on node identities and reputations in Internet of vehicles

Also Published As

Publication number Publication date
CN109347852A (en) 2019-02-15

Similar Documents

Publication Publication Date Title
CN109347852B (en) Lightweight Internet of vehicles trust evaluation method
Cui et al. An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks
Tangade et al. Trust management scheme based on hybrid cryptography for secure communications in VANETs
Yao et al. Using trust model to ensure reliable data acquisition in VANETs
Quercia et al. B-trust: Bayesian trust framework for pervasive computing
AU2018102186A4 (en) An aggregated trust evaluation method for message reliability in vanets
Wei et al. A privacy-preserving fog computing framework for vehicular crowdsensing networks
Wang et al. Challenges and solutions in autonomous driving: A blockchain approach
Sharma et al. Trust based location finding mechanism in VANET using DST
CN108882231B (en) Unmanned driving safety communication authentication protocol
CN107231363B (en) Distributed authentication method and authentication model
Chaurasia et al. Trust computation in VANETs
CN112929845B (en) Vehicle networking node trust evaluation method and system based on block chain
CN107040516B (en) Efficient pseudonym management and data integrity protection protocol
CN114745127A (en) Node credibility authentication method in Internet of vehicles environment based on block chain
Bhargava et al. Computational trust model for Internet of Vehicles
Hao et al. URLLC resource slicing and scheduling for trustworthy 6G vehicular services: A federated reinforcement learning approach
Liu et al. Securing connected vehicle applications with an efficient dual cyber-physical blockchain framework
CN117082505A (en) Data security sharing method, system and device, electronic equipment and storage medium
CN117202203A (en) Multi-factor comprehensive trust evaluation method in Internet of vehicles environment
Sarangi Malicious Attacks Detection Using Trust Node Centric Weight Management Algorithm in Vehicular Platoon
CN113727282B (en) Similarity-based trust evaluation method for privacy protection in Internet of vehicles
CN113645028B (en) Vehicle networking condition privacy protection system and method supporting dynamic key management
CN116305186A (en) Security aggregation method with low communication overhead and decentralization
Caballero-Gil et al. Mutual authentication in self-organized VANETs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant