CN109729504A - A method of vehicle authentic authentication and caching based on block chain - Google Patents
A method of vehicle authentic authentication and caching based on block chain Download PDFInfo
- Publication number
- CN109729504A CN109729504A CN201811474196.2A CN201811474196A CN109729504A CN 109729504 A CN109729504 A CN 109729504A CN 201811474196 A CN201811474196 A CN 201811474196A CN 109729504 A CN109729504 A CN 109729504A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- fringe node
- new vehicle
- new
- time delay
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The present invention provides a kind of method of vehicle authentic authentication and caching based on block chain, including establishes vehicle authentic authentication framework;System mode is established based on vehicle authentic authentication framework;Authentic authentication mechanism of the vehicle on block chain is established based on system mode;When fringe node detects that new vehicle enters its overlay area, new vehicle is authenticated and is authorized;After new vehicle authenticates and authorization passes through, find corresponding location matrix and caching matrix in block link network network layers, and the time delay relationship of new vehicle and fringe node is obtained to construct objective function: converting objective function to the Optimum Matching problem based on fringe node and new vehicle, and the optimal solution of objective function is sought using the matched algorithm of multi-to-multi, obtain the minimum average B configuration time delay that new vehicle obtains required data from block link network network layers.Implement the present invention, is able to solve demand of the vehicle to authentic authentication and low delay.
Description
Technical field
The present invention relates to vehicle networking technical field more particularly to a kind of vehicle authentic authentications and caching based on block chain
Method.
Background technique
With development of the industrial technology of Internet of things in car networking, the data sharing between vehicle is gradually frequent, this also gives number
Serious threat is brought according to safety and personal secrets.In order to realize the real time monitoring to vehicle, promote the data of equipment room total
It enjoys, highly desired one is able to achieve the Verification System of credible access.And to provide the block chain of authentic authentication and personal secrets
It is considered as solving the problems, such as the key technology of authentic authentication.Due to the popularity that the mobility of vehicle is distributed with it, build on merely
The car networking mode of block chain network can not cover all intelligent vehicles.Meanwhile the data mighty torrent that a large amount of vehicles generate also is given
Core network brings great burden.
However, the most of certification be absorbed in and realize equipment of current research, have ignored core network data blocking and
Close to the gras generally recognized as safe of smart machine, it is unable to satisfy demand of the vehicle to authentic authentication and low delay.For example, Patent publication No
For CN107528856A.A kind of hair of entitled Internet of Things mist end equipment based on block chain platform access authentication method beyond the clouds
Bright patent, the patent of invention first initiate the proxy requests of access cloud platform by internet of things equipment to intelligent gateway, then by intelligence
Energy gateway sends the device certificate of internet of things equipment and the device certificate of gateway to block chain network, is authenticated, is then passed through
Block chain network carries out malice differentiation to intelligent gateway, guarantees that the node is not contaminated, to ensure entire block chain network
The safety and uniqueness of data.Although the patent of invention reduces the dependence and usage frequency to cloud platform, but need
By intelligent gateway to the preliminary collection of internet of things equipment data and agency, not in view of gateway brought by the mobility of equipment
Switching.For another example, Patent publication No CN107682331A, a kind of entitled Internet of Things identity identifying method based on block chain
Patent of invention, the patent of invention execute authentication procedures by the intelligent contract operated on block chain automatically, complete entity
Identity registration, identity token can be issued to another entity by entity, its is made to obtain access qualification.Although the patent of invention
Eliminate the authoritative institution of the centralization in authentication procedures, in Internet of Things entity identities certification provide it is just, transparent,
Believable performing environment, but the explosive growth of smart machine is faced, the authentication and access of all devices all rely on
Block chain network, it is clear that will also bring extremely serious load.For another example, Patent publication No CN108270571A, entitled one
For kind based on the Internet of Things identity authorization system of block chain and its patent of invention of method, which includes trusted third party's mould
Block, EM equipment module, line module, intelligent contract module four module;Wherein, trusted third party's module can build block link network
Network;EM equipment module generates public and private key using elliptic curve key generating algorithm;The public and private key of user can be generated in line module, ensures
Privacy;Intelligent contract module realizes certification for class parameter.Although the patent of invention decentralization network, reduces center
The burden of server realizes the anonymity of user data, but can not apply in car networking because of the mobility of vehicle.
For this purpose, need in conjunction with car networking actual conditions, and based on block chain safety certification and fringe node have storage and
The advantages of computing capability, solves demand of the vehicle to authentic authentication and low delay.
Summary of the invention
The technical problem to be solved by the embodiment of the invention is that provide a kind of vehicle authentic authentication based on block chain and
The method of caching is able to solve demand of the vehicle to authentic authentication and low delay.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of vehicle authentic authentication based on block chain and
The method of caching, the described method comprises the following steps:
Step S1, vehicle authentic authentication framework is established;Wherein, the vehicle authentic authentication framework includes the vehicle positioned at bottom
Interconnector layer, the block chain fringe node layer positioned at middle layer and the block link network network layers positioned at top layer;
Step S2, it is based on the vehicle authentic authentication framework, system mode is established: dividing at random in the car networking layer
It is furnished with vehicle set V={ V1,V2,L,VM};Fringe node set is distributed with by Poisson process in the block chain fringe node layer
B={ B1,B2,L,BN, and fringe node BiTransmission connection is established with one or more vehicles in the vehicle set;It is described
Block link network network layers are to fringe node B in the fringe node setiIt is assigned bandwidth Wi;Wherein, i, N, M are positive integer, and
I=1,2 ..., N };
Step S3, it is based on the system mode, establishes authentic authentication mechanism of the vehicle on block chain: vehicle VkIt will
Information of vehicles and privacy policy upload to fringe node Bi;Fringe node BiReceive vehicle VkThe information of vehicles of upload and privacy political affairs
After plan, Xiang Suoshu block link network network layers initiate registration request instruction, and the permission waiting for receiving the block link network network layers feedback
After registration request instruction, by vehicle VkInformation of vehicles carry out caching while being forwarded to the block chain network by spatial cache
On layer, and further according to vehicle VkPrivacy policy generate corresponding ID, private key and public key and be handed down to vehicle Vk;The block
Link network network layers receive fringe node BiThe vehicle V of forwardingkInformation of vehicles generate memory block storage, and give vehicle VkCreation corresponds to
Intelligent contract, and further give vehicle VkCreation and fringe node BiRelated location matrix Li,k=[li,k]N×MAnd caching
Matrix Ci,k=[ci,k]N×M;Wherein, k is positive integer, and k={ 1,2 ..., M };
Step S4, as fringe node BiNew vehicle V is detectedjWhen into its overlay area, fringe node BiTo new vehicle
VjIt is authenticated and is authorized;Wherein, j is positive integer, and j={ 1,2 ..., M };
Step S5, to new vehicle VjAfter certification and authorization pass through, new vehicle V is foundjIt corresponds in the block link network network layers
Location matrix Li,j=[li,j]N×MWith caching Matrix Ci,j=[ci,j]N×M, and obtain new vehicle VjWith fringe node BiBetween
Time delay relationship, and further according to new vehicle VjLocation matrix Li,j=[li,j]N×M, caching matrix Ci,j=[ci,j]N×MAnd its
With fringe node BiBetween time delay relationship, construct objective function:
Step S6, it converts the objective function to based on fringe node BiWith new vehicle VjOptimum Matching problem, and benefit
The optimal solution that the objective function is sought with the matched algorithm of multi-to-multi, obtains new vehicle VjInstitute is obtained from the block link network network layers
Need the minimum average B configuration time delay of data.
Wherein, the step S4 guarantees the communication security between fringe node and vehicle using Digital Signature Algorithm, specifically
Include:
The first step, fringe node BiEstablish private key and public key: fringe node BiSelect random number s for private keyAnd it counts
Calculate public key PKBS=sP, and further establish two hash functions H1 and H2;Wherein,P, q are prime number;
Second step, fringe node BiExtract private key and public key: fringe node BiNew car is registered in the block link network network layers
VjAfterwards, another random number is selectedAnd calculate following formula (1)~(3):
Rj=rj·P (1)
hj=H1(IDj,Rj,PKBS) (2)
uj=(rj+hj·s)mod q (3)
Wherein, IDjFor new vehicle VjID;
Later, fringe node BiBy (Rj,uj) it is sent to new vehicle Vj, and new vehicle VjIt can be verified by formula (4)
The reliability of information:
ujP=Rj+H1(IDj,Rj,PKBE)·P (4)
Third step, new vehicle VjForm signing messages: new vehicle VjIt is signed to information m to reinforce confidentiality, new vehicle VjChoosing
Select a random number xjAs vehicle private keyCorresponding public key PK is calculated laterj=xjP, and calculated according to digital signature
Method, available:
Xj=H2(IDj,PKj,Rj,PKBE,m) (5)
vj=(Xj·uj+xj)mod q (6)
Later according to formula (5) and (6), new vehicle V is obtainedjSigning messages to message m is (m, PKj,uj);
4th step, fringe node BiVerify new vehicle VjSigning messages: fringe node BiReceive new vehicle VjA.L.S.
Cease (m, PKj,uj) after, it is verified by formula (7) to verify the reliability of message:
vjP=Rj+H2(IDj,Rj,PKBE)·P (7)
Only under conditions of formula is set up, fringe node BiDigital signature can just be received and to new vehicle VjOpen power
Limit.
Wherein, the step S5 is specifically included:
Obtain new vehicle VjThe corresponding location matrix L in the block link network network layersi,j=[li,j]N×MAnd caching matrix
Ci,j=[ci,j]N×M;
Obtain new vehicle VjWith fringe node BiBetween time delay relationship, specifically have following several:
(1) if fringe node BiSpatial cache cached new vehicle VjVehicle information data, new vehicle V at this timejIt can be with
Directly from fringe node BiDownloading data meets li,j·ci,j=1, obtaining time delay isWherein, sjFor edge
Node BiWith new vehicle VjBetween transmission size of data,dajFor new vehicle Vj
Vehicle information data size;PkFor transimission power,For noise power;For fringe node BiWith new vehicle VjBetween road
Diameter loss, fi,jFor fixed coefficient, Ri,jFor fringe node BiWith new vehicle VjBetween transmission rate;
(2) if fringe node BiThe uncached new vehicle V of spatial cachejVehicle information data, and other edge node Bk
New vehicle V is cachedjVehicle information data, and fringe node BkWith fringe node BiThe distance between be Di,kAnd average bandwidth
For Bi,k, obtaining time delay is
(3) if the uncached new vehicle V of the spatial cache of all fringe nodes alljVehicle information data, new vehicle V at this timej
It can only initiate to request to the block link network network layers, obtaining time delay isWherein, R0For the block chain network
The given intrinsic download transmission rate of layer;γ is weight coefficient;
According to new vehicle VjWith fringe node BiBetween time delay relationship, obtain new vehicle VjFrom the block link network network layers
The time delay of data needed for obtaining isAnd to seek minimum average B configuration time delay, construct objective function and its it is corresponding about
Beam condition are as follows:
C,L∈{0,1}N×M, (8);
Wherein, CapiFor fringe node BiSpatial cache size.
Wherein, the step S6 is specifically included:
Define a benefit functionTo indicate fringe node BiIt will be to new
Vehicle VjDistribute system consumption when spatial cache, the benefit function fi(j) value is smaller, shows fringe node BiIt can use smaller
Memory space provide low delay service for vehicle;Wherein, ρ is the weight coefficient of cache resources;For fringe node BiWith it is new
Vehicle VjBetween time delay;
Based on the benefit function fi(j), fringe node B is constructediOne-to-many mapping relations are formed between each vehicle
First preference listAnd building new vehicle VjOne-to-many mapping relations are formed between all fringe nodes
Second preference listWherein,
Maximum value MAX Φ in first preference list is setiVehicle in fringe node BiSpatial cache distribution when obtain
Maximum value MAX ψ preferentially and in second preference listjThe spatial cache of fringe node preferentially distribute to new vehicle
Vj;
First preference list and second preference list are polled and are asked most using the matched algorithm of multi-to-multi
Excellent solution, and according to the optimal solution acquired, obtain new vehicle VjThe minimum average B configuration of required data is obtained from the block link network network layers
Time delay.
Wherein, described that first preference list and second preference list are carried out using the matched algorithm of multi-to-multi
Poll seeks optimal solution, and according to the optimal solution acquired, obtains new vehicle VjRequired data are obtained from the block link network network layers
The specific steps of minimum average B configuration time delay include:
First preference list and second preference list are initialized, and list pointer is respectively directed to
Maximum value in first preference list and second preference list;
First preference list and second preference list are polled;Wherein, fringe node BiAccording to described
The preferential allocation space of sequence of the size of first preference list intermediate value from high to low is to vehicle, until spatial cache all distributes
Until finishing;New vehicle VjFringe node is preferentially selected according to the size sequence from high to low of the second preference list intermediate value,
Until finding corresponding fringe node;
After to be polled, new vehicle V is obtainedjThe caching matrix C of optimizationi,j, and according to the caching square of obtained optimization
Battle array Ci,j, calculate new vehicle VjThe minimum average B configuration time delay of required data is obtained from the block link network network layers.
The implementation of the embodiments of the present invention has the following beneficial effects:
Present invention combination car networking actual conditions, introduce the car networking system in conjunction with block chain and edge calculations.It realizes
The data sharing directly between certification and block chain fringe node between vehicle and fringe node, and matched based on multi-to-multi
Edge cache scheme, the caching of dynamic optimization fringe node minimizes average delay, improves data sharing performance, to solve
Certainly demand of the vehicle to authentic authentication and low delay.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention, for those of ordinary skill in the art, without any creative labor, according to
These attached drawings obtain other attached drawings and still fall within scope of the invention.
Fig. 1 is the flow chart of the method for the vehicle authentic authentication and caching provided in an embodiment of the present invention based on block chain;
Fig. 2 is provided in an embodiment of the present invention based on the vehicle authentic authentication of block chain and the network topology structure of caching
Figure;
Fig. 3 is three kinds of algorithms in the method for the vehicle authentic authentication and caching provided in an embodiment of the present invention based on block chain
Obtain the comparison diagram that average delay changes with vehicle fleet size;
Fig. 4 is three kinds of algorithms in the method for the vehicle authentic authentication and caching provided in an embodiment of the present invention based on block chain
Obtain the comparison diagram that hit rate changes with vehicle fleet size;
Fig. 5 is three kinds of algorithms in the method for the vehicle authentic authentication and caching provided in an embodiment of the present invention based on block chain
Hit rate is obtained with the comparison diagram of edge nodal cache spatial variations.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, the present invention is made into one below in conjunction with attached drawing
Step ground detailed description.
As shown in Figure 1, in the embodiment of the present invention, a kind of vehicle authentic authentication and caching based on block chain of proposition
Method, this method show the process to vehicle authentic authentication and time delay optimization, specifically includes the following steps:
Step S1, vehicle authentic authentication framework is established;Wherein, the vehicle authentic authentication framework includes the vehicle positioned at bottom
Interconnector layer, the block chain fringe node layer positioned at middle layer and the block link network network layers positioned at top layer;
Detailed process is, as shown in Fig. 2, the car networking layer of bottom can allow intelligent vehicle pass through big quantity sensor to receive
Data needed for collecting simultaneously pass it to other vehicles or server, but lack access control mechanism and encipherment protection;Middle layer
Block chain fringe node layer can be according to the facility information of the timely synchronized update vehicle of movable vehicle, and can register on block chain
Vehicle, while intelligent contract is created after obtaining vehicle permission, in addition to this data sharing between fringe node helps to subtract
Few propagation delay time alleviates the data blocking of block chain core network;The block link network network layers of top layer can provide the storage of centralization
Facility information and the service for creating intelligent contract, can orderly store and record facility information and transaction, and every record can fill
When timestamp and unique encrypted symbols.
Step S2, it is based on the vehicle authentic authentication framework, system mode is established: dividing at random in the car networking layer
It is furnished with vehicle set V={ V1,V2,L,VM};Fringe node set is distributed with by Poisson process in the block chain fringe node layer
B={ B1,B2,L,BN, and fringe node BiTransmission connection is established with one or more vehicles in the vehicle set;It is described
Block link network network layers are to fringe node B in the fringe node setiIt is assigned bandwidth Wi;Wherein, i, N, M are positive integer, and
I=1,2 ..., N };
Detailed process is that fringe node is distributed by Poisson process (PPP), and fringe node collection is combined into B={ B1,B2,L,BN,
Random distribution has vehicle collection to be combined into V={ V in car networking layer1,V2,L,VM, block link network network layers give fringe node BiThe band of distribution
Width is Wi;Wherein, fringe node BiDownlink and one or more vehicles establish transmission connection, and uplink and block link network network layers are established
Transmission connection.
Due to that can realize data sharing by channel between fringe node, vehicle can also be set from other cached
The node of standby information obtains required data.It should be noted that being the condition for caching information of vehicles in all fringe nodes
Under, which can only obtain data from block link network network layers, i.e., all fringe nodes are used to store the spatial cache of information of vehicles
In the case where having expired, the information of vehicles of vehicle can only be stored on the central server of block link network network layers.At this point, block link network
Network layers can provide intrinsic downloading rate R0, and the intrinsic downloading rate R0The generally below transmission rate of fringe node offer.
Step S3, it is based on the system mode, establishes authentic authentication mechanism of the vehicle on block chain: vehicle VkIt will
Information of vehicles and privacy policy upload to fringe node Bi;Fringe node BiReceive vehicle VkThe information of vehicles of upload and privacy political affairs
After plan, Xiang Suoshu block link network network layers initiate registration request instruction, and the permission waiting for receiving the block link network network layers feedback
After registration request instruction, by vehicle VkInformation of vehicles carry out caching while being forwarded to the block chain network by spatial cache
On layer, and further according to vehicle VkPrivacy policy generate corresponding ID, private key and public key and be handed down to vehicle Vk;The block
Link network network layers receive fringe node BiThe vehicle V of forwardingkInformation of vehicles generate memory block storage, and give vehicle VkCreation corresponds to
Intelligent contract, and further give vehicle VkCreation and fringe node BiRelated location matrix Li,k=[li,k]N×MAnd caching
Matrix Ci,k=[ci,k]N×M;Wherein, k is positive integer, and k={ 1,2 ..., M };
Detailed process is vehicle V firstkInformation of vehicles and privacy policy are uploaded into fringe node Bi;Then, edge section
Point BiReceive vehicle VkAfter the information of vehicles and privacy policy of upload, registration request instruction is initiated to block link network network layers, and waiting
After the permission registration request instruction for receiving block link network network layers feedback, by vehicle VkInformation of vehicles delayed by spatial cache
It deposits while being forwarded in block link network network layers, so that block link network network layers generate memory block and store vehicle VkInformation of vehicles simultaneously
Give vehicle VkCreate corresponding intelligent contract;Then, fringe node BiAccording to vehicle VkPrivacy policy generate corresponding ID, private
Key and public key are handed down to vehicle Vk。
Intelligent contract has the script of unique address, and after address is triggered, it can be independently automatically at each edge
It is executed on node.By the way that after trading and being sent to the address, trusted node can trigger intelligent contract, so as to not reveal
The premise of equipment privacy is directly that vehicle is authenticated.
Public and private key can be used to implement the user's control to block chain.Private key can modify to transaction, need secret guarantor
It deposits, and public key can be occurred to allow it to download facility information to trusted node by vehicle.When vehicle enters the covering of different nodes
When in range, public key can be sent and directly authenticated later in fringe node.
By intelligent contract, asymmetric encryption mechanism, the car networking based on block chain has ensured the reliability of certification, data
Completely with can not distort.It establishes distributed end to end network, and vehicle, which does not need trusted intermediary, to link up with other vehicles.
Block link network network layers are in order to indicate vehicle VkWith fringe node BiPositional relationship, define location matrix Li,k=
[li,k]N×M, and for vehicle VkWith the spatial cache relationship of fringe node, caching matrix C is definedi,k=[ci,k]N×M;Wherein,
Step S4, as fringe node BiNew vehicle V is detectedjWhen into its overlay area, fringe node BiTo new vehicle
VjIt is authenticated and is authorized;Wherein, j is positive integer, and j={ 1,2 ..., M };
Detailed process is to guarantee the communication security between fringe node and vehicle using Digital Signature Algorithm, specifically include:
The first step, fringe node BiEstablish private key and public key: fringe node BiSelect random number s for private keyAnd it counts
Calculate public key PKBS=sP, and further establish two hash functions H1 and H2;Wherein,P, q are prime number;It should be noted that these data can be as public affairs
It is broadcasted in systems with parameter.
Second step, fringe node BiExtract private key and public key: fringe node BiNew car is registered in the block link network network layers
VjAfterwards, another random number is selectedAnd calculate following formula (1)~(3):
Rj=rj·P (1)
hj=H1(IDj,Rj,PKBS) (2)
uj=(rj+hj·s)mod q (3)
Wherein, IDjFor new vehicle VjID;
Later, fringe node BiBy (Rj,uj) it is sent to new vehicle Vj, and new vehicle VjIt can be verified by formula (4)
The reliability of information:
ujP=Rj+H1(IDj,Rj,PKBE)·P (4)
Third step, new vehicle VjForm signing messages: new vehicle VjIt is signed to information m to reinforce confidentiality, new vehicle VjChoosing
Select a random number xjAs vehicle private keyCorresponding public key PK is calculated laterj=xjP, and calculated according to digital signature
Method, available:
Xj=H2(IDj,PKj,Rj,PKBE,m) (5)
vj=(Xj·uj+xj)mod q (6)
Later according to formula (5) and (6), new vehicle V is obtainedjSigning messages to message m is (m, PKj,uj);
4th step, fringe node BiVerify new vehicle VjSigning messages: fringe node BiReceive new vehicle VjA.L.S.
Cease (m, PKj,uj) after, it is verified by formula (7) to verify the reliability of message:
vjP=Rj+H2(IDj,Rj,PKBE)·P (7)
Only under conditions of formula is set up, fringe node BiDigital signature can just be received and to new vehicle VjOpen power
Limit.
Step S5, to new vehicle VjAfter certification and authorization pass through, new vehicle V is foundjIt corresponds in the block link network network layers
Location matrix Li,j=[li,j]N×MWith caching Matrix Ci,j=[ci,j]N×M, and obtain new vehicle VjWith fringe node BiBetween
Time delay relationship, and further according to new vehicle VjLocation matrix Li,j=[li,j]N×M, caching matrix Ci,j=[ci,j]N×MAnd its
With fringe node BiBetween time delay relationship, construct objective function:
Detailed process is to obtain new vehicle VjThe corresponding location matrix L in block link network network layersi,j=[li,j]N×MIt is gentle
Deposit Matrix Ci,j=[ci,j]N×M;
As new vehicle VjWhen needing to obtain required data from higher level server, it can choose three kinds of cache paths point
Do not have three kinds of different delays, therefore new vehicle VjWith fringe node BiBetween time delay relationship it is specific as follows:
(1) if fringe node BiSpatial cache cached new vehicle VjVehicle information data, new vehicle V at this timejIt can be with
Directly from fringe node BiDownloading data meets li,j·ci,j=1, obtaining time delay isWherein, sjFor edge
Node BiWith new vehicle VjBetween transmission size of data,dajFor new vehicle Vj's
Vehicle information data size;PkFor transimission power,For noise power;For fringe node BiWith new vehicle VjBetween path
Loss, fi,jFor fixed coefficient, Ri,jFor fringe node BiWith new vehicle VjBetween transmission rate;
(2) if fringe node BiThe uncached new vehicle V of spatial cachejVehicle information data, and other edge node Bk
New vehicle V is cachedjVehicle information data, and fringe node BkWith fringe node BiThe distance between be Di,kAnd average bandwidth
For Bi,k, obtaining time delay is
(3) if the uncached new vehicle V of the spatial cache of all fringe nodes alljVehicle information data, new vehicle V at this timej
It can only initiate to request to the block link network network layers, obtaining time delay isWherein, R0It is given for block link network network layers
Fixed intrinsic download transmission rate;γ is weight coefficient;
According to new vehicle VjWith fringe node BiBetween time delay relationship, obtain new vehicle VjFrom the block link network network layers
The time delay of data needed for obtaining isAnd to seek minimum average B configuration time delay, construct objective function and its it is corresponding about
Beam condition are as follows:
C,L∈{0,1}N×M, (8);
Wherein, CapiFor fringe node BiSpatial cache size.
It should be noted that indicating fringe node with hit rate (hit ratio) to assess the performance of buffering scheme
A possibility that caching the facility information of vehicle in coverage area, thus obtains:
Step S6, it converts the objective function to based on fringe node BiWith new vehicle VjOptimum Matching problem, and benefit
The optimal solution that the objective function is sought with the matched algorithm of multi-to-multi, obtains new vehicle VjInstitute is obtained from the block link network network layers
Need the minimum average B configuration time delay of data.
Detailed process is that the objective function that above-mentioned formula (8) is formed is a NP-hard problem, therefore proposes and be based on
Multi-to-multi matched algorithm solves.In fringe node BiWith new vehicle VjOptimum Matching in, fringe node BiWith new vehicle Vj
It is game object.
In view of propagation delay time and data cached size, a benefit function is definedTo indicate fringe node BiTo give new vehicle VjDistribute spatial cache when be
System consumption, benefit function fi(j) value is smaller, shows fringe node BiLow delay can be provided for vehicle with lesser memory space
Service;Wherein, ρ is the weight coefficient of cache resources;For fringe node BiWith new vehicle VjBetween time delay.It should illustrate
, new vehicle V is indicated when i is equal to N+1jIt needs to be fed back from block link network network layers;
Based on benefit function fi(j), fringe node B is constructediThe of one-to-many mapping relations is formed between each vehicle
One preference listAnd building new vehicle VjOne-to-many mapping is formed between all fringe nodes to close
Second preference list of systemWherein,
Maximum value MAX Φ in first preference list is setiVehicle in fringe node BiSpatial cache distribution when obtain it is excellent
Maximum value MAX ψ in first and the second preference listjThe spatial cache of fringe node preferentially distribute to new vehicle Vj;
First preference list and the second preference list are polled and seek optimal solution using the matched algorithm of multi-to-multi,
And according to the optimal solution acquired, new vehicle V is obtainedjThe minimum average B configuration time delay of required data is obtained from block link network network layers.At this point,
First preference list and the second preference list are initialized, and list pointer is respectively directed to the first preference list and
Maximum value in two preference list;First preference list and the second preference list are polled;Wherein, fringe node BiAccording to
The preferential allocation space of sequence of the size of first preference list intermediate value from high to low is to vehicle, until spatial cache all distributes
Until finishing;New vehicle VjFringe node is preferentially selected according to the size sequence from high to low of the second preference list intermediate value, until
Until finding corresponding fringe node;After to be polled, new vehicle V is obtainedjThe caching matrix C of optimizationi,j, and according to gained
The caching matrix C for the optimization arrivedi,j, calculate new vehicle VjThe minimum average B configuration of required data is obtained from the block link network network layers
Time delay.
It should be noted that in each round circulation, the vehicle for the fringe node allocation space not being selected in last round of
Pointer can be directed toward in the second preference list remaining value maximum fringe node and to issue request.Terminate in each round
Afterwards, if vehicle is selected, pointer will no longer change.Otherwise pointer can be shifted to next node by it.When all vehicles
After all having found the fringe node for being suitble to caching or block link network network layers, algorithm circulation terminates.
To sum up, the present invention realizes the data sharing in the authentic authentication and different car networking networks of vehicle, reduces transmission
Time delay improves network storage capabilities, improves certification speed;The authentication mechanism based on block chain is established, for reliably testing for vehicle
Card provides guarantee, while preventing linking by malicious attack between vehicle and fringe node;It proposes to be matched according to multi-to-multi and calculate
The edge cache scheme of method minimizes average delay, enhances cooperation shared.
As shown in Figures 3 to 5, to the method for the vehicle authentic authentication and caching based on block chain in the embodiment of the present invention
Application scenarios emulate and comparative illustration:
Scheme proposed by the present invention is emulated by MATLAB.In simulation model, the spatial cache of fringe node is
1GB, for the size of data of information of vehicles between 10MB to 50MB, required data packet (i.e. transmission data) size is 1MB.Between node
Transmission rate be 15Mbps.To simplify the calculation, all fringe nodes have identical channel loss coefficient and transimission power P, P
=2Watt, bandwidth 107Hz。
In order to preferably assess the performance of inventive algorithm, we will compare other two kinds of algorithms:
(1) buffering scheme (BCBS) based on block chain: i.e. vehicle is all authenticated in block link network network layers;
(2) it reaches method scheme (LRBS) recently: when there is new vehicle to enter in the coverage area of fringe node, arriving earliest
Facility information up to vehicle will be removed out of node spatial cache, newly to arrive the information substitution of vehicle;
(3) the matched scheme of multi-to-multi proposed by the present invention (MMBS): fringe node consider vehicle data package size with
Global information distributes spatial cache to high-efficiency dynamic.
In emulation, by changing the parameters such as rolling stock quantity, fringe node density and caching space size, three kinds are calculated
Method comparison, from the angle estimator algorithm performance of average delay and hit rate.
It is presented in Fig. 3 as overall vehicle quantity changes the variation of lower three kinds of algorithm average delays, quantity increases from 150
Into 550. 3 kinds of algorithms, since BCBS algorithm directly authenticates on block chain, and block chain network is farthest apart from edge vehicle,
Therefore the algorithm has maximum time delay.And the curve of both MMBS and LRBS moves towards similar.As vehicle increases, MMBS has
Lower time delay.The reason is that although space needed for vehicle alreadys exceed the space that node can be provided as demand increases,
The matched scheme of multi-to-multi proposed by the present invention can dynamically distribute space by consideration vehicle fleet size and data cached size,
Improve buffer efficiency.Shared contract between this exterior node has also played critically important effect.Therefore, it is based on the matched calculation of multi-to-multi
Network congestion can be effectively relieved in traffic jam in method.
In Fig. 4, the hit rate of three kinds of schemes is reduced as vehicle increases.In BCBS scheme, due to all vehicles
Data can be buffered in block chain, and hit rate is equal to always 1.And in addition in two schemes, initial time is equal to 1.With
Vehicle fleet size increase, aggregate demand is gradually more than available space, so that hit rate is with reduction.However, being proposed based on the present invention
The matched scheme of multi-to-multi can still have better performance: it can improve caching effect by considering the global distribution of vehicle
Rate, and preferentially meet the needs of data packet lesser vehicle.
Fig. 5 is embodied under different number of nodes distribution occasions, the variation of hit rate when fringe node spatial cache difference.
When spatial cache size rises to 2400MB from 400MB, the data of more vehicles can be buffered in edge calculations node.This
It is because node can satisfy the demand of more vehicles.On the other hand, as fringe node density increases, hit rate can also be mentioned
Height is until close to 1.Disposing more fringe nodes in systems can be improved system cache space, to provide low delay for vehicle
Service, and the data sharing between fringe node can also play bigger effect.
The implementation of the embodiments of the present invention has the following beneficial effects:
Present invention combination car networking actual conditions, introduce the car networking system in conjunction with block chain and edge calculations.It realizes
The data sharing directly between certification and block chain fringe node between vehicle and fringe node, and matched based on multi-to-multi
Edge cache scheme, the caching of dynamic optimization fringe node minimizes average delay, improves data sharing performance, to solve
Certainly the above disclosure is only the preferred embodiments of the present invention for demand of the vehicle to authentic authentication and low delay, certainly cannot
The interest field of the present invention, therefore equivalent changes made in accordance with the claims of the present invention are limited with this, are still belonged to the present invention and are contained
The range of lid.
Claims (5)
1. a kind of method of vehicle authentic authentication and caching based on block chain, which is characterized in that the method includes following steps
It is rapid:
Step S1, vehicle authentic authentication framework is established;Wherein, the vehicle authentic authentication framework includes the car networking positioned at bottom
Layer, the block chain fringe node layer positioned at middle layer and the block link network network layers positioned at top layer;
Step S2, it is based on the vehicle authentic authentication framework, establishing system mode: there is random distribution in the car networking layer
Vehicle set V={ V1,V2,L,VM};Fringe node set B=is distributed with by Poisson process in the block chain fringe node layer
{B1,B2,L,BN, and fringe node BiTransmission connection is established with one or more vehicles in the vehicle set;The block
Link network network layers are to fringe node B in the fringe node setiIt is assigned bandwidth Wi;Wherein, i, N, M are positive integer, and i=
{1,2,...,N};
Step S3, it is based on the system mode, establishes authentic authentication mechanism of the vehicle on block chain: vehicle VkBy vehicle
Information and privacy policy upload to fringe node Bi;Fringe node BiReceive vehicle VkAfter the information of vehicles and privacy policy of upload,
Registration request instruction is initiated to the block link network network layers, and waiting receives allowing to register and asking for block link network network layers feedback
After asking instruction, by vehicle VkInformation of vehicles cache while being forwarded in the block link network network layers by spatial cache,
And further according to vehicle VkPrivacy policy generate corresponding ID, private key and public key and be handed down to vehicle Vk;The block chain network
Layer receives fringe node BiThe vehicle V of forwardingkInformation of vehicles generate memory block storage, and give vehicle VkCreate corresponding intelligence
Contract, and further give vehicle VkCreation and fringe node BiRelated location matrix Li,k=[li,k]N×MAnd caching matrix
Ci,k=[ci,k]N×M;Wherein, k is positive integer, and k={ 1,2 ..., M };
Step S4, as fringe node BiNew vehicle V is detectedjWhen into its overlay area, fringe node BiTo new vehicle VjInto
Row certification and authorization;Wherein, j is positive integer, and j={ 1,2 ..., M };
Step S5, to new vehicle VjAfter certification and authorization pass through, new vehicle V is foundjThe corresponding position in the block link network network layers
Set matrix Li,j=[li,j]N×MWith caching Matrix Ci,j=[ci,j]N×M, and obtain new vehicle VjWith fringe node BiBetween time delay
Relationship, and further according to new vehicle VjLocation matrix Li,j=[li,j]N×M, caching matrix Ci,j=[ci,j]N×MAnd its and side
Edge node BiBetween time delay relationship, construct objective function:
Step S6, it converts the objective function to based on fringe node BiWith new vehicle VjOptimum Matching problem, and using more
Optimal solution is asked to how matched algorithm, obtains new vehicle VjWhen obtaining the minimum average B configuration of required data from the block link network network layers
Prolong.
2. the method for vehicle authentic authentication and caching based on block chain as described in claim 1, which is characterized in that the step
Rapid S4 guarantees the communication security between fringe node and vehicle using Digital Signature Algorithm, specifically includes:
The first step, fringe node BiEstablish private key and public key: fringe node BiSelect random number s for private keyAnd it calculates
Public key PKBS=sP, and further establish two hash functions H1 and H2;Wherein, H1:H2:P, q are prime number;
Second step, fringe node BiExtract private key and public key: fringe node BiNew vehicle V is registered in the block link network network layersj
Afterwards, another random number is selectedAnd calculate following formula (1)~(3):
Rj=rj·P(1)
hj=H1(IDj,Rj,PKBS)(2)
uj=(rj+hj·s)mod q(3)
Wherein, IDjFor new vehicle VjID;
Later, fringe node BiBy (Rj,uj) it is sent to new vehicle Vj, and new vehicle VjCheck information can be carried out by formula (4)
Reliability:
ujP=Rj+H1(IDj,Rj,PKBE)·P(4)
Third step, new vehicle VjForm signing messages: new vehicle VjIt is signed to information m to reinforce confidentiality, new vehicle VjSelection one
A random number xjAs vehicle private keyCorresponding public key PK is calculated laterj=xjP, and according to Digital Signature Algorithm, it can
To obtain:
Xj=H2(IDj,PKj,Rj,PKBE,m)(5)
vj=(Xj·uj+xj)mod q(6)
Later according to formula (5) and (6), new vehicle V is obtainedjSigning messages to message m is (m, PKj,uj);
4th step, fringe node BiVerify new vehicle VjSigning messages: fringe node BiReceive new vehicle VjSigning messages (m,
PKj,uj) after, it is verified by formula (7) to verify the reliability of message:
vjP=Rj+H2(IDj,Rj,PKBE)·P(7)
Only under conditions of formula is set up, fringe node BiDigital signature can just be received and to new vehicle VjOpen permission.
3. the method for vehicle authentic authentication and caching based on block chain as described in claim 1, which is characterized in that the step
Rapid S5 is specifically included:
Obtain new vehicle VjThe corresponding location matrix L in the block link network network layersi,j=[li,j]N×MWith caching Matrix Ci,j=
[ci,j]N×M;
Obtain new vehicle VjWith fringe node BiBetween time delay relationship, specifically have following several:
(1) if fringe node BiSpatial cache cached new vehicle VjVehicle information data, new vehicle V at this timejIt can be direct
From fringe node BiDownloading data meets li,j·ci,j=1, obtaining time delay isWherein, sjFor fringe node
BiWith new vehicle VjBetween transmission size of data,dajFor new vehicle VjVehicle
Information data size;PkFor transimission power,For noise power;For fringe node BiWith new vehicle VjBetween path damage
It loses, fi,jFor fixed coefficient, Ri,jFor fringe node BiWith new vehicle VjBetween transmission rate;
(2) if fringe node BiThe uncached new vehicle V of spatial cachejVehicle information data, and other edge node BkCaching
New vehicle VjVehicle information data, and fringe node BkWith fringe node BiThe distance between be Di,kAnd average bandwidth is
Bi,k, obtaining time delay is
(3) if the uncached new vehicle V of the spatial cache of all fringe nodes alljVehicle information data, new vehicle V at this timejIt can only
It initiates to request to the block link network network layers, obtaining time delay isWherein, R0It is given for the block link network network layers
Fixed intrinsic download transmission rate;γ is weight coefficient;
According to new vehicle VjWith fringe node BiBetween time delay relationship, obtain new vehicle VjIt is obtained from the block link network network layers
The time delay of required data isAnd to seek minimum average B configuration time delay, objective function and its corresponding constraint item are constructed
Part are as follows:
C,L∈{0,1}N×M, (8);
Wherein, CapiFor fringe node BiSpatial cache size.
4. the method for vehicle authentic authentication and caching based on block chain as claimed in claim 3, which is characterized in that the step
Rapid S6 is specifically included:
Define a benefit functionTo indicate fringe node BiTo give new vehicle
VjDistribute system consumption when spatial cache, the benefit function fi(j) value is smaller, shows fringe node BiIt can be deposited with lesser
It stores up space and provides low delay service for vehicle;Wherein, ρ is the weight coefficient of cache resources;For fringe node BiWith new vehicle
VjBetween time delay;
Based on the benefit function fi(j), fringe node B is constructediThe first of one-to-many mapping relations is formed between each vehicle
Preference listAnd building new vehicle VjThe of one-to-many mapping relations is formed between all fringe nodes
Two preference listWherein,
Maximum value MAX Φ in first preference list is setiVehicle in fringe node BiSpatial cache distribution when obtain it is excellent
Maximum value MAX ψ in first and described second preference listjThe spatial cache of fringe node preferentially distribute to new vehicle Vj;
First preference list and second preference list are polled and seek optimal solution using the matched algorithm of multi-to-multi,
And according to the optimal solution acquired, new vehicle V is obtainedjThe minimum average B configuration time delay of required data is obtained from the block link network network layers.
5. the method for vehicle authentic authentication and caching based on block chain as claimed in claim 4, which is characterized in that the benefit
First preference list and second preference list are polled and seek optimal solution with the matched algorithm of multi-to-multi, and according to
The optimal solution acquired obtains new vehicle VjThe specific step of the minimum average B configuration time delay of required data is obtained from the block link network network layers
Suddenly include:
First preference list and second preference list are initialized, and list pointer is respectively directed to described
Maximum value in first preference list and second preference list;
First preference list and second preference list are polled;Wherein, fringe node BiPartially according to described first
The preferential allocation space of sequence of the size of good list intermediate value from high to low to vehicle, until spatial cache be all assigned for
Only;New vehicle VjFringe node is preferentially selected according to the size sequence from high to low of the second preference list intermediate value, until
Until finding corresponding fringe node;
After to be polled, new vehicle V is obtainedjThe caching matrix C of optimizationi,j, and according to the caching matrix of obtained optimization
Ci,j, calculate new vehicle VjThe minimum average B configuration time delay of required data is obtained from the block link network network layers.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811474196.2A CN109729504B (en) | 2018-12-04 | 2018-12-04 | Vehicle credibility authentication and caching method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811474196.2A CN109729504B (en) | 2018-12-04 | 2018-12-04 | Vehicle credibility authentication and caching method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109729504A true CN109729504A (en) | 2019-05-07 |
CN109729504B CN109729504B (en) | 2022-02-15 |
Family
ID=66295538
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811474196.2A Active CN109729504B (en) | 2018-12-04 | 2018-12-04 | Vehicle credibility authentication and caching method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109729504B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111182497A (en) * | 2019-12-27 | 2020-05-19 | 国家计算机网络与信息安全管理中心 | V2X anonymous authentication method, device and storage medium |
CN111404999A (en) * | 2020-02-28 | 2020-07-10 | 中国电子技术标准化研究院 | Vehicle control method and system based on Internet of vehicles |
CN112202762A (en) * | 2020-09-28 | 2021-01-08 | 绍兴文理学院 | Game defense strategy optimization method and system for sensing edge cloud intelligent interference attack |
CN113543073A (en) * | 2021-06-07 | 2021-10-22 | 中国联合网络通信集团有限公司 | Block checking method and block chain system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107508859A (en) * | 2017-07-20 | 2017-12-22 | 北京交通大学 | Vehicle communication method based on block chain technology in vehicular ad hoc network |
CN107705060A (en) * | 2017-08-29 | 2018-02-16 | 合肥维天运通信息科技股份有限公司 | A kind of Logistics Information Platform based on block chain and Internet of Things |
US20180117447A1 (en) * | 2016-05-02 | 2018-05-03 | Bao Tran | Smart device |
CN108550226A (en) * | 2018-04-17 | 2018-09-18 | 暨南大学 | Based on block chain technology automotive system and its building method are shared without key |
CN108805567A (en) * | 2018-05-22 | 2018-11-13 | 深圳供电局有限公司 | A kind of charging corporate networks transaction settlement method and device |
-
2018
- 2018-12-04 CN CN201811474196.2A patent/CN109729504B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180117447A1 (en) * | 2016-05-02 | 2018-05-03 | Bao Tran | Smart device |
CN107508859A (en) * | 2017-07-20 | 2017-12-22 | 北京交通大学 | Vehicle communication method based on block chain technology in vehicular ad hoc network |
CN107705060A (en) * | 2017-08-29 | 2018-02-16 | 合肥维天运通信息科技股份有限公司 | A kind of Logistics Information Platform based on block chain and Internet of Things |
CN108550226A (en) * | 2018-04-17 | 2018-09-18 | 暨南大学 | Based on block chain technology automotive system and its building method are shared without key |
CN108805567A (en) * | 2018-05-22 | 2018-11-13 | 深圳供电局有限公司 | A kind of charging corporate networks transaction settlement method and device |
Non-Patent Citations (2)
Title |
---|
GEORGE STERGIOPOULOS; EVANGELOS VALVIS: "Analyzing Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network Infrastructure", 《 IEEE ACCESS ( VOLUME: 6)》 * |
杨柳青: "区块链技术在车联网中的应用研究", 《中国新通信》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111182497A (en) * | 2019-12-27 | 2020-05-19 | 国家计算机网络与信息安全管理中心 | V2X anonymous authentication method, device and storage medium |
CN111404999A (en) * | 2020-02-28 | 2020-07-10 | 中国电子技术标准化研究院 | Vehicle control method and system based on Internet of vehicles |
CN112202762A (en) * | 2020-09-28 | 2021-01-08 | 绍兴文理学院 | Game defense strategy optimization method and system for sensing edge cloud intelligent interference attack |
CN112202762B (en) * | 2020-09-28 | 2022-07-08 | 绍兴文理学院 | Game defense strategy optimization method and system for sensing edge cloud intelligent interference attack |
CN113543073A (en) * | 2021-06-07 | 2021-10-22 | 中国联合网络通信集团有限公司 | Block checking method and block chain system |
CN113543073B (en) * | 2021-06-07 | 2023-05-09 | 中国联合网络通信集团有限公司 | Block checking method and block chain system |
Also Published As
Publication number | Publication date |
---|---|
CN109729504B (en) | 2022-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ling et al. | Blockchain radio access network (B-RAN): Towards decentralized secure radio access paradigm | |
CN109729504A (en) | A method of vehicle authentic authentication and caching based on block chain | |
Wang et al. | SDN-based handover authentication scheme for mobile edge computing in cyber-physical systems | |
Zhu et al. | SLAB: A secure localized authentication and billing scheme for wireless mesh networks | |
CN111371730A (en) | Lightweight authentication method supporting anonymous access of heterogeneous terminal in edge computing scene | |
CN109218981B (en) | Wi-Fi access authentication method based on position signal feature common recognition | |
CN101951603A (en) | Access control method and system for wireless local area network | |
CN103079198B (en) | The key updating method and system of sensor node | |
CN101867473B (en) | Connection establishment method and access authentication system for blocking-attacking resistant shared media terminal | |
CN105978883B (en) | Safe collecting method under extensive car networking | |
CN103701700A (en) | Node discovering method and system in communication network | |
He et al. | ROAchain: Securing route origin authorization with blockchain for inter-domain routing | |
Hao et al. | Integrating PHY security into NDN-IoT networks by exploiting MEC: Authentication efficiency, robustness, and accuracy enhancement | |
CN100512108C (en) | Method for identifying physical uniqueness of networked terminal, and access authentication system for terminals | |
CN103731819A (en) | Authentication method of wireless sensor network nodes | |
Lin et al. | Blockchain based unified authentication with zero-knowledge proof in heterogeneous MEC | |
Boubakri et al. | Access control in 5G communication networks using simple PKI certificates | |
CN113810404A (en) | SDN (software defined network) -based dynamic defense system and method for full-view transformation of network | |
CN106507355A (en) | A kind of PMIPv6 Verification Systems of identity-based allograph and method | |
Wang et al. | T-IP: A self-trustworthy and secure Internet protocol | |
CN110493748A (en) | A kind of road conditions detection Verification System and method based on mist | |
CN115766075A (en) | Entrusted authentication method based on attribute-based encryption and identity signature | |
CN101827079A (en) | Blocking and attacking-resistant terminal connection building method and terminal access authenticating system | |
Alicherry et al. | Evaluating a collaborative defense architecture for manets | |
KR100972743B1 (en) | Mutual Authentication Scheme between Mobile Routers using Authentication Token in MANET of MANEMO |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |