CN109729504A - A method of vehicle authentic authentication and caching based on block chain - Google Patents

A method of vehicle authentic authentication and caching based on block chain Download PDF

Info

Publication number
CN109729504A
CN109729504A CN201811474196.2A CN201811474196A CN109729504A CN 109729504 A CN109729504 A CN 109729504A CN 201811474196 A CN201811474196 A CN 201811474196A CN 109729504 A CN109729504 A CN 109729504A
Authority
CN
China
Prior art keywords
vehicle
fringe node
new vehicle
new
time delay
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811474196.2A
Other languages
Chinese (zh)
Other versions
CN109729504B (en
Inventor
曾凌烽
高强
田志峰
郑泽鳞
徐琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Power Supply Bureau Co Ltd
Original Assignee
Shenzhen Power Supply Bureau Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Power Supply Bureau Co Ltd filed Critical Shenzhen Power Supply Bureau Co Ltd
Priority to CN201811474196.2A priority Critical patent/CN109729504B/en
Publication of CN109729504A publication Critical patent/CN109729504A/en
Application granted granted Critical
Publication of CN109729504B publication Critical patent/CN109729504B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention provides a kind of method of vehicle authentic authentication and caching based on block chain, including establishes vehicle authentic authentication framework;System mode is established based on vehicle authentic authentication framework;Authentic authentication mechanism of the vehicle on block chain is established based on system mode;When fringe node detects that new vehicle enters its overlay area, new vehicle is authenticated and is authorized;After new vehicle authenticates and authorization passes through, find corresponding location matrix and caching matrix in block link network network layers, and the time delay relationship of new vehicle and fringe node is obtained to construct objective function: converting objective function to the Optimum Matching problem based on fringe node and new vehicle, and the optimal solution of objective function is sought using the matched algorithm of multi-to-multi, obtain the minimum average B configuration time delay that new vehicle obtains required data from block link network network layers.Implement the present invention, is able to solve demand of the vehicle to authentic authentication and low delay.

Description

A method of vehicle authentic authentication and caching based on block chain
Technical field
The present invention relates to vehicle networking technical field more particularly to a kind of vehicle authentic authentications and caching based on block chain Method.
Background technique
With development of the industrial technology of Internet of things in car networking, the data sharing between vehicle is gradually frequent, this also gives number Serious threat is brought according to safety and personal secrets.In order to realize the real time monitoring to vehicle, promote the data of equipment room total It enjoys, highly desired one is able to achieve the Verification System of credible access.And to provide the block chain of authentic authentication and personal secrets It is considered as solving the problems, such as the key technology of authentic authentication.Due to the popularity that the mobility of vehicle is distributed with it, build on merely The car networking mode of block chain network can not cover all intelligent vehicles.Meanwhile the data mighty torrent that a large amount of vehicles generate also is given Core network brings great burden.
However, the most of certification be absorbed in and realize equipment of current research, have ignored core network data blocking and Close to the gras generally recognized as safe of smart machine, it is unable to satisfy demand of the vehicle to authentic authentication and low delay.For example, Patent publication No For CN107528856A.A kind of hair of entitled Internet of Things mist end equipment based on block chain platform access authentication method beyond the clouds Bright patent, the patent of invention first initiate the proxy requests of access cloud platform by internet of things equipment to intelligent gateway, then by intelligence Energy gateway sends the device certificate of internet of things equipment and the device certificate of gateway to block chain network, is authenticated, is then passed through Block chain network carries out malice differentiation to intelligent gateway, guarantees that the node is not contaminated, to ensure entire block chain network The safety and uniqueness of data.Although the patent of invention reduces the dependence and usage frequency to cloud platform, but need By intelligent gateway to the preliminary collection of internet of things equipment data and agency, not in view of gateway brought by the mobility of equipment Switching.For another example, Patent publication No CN107682331A, a kind of entitled Internet of Things identity identifying method based on block chain Patent of invention, the patent of invention execute authentication procedures by the intelligent contract operated on block chain automatically, complete entity Identity registration, identity token can be issued to another entity by entity, its is made to obtain access qualification.Although the patent of invention Eliminate the authoritative institution of the centralization in authentication procedures, in Internet of Things entity identities certification provide it is just, transparent, Believable performing environment, but the explosive growth of smart machine is faced, the authentication and access of all devices all rely on Block chain network, it is clear that will also bring extremely serious load.For another example, Patent publication No CN108270571A, entitled one For kind based on the Internet of Things identity authorization system of block chain and its patent of invention of method, which includes trusted third party's mould Block, EM equipment module, line module, intelligent contract module four module;Wherein, trusted third party's module can build block link network Network;EM equipment module generates public and private key using elliptic curve key generating algorithm;The public and private key of user can be generated in line module, ensures Privacy;Intelligent contract module realizes certification for class parameter.Although the patent of invention decentralization network, reduces center The burden of server realizes the anonymity of user data, but can not apply in car networking because of the mobility of vehicle.
For this purpose, need in conjunction with car networking actual conditions, and based on block chain safety certification and fringe node have storage and The advantages of computing capability, solves demand of the vehicle to authentic authentication and low delay.
Summary of the invention
The technical problem to be solved by the embodiment of the invention is that provide a kind of vehicle authentic authentication based on block chain and The method of caching is able to solve demand of the vehicle to authentic authentication and low delay.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of vehicle authentic authentication based on block chain and The method of caching, the described method comprises the following steps:
Step S1, vehicle authentic authentication framework is established;Wherein, the vehicle authentic authentication framework includes the vehicle positioned at bottom Interconnector layer, the block chain fringe node layer positioned at middle layer and the block link network network layers positioned at top layer;
Step S2, it is based on the vehicle authentic authentication framework, system mode is established: dividing at random in the car networking layer It is furnished with vehicle set V={ V1,V2,L,VM};Fringe node set is distributed with by Poisson process in the block chain fringe node layer B={ B1,B2,L,BN, and fringe node BiTransmission connection is established with one or more vehicles in the vehicle set;It is described Block link network network layers are to fringe node B in the fringe node setiIt is assigned bandwidth Wi;Wherein, i, N, M are positive integer, and I=1,2 ..., N };
Step S3, it is based on the system mode, establishes authentic authentication mechanism of the vehicle on block chain: vehicle VkIt will Information of vehicles and privacy policy upload to fringe node Bi;Fringe node BiReceive vehicle VkThe information of vehicles of upload and privacy political affairs After plan, Xiang Suoshu block link network network layers initiate registration request instruction, and the permission waiting for receiving the block link network network layers feedback After registration request instruction, by vehicle VkInformation of vehicles carry out caching while being forwarded to the block chain network by spatial cache On layer, and further according to vehicle VkPrivacy policy generate corresponding ID, private key and public key and be handed down to vehicle Vk;The block Link network network layers receive fringe node BiThe vehicle V of forwardingkInformation of vehicles generate memory block storage, and give vehicle VkCreation corresponds to Intelligent contract, and further give vehicle VkCreation and fringe node BiRelated location matrix Li,k=[li,k]N×MAnd caching Matrix Ci,k=[ci,k]N×M;Wherein, k is positive integer, and k={ 1,2 ..., M };
Step S4, as fringe node BiNew vehicle V is detectedjWhen into its overlay area, fringe node BiTo new vehicle VjIt is authenticated and is authorized;Wherein, j is positive integer, and j={ 1,2 ..., M };
Step S5, to new vehicle VjAfter certification and authorization pass through, new vehicle V is foundjIt corresponds in the block link network network layers Location matrix Li,j=[li,j]N×MWith caching Matrix Ci,j=[ci,j]N×M, and obtain new vehicle VjWith fringe node BiBetween Time delay relationship, and further according to new vehicle VjLocation matrix Li,j=[li,j]N×M, caching matrix Ci,j=[ci,j]N×MAnd its With fringe node BiBetween time delay relationship, construct objective function:
Step S6, it converts the objective function to based on fringe node BiWith new vehicle VjOptimum Matching problem, and benefit The optimal solution that the objective function is sought with the matched algorithm of multi-to-multi, obtains new vehicle VjInstitute is obtained from the block link network network layers Need the minimum average B configuration time delay of data.
Wherein, the step S4 guarantees the communication security between fringe node and vehicle using Digital Signature Algorithm, specifically Include:
The first step, fringe node BiEstablish private key and public key: fringe node BiSelect random number s for private keyAnd it counts Calculate public key PKBS=sP, and further establish two hash functions H1 and H2;Wherein,P, q are prime number;
Second step, fringe node BiExtract private key and public key: fringe node BiNew car is registered in the block link network network layers VjAfterwards, another random number is selectedAnd calculate following formula (1)~(3):
Rj=rj·P (1)
hj=H1(IDj,Rj,PKBS) (2)
uj=(rj+hj·s)mod q (3)
Wherein, IDjFor new vehicle VjID;
Later, fringe node BiBy (Rj,uj) it is sent to new vehicle Vj, and new vehicle VjIt can be verified by formula (4) The reliability of information:
ujP=Rj+H1(IDj,Rj,PKBE)·P (4)
Third step, new vehicle VjForm signing messages: new vehicle VjIt is signed to information m to reinforce confidentiality, new vehicle VjChoosing Select a random number xjAs vehicle private keyCorresponding public key PK is calculated laterj=xjP, and calculated according to digital signature Method, available:
Xj=H2(IDj,PKj,Rj,PKBE,m) (5)
vj=(Xj·uj+xj)mod q (6)
Later according to formula (5) and (6), new vehicle V is obtainedjSigning messages to message m is (m, PKj,uj);
4th step, fringe node BiVerify new vehicle VjSigning messages: fringe node BiReceive new vehicle VjA.L.S. Cease (m, PKj,uj) after, it is verified by formula (7) to verify the reliability of message:
vjP=Rj+H2(IDj,Rj,PKBE)·P (7)
Only under conditions of formula is set up, fringe node BiDigital signature can just be received and to new vehicle VjOpen power Limit.
Wherein, the step S5 is specifically included:
Obtain new vehicle VjThe corresponding location matrix L in the block link network network layersi,j=[li,j]N×MAnd caching matrix Ci,j=[ci,j]N×M
Obtain new vehicle VjWith fringe node BiBetween time delay relationship, specifically have following several:
(1) if fringe node BiSpatial cache cached new vehicle VjVehicle information data, new vehicle V at this timejIt can be with Directly from fringe node BiDownloading data meets li,j·ci,j=1, obtaining time delay isWherein, sjFor edge Node BiWith new vehicle VjBetween transmission size of data,dajFor new vehicle Vj Vehicle information data size;PkFor transimission power,For noise power;For fringe node BiWith new vehicle VjBetween road Diameter loss, fi,jFor fixed coefficient, Ri,jFor fringe node BiWith new vehicle VjBetween transmission rate;
(2) if fringe node BiThe uncached new vehicle V of spatial cachejVehicle information data, and other edge node Bk New vehicle V is cachedjVehicle information data, and fringe node BkWith fringe node BiThe distance between be Di,kAnd average bandwidth For Bi,k, obtaining time delay is
(3) if the uncached new vehicle V of the spatial cache of all fringe nodes alljVehicle information data, new vehicle V at this timej It can only initiate to request to the block link network network layers, obtaining time delay isWherein, R0For the block chain network The given intrinsic download transmission rate of layer;γ is weight coefficient;
According to new vehicle VjWith fringe node BiBetween time delay relationship, obtain new vehicle VjFrom the block link network network layers The time delay of data needed for obtaining isAnd to seek minimum average B configuration time delay, construct objective function and its it is corresponding about Beam condition are as follows:
C,L∈{0,1}N×M, (8);
Wherein, CapiFor fringe node BiSpatial cache size.
Wherein, the step S6 is specifically included:
Define a benefit functionTo indicate fringe node BiIt will be to new Vehicle VjDistribute system consumption when spatial cache, the benefit function fi(j) value is smaller, shows fringe node BiIt can use smaller Memory space provide low delay service for vehicle;Wherein, ρ is the weight coefficient of cache resources;For fringe node BiWith it is new Vehicle VjBetween time delay;
Based on the benefit function fi(j), fringe node B is constructediOne-to-many mapping relations are formed between each vehicle First preference listAnd building new vehicle VjOne-to-many mapping relations are formed between all fringe nodes Second preference listWherein,
Maximum value MAX Φ in first preference list is setiVehicle in fringe node BiSpatial cache distribution when obtain Maximum value MAX ψ preferentially and in second preference listjThe spatial cache of fringe node preferentially distribute to new vehicle Vj
First preference list and second preference list are polled and are asked most using the matched algorithm of multi-to-multi Excellent solution, and according to the optimal solution acquired, obtain new vehicle VjThe minimum average B configuration of required data is obtained from the block link network network layers Time delay.
Wherein, described that first preference list and second preference list are carried out using the matched algorithm of multi-to-multi Poll seeks optimal solution, and according to the optimal solution acquired, obtains new vehicle VjRequired data are obtained from the block link network network layers The specific steps of minimum average B configuration time delay include:
First preference list and second preference list are initialized, and list pointer is respectively directed to Maximum value in first preference list and second preference list;
First preference list and second preference list are polled;Wherein, fringe node BiAccording to described The preferential allocation space of sequence of the size of first preference list intermediate value from high to low is to vehicle, until spatial cache all distributes Until finishing;New vehicle VjFringe node is preferentially selected according to the size sequence from high to low of the second preference list intermediate value, Until finding corresponding fringe node;
After to be polled, new vehicle V is obtainedjThe caching matrix C of optimizationi,j, and according to the caching square of obtained optimization Battle array Ci,j, calculate new vehicle VjThe minimum average B configuration time delay of required data is obtained from the block link network network layers.
The implementation of the embodiments of the present invention has the following beneficial effects:
Present invention combination car networking actual conditions, introduce the car networking system in conjunction with block chain and edge calculations.It realizes The data sharing directly between certification and block chain fringe node between vehicle and fringe node, and matched based on multi-to-multi Edge cache scheme, the caching of dynamic optimization fringe node minimizes average delay, improves data sharing performance, to solve Certainly demand of the vehicle to authentic authentication and low delay.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention, for those of ordinary skill in the art, without any creative labor, according to These attached drawings obtain other attached drawings and still fall within scope of the invention.
Fig. 1 is the flow chart of the method for the vehicle authentic authentication and caching provided in an embodiment of the present invention based on block chain;
Fig. 2 is provided in an embodiment of the present invention based on the vehicle authentic authentication of block chain and the network topology structure of caching Figure;
Fig. 3 is three kinds of algorithms in the method for the vehicle authentic authentication and caching provided in an embodiment of the present invention based on block chain Obtain the comparison diagram that average delay changes with vehicle fleet size;
Fig. 4 is three kinds of algorithms in the method for the vehicle authentic authentication and caching provided in an embodiment of the present invention based on block chain Obtain the comparison diagram that hit rate changes with vehicle fleet size;
Fig. 5 is three kinds of algorithms in the method for the vehicle authentic authentication and caching provided in an embodiment of the present invention based on block chain Hit rate is obtained with the comparison diagram of edge nodal cache spatial variations.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, the present invention is made into one below in conjunction with attached drawing Step ground detailed description.
As shown in Figure 1, in the embodiment of the present invention, a kind of vehicle authentic authentication and caching based on block chain of proposition Method, this method show the process to vehicle authentic authentication and time delay optimization, specifically includes the following steps:
Step S1, vehicle authentic authentication framework is established;Wherein, the vehicle authentic authentication framework includes the vehicle positioned at bottom Interconnector layer, the block chain fringe node layer positioned at middle layer and the block link network network layers positioned at top layer;
Detailed process is, as shown in Fig. 2, the car networking layer of bottom can allow intelligent vehicle pass through big quantity sensor to receive Data needed for collecting simultaneously pass it to other vehicles or server, but lack access control mechanism and encipherment protection;Middle layer Block chain fringe node layer can be according to the facility information of the timely synchronized update vehicle of movable vehicle, and can register on block chain Vehicle, while intelligent contract is created after obtaining vehicle permission, in addition to this data sharing between fringe node helps to subtract Few propagation delay time alleviates the data blocking of block chain core network;The block link network network layers of top layer can provide the storage of centralization Facility information and the service for creating intelligent contract, can orderly store and record facility information and transaction, and every record can fill When timestamp and unique encrypted symbols.
Step S2, it is based on the vehicle authentic authentication framework, system mode is established: dividing at random in the car networking layer It is furnished with vehicle set V={ V1,V2,L,VM};Fringe node set is distributed with by Poisson process in the block chain fringe node layer B={ B1,B2,L,BN, and fringe node BiTransmission connection is established with one or more vehicles in the vehicle set;It is described Block link network network layers are to fringe node B in the fringe node setiIt is assigned bandwidth Wi;Wherein, i, N, M are positive integer, and I=1,2 ..., N };
Detailed process is that fringe node is distributed by Poisson process (PPP), and fringe node collection is combined into B={ B1,B2,L,BN, Random distribution has vehicle collection to be combined into V={ V in car networking layer1,V2,L,VM, block link network network layers give fringe node BiThe band of distribution Width is Wi;Wherein, fringe node BiDownlink and one or more vehicles establish transmission connection, and uplink and block link network network layers are established Transmission connection.
Due to that can realize data sharing by channel between fringe node, vehicle can also be set from other cached The node of standby information obtains required data.It should be noted that being the condition for caching information of vehicles in all fringe nodes Under, which can only obtain data from block link network network layers, i.e., all fringe nodes are used to store the spatial cache of information of vehicles In the case where having expired, the information of vehicles of vehicle can only be stored on the central server of block link network network layers.At this point, block link network Network layers can provide intrinsic downloading rate R0, and the intrinsic downloading rate R0The generally below transmission rate of fringe node offer.
Step S3, it is based on the system mode, establishes authentic authentication mechanism of the vehicle on block chain: vehicle VkIt will Information of vehicles and privacy policy upload to fringe node Bi;Fringe node BiReceive vehicle VkThe information of vehicles of upload and privacy political affairs After plan, Xiang Suoshu block link network network layers initiate registration request instruction, and the permission waiting for receiving the block link network network layers feedback After registration request instruction, by vehicle VkInformation of vehicles carry out caching while being forwarded to the block chain network by spatial cache On layer, and further according to vehicle VkPrivacy policy generate corresponding ID, private key and public key and be handed down to vehicle Vk;The block Link network network layers receive fringe node BiThe vehicle V of forwardingkInformation of vehicles generate memory block storage, and give vehicle VkCreation corresponds to Intelligent contract, and further give vehicle VkCreation and fringe node BiRelated location matrix Li,k=[li,k]N×MAnd caching Matrix Ci,k=[ci,k]N×M;Wherein, k is positive integer, and k={ 1,2 ..., M };
Detailed process is vehicle V firstkInformation of vehicles and privacy policy are uploaded into fringe node Bi;Then, edge section Point BiReceive vehicle VkAfter the information of vehicles and privacy policy of upload, registration request instruction is initiated to block link network network layers, and waiting After the permission registration request instruction for receiving block link network network layers feedback, by vehicle VkInformation of vehicles delayed by spatial cache It deposits while being forwarded in block link network network layers, so that block link network network layers generate memory block and store vehicle VkInformation of vehicles simultaneously Give vehicle VkCreate corresponding intelligent contract;Then, fringe node BiAccording to vehicle VkPrivacy policy generate corresponding ID, private Key and public key are handed down to vehicle Vk
Intelligent contract has the script of unique address, and after address is triggered, it can be independently automatically at each edge It is executed on node.By the way that after trading and being sent to the address, trusted node can trigger intelligent contract, so as to not reveal The premise of equipment privacy is directly that vehicle is authenticated.
Public and private key can be used to implement the user's control to block chain.Private key can modify to transaction, need secret guarantor It deposits, and public key can be occurred to allow it to download facility information to trusted node by vehicle.When vehicle enters the covering of different nodes When in range, public key can be sent and directly authenticated later in fringe node.
By intelligent contract, asymmetric encryption mechanism, the car networking based on block chain has ensured the reliability of certification, data Completely with can not distort.It establishes distributed end to end network, and vehicle, which does not need trusted intermediary, to link up with other vehicles.
Block link network network layers are in order to indicate vehicle VkWith fringe node BiPositional relationship, define location matrix Li,k= [li,k]N×M, and for vehicle VkWith the spatial cache relationship of fringe node, caching matrix C is definedi,k=[ci,k]N×M;Wherein,
Step S4, as fringe node BiNew vehicle V is detectedjWhen into its overlay area, fringe node BiTo new vehicle VjIt is authenticated and is authorized;Wherein, j is positive integer, and j={ 1,2 ..., M };
Detailed process is to guarantee the communication security between fringe node and vehicle using Digital Signature Algorithm, specifically include:
The first step, fringe node BiEstablish private key and public key: fringe node BiSelect random number s for private keyAnd it counts Calculate public key PKBS=sP, and further establish two hash functions H1 and H2;Wherein,P, q are prime number;It should be noted that these data can be as public affairs It is broadcasted in systems with parameter.
Second step, fringe node BiExtract private key and public key: fringe node BiNew car is registered in the block link network network layers VjAfterwards, another random number is selectedAnd calculate following formula (1)~(3):
Rj=rj·P (1)
hj=H1(IDj,Rj,PKBS) (2)
uj=(rj+hj·s)mod q (3)
Wherein, IDjFor new vehicle VjID;
Later, fringe node BiBy (Rj,uj) it is sent to new vehicle Vj, and new vehicle VjIt can be verified by formula (4) The reliability of information:
ujP=Rj+H1(IDj,Rj,PKBE)·P (4)
Third step, new vehicle VjForm signing messages: new vehicle VjIt is signed to information m to reinforce confidentiality, new vehicle VjChoosing Select a random number xjAs vehicle private keyCorresponding public key PK is calculated laterj=xjP, and calculated according to digital signature Method, available:
Xj=H2(IDj,PKj,Rj,PKBE,m) (5)
vj=(Xj·uj+xj)mod q (6)
Later according to formula (5) and (6), new vehicle V is obtainedjSigning messages to message m is (m, PKj,uj);
4th step, fringe node BiVerify new vehicle VjSigning messages: fringe node BiReceive new vehicle VjA.L.S. Cease (m, PKj,uj) after, it is verified by formula (7) to verify the reliability of message:
vjP=Rj+H2(IDj,Rj,PKBE)·P (7)
Only under conditions of formula is set up, fringe node BiDigital signature can just be received and to new vehicle VjOpen power Limit.
Step S5, to new vehicle VjAfter certification and authorization pass through, new vehicle V is foundjIt corresponds in the block link network network layers Location matrix Li,j=[li,j]N×MWith caching Matrix Ci,j=[ci,j]N×M, and obtain new vehicle VjWith fringe node BiBetween Time delay relationship, and further according to new vehicle VjLocation matrix Li,j=[li,j]N×M, caching matrix Ci,j=[ci,j]N×MAnd its With fringe node BiBetween time delay relationship, construct objective function:
Detailed process is to obtain new vehicle VjThe corresponding location matrix L in block link network network layersi,j=[li,j]N×MIt is gentle Deposit Matrix Ci,j=[ci,j]N×M
As new vehicle VjWhen needing to obtain required data from higher level server, it can choose three kinds of cache paths point Do not have three kinds of different delays, therefore new vehicle VjWith fringe node BiBetween time delay relationship it is specific as follows:
(1) if fringe node BiSpatial cache cached new vehicle VjVehicle information data, new vehicle V at this timejIt can be with Directly from fringe node BiDownloading data meets li,j·ci,j=1, obtaining time delay isWherein, sjFor edge Node BiWith new vehicle VjBetween transmission size of data,dajFor new vehicle Vj's Vehicle information data size;PkFor transimission power,For noise power;For fringe node BiWith new vehicle VjBetween path Loss, fi,jFor fixed coefficient, Ri,jFor fringe node BiWith new vehicle VjBetween transmission rate;
(2) if fringe node BiThe uncached new vehicle V of spatial cachejVehicle information data, and other edge node Bk New vehicle V is cachedjVehicle information data, and fringe node BkWith fringe node BiThe distance between be Di,kAnd average bandwidth For Bi,k, obtaining time delay is
(3) if the uncached new vehicle V of the spatial cache of all fringe nodes alljVehicle information data, new vehicle V at this timej It can only initiate to request to the block link network network layers, obtaining time delay isWherein, R0It is given for block link network network layers Fixed intrinsic download transmission rate;γ is weight coefficient;
According to new vehicle VjWith fringe node BiBetween time delay relationship, obtain new vehicle VjFrom the block link network network layers The time delay of data needed for obtaining isAnd to seek minimum average B configuration time delay, construct objective function and its it is corresponding about Beam condition are as follows:
C,L∈{0,1}N×M, (8);
Wherein, CapiFor fringe node BiSpatial cache size.
It should be noted that indicating fringe node with hit rate (hit ratio) to assess the performance of buffering scheme A possibility that caching the facility information of vehicle in coverage area, thus obtains:
Step S6, it converts the objective function to based on fringe node BiWith new vehicle VjOptimum Matching problem, and benefit The optimal solution that the objective function is sought with the matched algorithm of multi-to-multi, obtains new vehicle VjInstitute is obtained from the block link network network layers Need the minimum average B configuration time delay of data.
Detailed process is that the objective function that above-mentioned formula (8) is formed is a NP-hard problem, therefore proposes and be based on Multi-to-multi matched algorithm solves.In fringe node BiWith new vehicle VjOptimum Matching in, fringe node BiWith new vehicle Vj It is game object.
In view of propagation delay time and data cached size, a benefit function is definedTo indicate fringe node BiTo give new vehicle VjDistribute spatial cache when be System consumption, benefit function fi(j) value is smaller, shows fringe node BiLow delay can be provided for vehicle with lesser memory space Service;Wherein, ρ is the weight coefficient of cache resources;For fringe node BiWith new vehicle VjBetween time delay.It should illustrate , new vehicle V is indicated when i is equal to N+1jIt needs to be fed back from block link network network layers;
Based on benefit function fi(j), fringe node B is constructediThe of one-to-many mapping relations is formed between each vehicle One preference listAnd building new vehicle VjOne-to-many mapping is formed between all fringe nodes to close Second preference list of systemWherein,
Maximum value MAX Φ in first preference list is setiVehicle in fringe node BiSpatial cache distribution when obtain it is excellent Maximum value MAX ψ in first and the second preference listjThe spatial cache of fringe node preferentially distribute to new vehicle Vj
First preference list and the second preference list are polled and seek optimal solution using the matched algorithm of multi-to-multi, And according to the optimal solution acquired, new vehicle V is obtainedjThe minimum average B configuration time delay of required data is obtained from block link network network layers.At this point, First preference list and the second preference list are initialized, and list pointer is respectively directed to the first preference list and Maximum value in two preference list;First preference list and the second preference list are polled;Wherein, fringe node BiAccording to The preferential allocation space of sequence of the size of first preference list intermediate value from high to low is to vehicle, until spatial cache all distributes Until finishing;New vehicle VjFringe node is preferentially selected according to the size sequence from high to low of the second preference list intermediate value, until Until finding corresponding fringe node;After to be polled, new vehicle V is obtainedjThe caching matrix C of optimizationi,j, and according to gained The caching matrix C for the optimization arrivedi,j, calculate new vehicle VjThe minimum average B configuration of required data is obtained from the block link network network layers Time delay.
It should be noted that in each round circulation, the vehicle for the fringe node allocation space not being selected in last round of Pointer can be directed toward in the second preference list remaining value maximum fringe node and to issue request.Terminate in each round Afterwards, if vehicle is selected, pointer will no longer change.Otherwise pointer can be shifted to next node by it.When all vehicles After all having found the fringe node for being suitble to caching or block link network network layers, algorithm circulation terminates.
To sum up, the present invention realizes the data sharing in the authentic authentication and different car networking networks of vehicle, reduces transmission Time delay improves network storage capabilities, improves certification speed;The authentication mechanism based on block chain is established, for reliably testing for vehicle Card provides guarantee, while preventing linking by malicious attack between vehicle and fringe node;It proposes to be matched according to multi-to-multi and calculate The edge cache scheme of method minimizes average delay, enhances cooperation shared.
As shown in Figures 3 to 5, to the method for the vehicle authentic authentication and caching based on block chain in the embodiment of the present invention Application scenarios emulate and comparative illustration:
Scheme proposed by the present invention is emulated by MATLAB.In simulation model, the spatial cache of fringe node is 1GB, for the size of data of information of vehicles between 10MB to 50MB, required data packet (i.e. transmission data) size is 1MB.Between node Transmission rate be 15Mbps.To simplify the calculation, all fringe nodes have identical channel loss coefficient and transimission power P, P =2Watt, bandwidth 107Hz。
In order to preferably assess the performance of inventive algorithm, we will compare other two kinds of algorithms:
(1) buffering scheme (BCBS) based on block chain: i.e. vehicle is all authenticated in block link network network layers;
(2) it reaches method scheme (LRBS) recently: when there is new vehicle to enter in the coverage area of fringe node, arriving earliest Facility information up to vehicle will be removed out of node spatial cache, newly to arrive the information substitution of vehicle;
(3) the matched scheme of multi-to-multi proposed by the present invention (MMBS): fringe node consider vehicle data package size with Global information distributes spatial cache to high-efficiency dynamic.
In emulation, by changing the parameters such as rolling stock quantity, fringe node density and caching space size, three kinds are calculated Method comparison, from the angle estimator algorithm performance of average delay and hit rate.
It is presented in Fig. 3 as overall vehicle quantity changes the variation of lower three kinds of algorithm average delays, quantity increases from 150 Into 550. 3 kinds of algorithms, since BCBS algorithm directly authenticates on block chain, and block chain network is farthest apart from edge vehicle, Therefore the algorithm has maximum time delay.And the curve of both MMBS and LRBS moves towards similar.As vehicle increases, MMBS has Lower time delay.The reason is that although space needed for vehicle alreadys exceed the space that node can be provided as demand increases, The matched scheme of multi-to-multi proposed by the present invention can dynamically distribute space by consideration vehicle fleet size and data cached size, Improve buffer efficiency.Shared contract between this exterior node has also played critically important effect.Therefore, it is based on the matched calculation of multi-to-multi Network congestion can be effectively relieved in traffic jam in method.
In Fig. 4, the hit rate of three kinds of schemes is reduced as vehicle increases.In BCBS scheme, due to all vehicles Data can be buffered in block chain, and hit rate is equal to always 1.And in addition in two schemes, initial time is equal to 1.With Vehicle fleet size increase, aggregate demand is gradually more than available space, so that hit rate is with reduction.However, being proposed based on the present invention The matched scheme of multi-to-multi can still have better performance: it can improve caching effect by considering the global distribution of vehicle Rate, and preferentially meet the needs of data packet lesser vehicle.
Fig. 5 is embodied under different number of nodes distribution occasions, the variation of hit rate when fringe node spatial cache difference. When spatial cache size rises to 2400MB from 400MB, the data of more vehicles can be buffered in edge calculations node.This It is because node can satisfy the demand of more vehicles.On the other hand, as fringe node density increases, hit rate can also be mentioned Height is until close to 1.Disposing more fringe nodes in systems can be improved system cache space, to provide low delay for vehicle Service, and the data sharing between fringe node can also play bigger effect.
The implementation of the embodiments of the present invention has the following beneficial effects:
Present invention combination car networking actual conditions, introduce the car networking system in conjunction with block chain and edge calculations.It realizes The data sharing directly between certification and block chain fringe node between vehicle and fringe node, and matched based on multi-to-multi Edge cache scheme, the caching of dynamic optimization fringe node minimizes average delay, improves data sharing performance, to solve Certainly the above disclosure is only the preferred embodiments of the present invention for demand of the vehicle to authentic authentication and low delay, certainly cannot The interest field of the present invention, therefore equivalent changes made in accordance with the claims of the present invention are limited with this, are still belonged to the present invention and are contained The range of lid.

Claims (5)

1. a kind of method of vehicle authentic authentication and caching based on block chain, which is characterized in that the method includes following steps It is rapid:
Step S1, vehicle authentic authentication framework is established;Wherein, the vehicle authentic authentication framework includes the car networking positioned at bottom Layer, the block chain fringe node layer positioned at middle layer and the block link network network layers positioned at top layer;
Step S2, it is based on the vehicle authentic authentication framework, establishing system mode: there is random distribution in the car networking layer Vehicle set V={ V1,V2,L,VM};Fringe node set B=is distributed with by Poisson process in the block chain fringe node layer {B1,B2,L,BN, and fringe node BiTransmission connection is established with one or more vehicles in the vehicle set;The block Link network network layers are to fringe node B in the fringe node setiIt is assigned bandwidth Wi;Wherein, i, N, M are positive integer, and i= {1,2,...,N};
Step S3, it is based on the system mode, establishes authentic authentication mechanism of the vehicle on block chain: vehicle VkBy vehicle Information and privacy policy upload to fringe node Bi;Fringe node BiReceive vehicle VkAfter the information of vehicles and privacy policy of upload, Registration request instruction is initiated to the block link network network layers, and waiting receives allowing to register and asking for block link network network layers feedback After asking instruction, by vehicle VkInformation of vehicles cache while being forwarded in the block link network network layers by spatial cache, And further according to vehicle VkPrivacy policy generate corresponding ID, private key and public key and be handed down to vehicle Vk;The block chain network Layer receives fringe node BiThe vehicle V of forwardingkInformation of vehicles generate memory block storage, and give vehicle VkCreate corresponding intelligence Contract, and further give vehicle VkCreation and fringe node BiRelated location matrix Li,k=[li,k]N×MAnd caching matrix Ci,k=[ci,k]N×M;Wherein, k is positive integer, and k={ 1,2 ..., M };
Step S4, as fringe node BiNew vehicle V is detectedjWhen into its overlay area, fringe node BiTo new vehicle VjInto Row certification and authorization;Wherein, j is positive integer, and j={ 1,2 ..., M };
Step S5, to new vehicle VjAfter certification and authorization pass through, new vehicle V is foundjThe corresponding position in the block link network network layers Set matrix Li,j=[li,j]N×MWith caching Matrix Ci,j=[ci,j]N×M, and obtain new vehicle VjWith fringe node BiBetween time delay Relationship, and further according to new vehicle VjLocation matrix Li,j=[li,j]N×M, caching matrix Ci,j=[ci,j]N×MAnd its and side Edge node BiBetween time delay relationship, construct objective function:
Step S6, it converts the objective function to based on fringe node BiWith new vehicle VjOptimum Matching problem, and using more Optimal solution is asked to how matched algorithm, obtains new vehicle VjWhen obtaining the minimum average B configuration of required data from the block link network network layers Prolong.
2. the method for vehicle authentic authentication and caching based on block chain as described in claim 1, which is characterized in that the step Rapid S4 guarantees the communication security between fringe node and vehicle using Digital Signature Algorithm, specifically includes:
The first step, fringe node BiEstablish private key and public key: fringe node BiSelect random number s for private keyAnd it calculates Public key PKBS=sP, and further establish two hash functions H1 and H2;Wherein, H1:H2:P, q are prime number;
Second step, fringe node BiExtract private key and public key: fringe node BiNew vehicle V is registered in the block link network network layersj Afterwards, another random number is selectedAnd calculate following formula (1)~(3):
Rj=rj·P(1)
hj=H1(IDj,Rj,PKBS)(2)
uj=(rj+hj·s)mod q(3)
Wherein, IDjFor new vehicle VjID;
Later, fringe node BiBy (Rj,uj) it is sent to new vehicle Vj, and new vehicle VjCheck information can be carried out by formula (4) Reliability:
ujP=Rj+H1(IDj,Rj,PKBE)·P(4)
Third step, new vehicle VjForm signing messages: new vehicle VjIt is signed to information m to reinforce confidentiality, new vehicle VjSelection one A random number xjAs vehicle private keyCorresponding public key PK is calculated laterj=xjP, and according to Digital Signature Algorithm, it can To obtain:
Xj=H2(IDj,PKj,Rj,PKBE,m)(5)
vj=(Xj·uj+xj)mod q(6)
Later according to formula (5) and (6), new vehicle V is obtainedjSigning messages to message m is (m, PKj,uj);
4th step, fringe node BiVerify new vehicle VjSigning messages: fringe node BiReceive new vehicle VjSigning messages (m, PKj,uj) after, it is verified by formula (7) to verify the reliability of message:
vjP=Rj+H2(IDj,Rj,PKBE)·P(7)
Only under conditions of formula is set up, fringe node BiDigital signature can just be received and to new vehicle VjOpen permission.
3. the method for vehicle authentic authentication and caching based on block chain as described in claim 1, which is characterized in that the step Rapid S5 is specifically included:
Obtain new vehicle VjThe corresponding location matrix L in the block link network network layersi,j=[li,j]N×MWith caching Matrix Ci,j= [ci,j]N×M
Obtain new vehicle VjWith fringe node BiBetween time delay relationship, specifically have following several:
(1) if fringe node BiSpatial cache cached new vehicle VjVehicle information data, new vehicle V at this timejIt can be direct From fringe node BiDownloading data meets li,j·ci,j=1, obtaining time delay isWherein, sjFor fringe node BiWith new vehicle VjBetween transmission size of data,dajFor new vehicle VjVehicle Information data size;PkFor transimission power,For noise power;For fringe node BiWith new vehicle VjBetween path damage It loses, fi,jFor fixed coefficient, Ri,jFor fringe node BiWith new vehicle VjBetween transmission rate;
(2) if fringe node BiThe uncached new vehicle V of spatial cachejVehicle information data, and other edge node BkCaching New vehicle VjVehicle information data, and fringe node BkWith fringe node BiThe distance between be Di,kAnd average bandwidth is Bi,k, obtaining time delay is
(3) if the uncached new vehicle V of the spatial cache of all fringe nodes alljVehicle information data, new vehicle V at this timejIt can only It initiates to request to the block link network network layers, obtaining time delay isWherein, R0It is given for the block link network network layers Fixed intrinsic download transmission rate;γ is weight coefficient;
According to new vehicle VjWith fringe node BiBetween time delay relationship, obtain new vehicle VjIt is obtained from the block link network network layers The time delay of required data isAnd to seek minimum average B configuration time delay, objective function and its corresponding constraint item are constructed Part are as follows:
C,L∈{0,1}N×M, (8);
Wherein, CapiFor fringe node BiSpatial cache size.
4. the method for vehicle authentic authentication and caching based on block chain as claimed in claim 3, which is characterized in that the step Rapid S6 is specifically included:
Define a benefit functionTo indicate fringe node BiTo give new vehicle VjDistribute system consumption when spatial cache, the benefit function fi(j) value is smaller, shows fringe node BiIt can be deposited with lesser It stores up space and provides low delay service for vehicle;Wherein, ρ is the weight coefficient of cache resources;For fringe node BiWith new vehicle VjBetween time delay;
Based on the benefit function fi(j), fringe node B is constructediThe first of one-to-many mapping relations is formed between each vehicle Preference listAnd building new vehicle VjThe of one-to-many mapping relations is formed between all fringe nodes Two preference listWherein,
Maximum value MAX Φ in first preference list is setiVehicle in fringe node BiSpatial cache distribution when obtain it is excellent Maximum value MAX ψ in first and described second preference listjThe spatial cache of fringe node preferentially distribute to new vehicle Vj
First preference list and second preference list are polled and seek optimal solution using the matched algorithm of multi-to-multi, And according to the optimal solution acquired, new vehicle V is obtainedjThe minimum average B configuration time delay of required data is obtained from the block link network network layers.
5. the method for vehicle authentic authentication and caching based on block chain as claimed in claim 4, which is characterized in that the benefit First preference list and second preference list are polled and seek optimal solution with the matched algorithm of multi-to-multi, and according to The optimal solution acquired obtains new vehicle VjThe specific step of the minimum average B configuration time delay of required data is obtained from the block link network network layers Suddenly include:
First preference list and second preference list are initialized, and list pointer is respectively directed to described Maximum value in first preference list and second preference list;
First preference list and second preference list are polled;Wherein, fringe node BiPartially according to described first The preferential allocation space of sequence of the size of good list intermediate value from high to low to vehicle, until spatial cache be all assigned for Only;New vehicle VjFringe node is preferentially selected according to the size sequence from high to low of the second preference list intermediate value, until Until finding corresponding fringe node;
After to be polled, new vehicle V is obtainedjThe caching matrix C of optimizationi,j, and according to the caching matrix of obtained optimization Ci,j, calculate new vehicle VjThe minimum average B configuration time delay of required data is obtained from the block link network network layers.
CN201811474196.2A 2018-12-04 2018-12-04 Vehicle credibility authentication and caching method based on block chain Active CN109729504B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811474196.2A CN109729504B (en) 2018-12-04 2018-12-04 Vehicle credibility authentication and caching method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811474196.2A CN109729504B (en) 2018-12-04 2018-12-04 Vehicle credibility authentication and caching method based on block chain

Publications (2)

Publication Number Publication Date
CN109729504A true CN109729504A (en) 2019-05-07
CN109729504B CN109729504B (en) 2022-02-15

Family

ID=66295538

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811474196.2A Active CN109729504B (en) 2018-12-04 2018-12-04 Vehicle credibility authentication and caching method based on block chain

Country Status (1)

Country Link
CN (1) CN109729504B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111182497A (en) * 2019-12-27 2020-05-19 国家计算机网络与信息安全管理中心 V2X anonymous authentication method, device and storage medium
CN111404999A (en) * 2020-02-28 2020-07-10 中国电子技术标准化研究院 Vehicle control method and system based on Internet of vehicles
CN112202762A (en) * 2020-09-28 2021-01-08 绍兴文理学院 Game defense strategy optimization method and system for sensing edge cloud intelligent interference attack
CN113543073A (en) * 2021-06-07 2021-10-22 中国联合网络通信集团有限公司 Block checking method and block chain system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107508859A (en) * 2017-07-20 2017-12-22 北京交通大学 Vehicle communication method based on block chain technology in vehicular ad hoc network
CN107705060A (en) * 2017-08-29 2018-02-16 合肥维天运通信息科技股份有限公司 A kind of Logistics Information Platform based on block chain and Internet of Things
US20180117447A1 (en) * 2016-05-02 2018-05-03 Bao Tran Smart device
CN108550226A (en) * 2018-04-17 2018-09-18 暨南大学 Based on block chain technology automotive system and its building method are shared without key
CN108805567A (en) * 2018-05-22 2018-11-13 深圳供电局有限公司 A kind of charging corporate networks transaction settlement method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180117447A1 (en) * 2016-05-02 2018-05-03 Bao Tran Smart device
CN107508859A (en) * 2017-07-20 2017-12-22 北京交通大学 Vehicle communication method based on block chain technology in vehicular ad hoc network
CN107705060A (en) * 2017-08-29 2018-02-16 合肥维天运通信息科技股份有限公司 A kind of Logistics Information Platform based on block chain and Internet of Things
CN108550226A (en) * 2018-04-17 2018-09-18 暨南大学 Based on block chain technology automotive system and its building method are shared without key
CN108805567A (en) * 2018-05-22 2018-11-13 深圳供电局有限公司 A kind of charging corporate networks transaction settlement method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GEORGE STERGIOPOULOS; EVANGELOS VALVIS: "Analyzing Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network Infrastructure", 《 IEEE ACCESS ( VOLUME: 6)》 *
杨柳青: "区块链技术在车联网中的应用研究", 《中国新通信》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111182497A (en) * 2019-12-27 2020-05-19 国家计算机网络与信息安全管理中心 V2X anonymous authentication method, device and storage medium
CN111404999A (en) * 2020-02-28 2020-07-10 中国电子技术标准化研究院 Vehicle control method and system based on Internet of vehicles
CN112202762A (en) * 2020-09-28 2021-01-08 绍兴文理学院 Game defense strategy optimization method and system for sensing edge cloud intelligent interference attack
CN112202762B (en) * 2020-09-28 2022-07-08 绍兴文理学院 Game defense strategy optimization method and system for sensing edge cloud intelligent interference attack
CN113543073A (en) * 2021-06-07 2021-10-22 中国联合网络通信集团有限公司 Block checking method and block chain system
CN113543073B (en) * 2021-06-07 2023-05-09 中国联合网络通信集团有限公司 Block checking method and block chain system

Also Published As

Publication number Publication date
CN109729504B (en) 2022-02-15

Similar Documents

Publication Publication Date Title
Ling et al. Blockchain radio access network (B-RAN): Towards decentralized secure radio access paradigm
CN109729504A (en) A method of vehicle authentic authentication and caching based on block chain
Wang et al. SDN-based handover authentication scheme for mobile edge computing in cyber-physical systems
Zhu et al. SLAB: A secure localized authentication and billing scheme for wireless mesh networks
CN111371730A (en) Lightweight authentication method supporting anonymous access of heterogeneous terminal in edge computing scene
CN109218981B (en) Wi-Fi access authentication method based on position signal feature common recognition
CN101951603A (en) Access control method and system for wireless local area network
CN103079198B (en) The key updating method and system of sensor node
CN101867473B (en) Connection establishment method and access authentication system for blocking-attacking resistant shared media terminal
CN105978883B (en) Safe collecting method under extensive car networking
CN103701700A (en) Node discovering method and system in communication network
He et al. ROAchain: Securing route origin authorization with blockchain for inter-domain routing
Hao et al. Integrating PHY security into NDN-IoT networks by exploiting MEC: Authentication efficiency, robustness, and accuracy enhancement
CN100512108C (en) Method for identifying physical uniqueness of networked terminal, and access authentication system for terminals
CN103731819A (en) Authentication method of wireless sensor network nodes
Lin et al. Blockchain based unified authentication with zero-knowledge proof in heterogeneous MEC
Boubakri et al. Access control in 5G communication networks using simple PKI certificates
CN113810404A (en) SDN (software defined network) -based dynamic defense system and method for full-view transformation of network
CN106507355A (en) A kind of PMIPv6 Verification Systems of identity-based allograph and method
Wang et al. T-IP: A self-trustworthy and secure Internet protocol
CN110493748A (en) A kind of road conditions detection Verification System and method based on mist
CN115766075A (en) Entrusted authentication method based on attribute-based encryption and identity signature
CN101827079A (en) Blocking and attacking-resistant terminal connection building method and terminal access authenticating system
Alicherry et al. Evaluating a collaborative defense architecture for manets
KR100972743B1 (en) Mutual Authentication Scheme between Mobile Routers using Authentication Token in MANET of MANEMO

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant