CN109347852A - A lightweight trust evaluation method for Internet of Vehicles - Google Patents
A lightweight trust evaluation method for Internet of Vehicles Download PDFInfo
- Publication number
- CN109347852A CN109347852A CN201811315880.6A CN201811315880A CN109347852A CN 109347852 A CN109347852 A CN 109347852A CN 201811315880 A CN201811315880 A CN 201811315880A CN 109347852 A CN109347852 A CN 109347852A
- Authority
- CN
- China
- Prior art keywords
- trust
- trustee
- lightweight
- node
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000011156 evaluation Methods 0.000 title claims description 27
- 230000006855 networking Effects 0.000 claims abstract description 20
- 230000003993 interaction Effects 0.000 claims abstract description 16
- 238000000034 method Methods 0.000 claims abstract description 14
- 239000008186 active pharmaceutical agent Substances 0.000 claims description 14
- 239000013598 vector Substances 0.000 claims description 9
- 238000004364 calculation method Methods 0.000 claims description 7
- 230000009286 beneficial effect Effects 0.000 claims description 3
- 239000000284 extract Substances 0.000 claims 1
- 230000002349 favourable effect Effects 0.000 claims 1
- 230000002452 interceptive effect Effects 0.000 abstract description 7
- 238000005516 engineering process Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- NAWXUBYGYWOOIX-SFHVURJKSA-N (2s)-2-[[4-[2-(2,4-diaminoquinazolin-6-yl)ethyl]benzoyl]amino]-4-methylidenepentanedioic acid Chemical compound C1=CC2=NC(N)=NC(N)=C2C=C1CCC1=CC=C(C(=O)N[C@@H](CC(=C)C(O)=O)C(O)=O)C=C1 NAWXUBYGYWOOIX-SFHVURJKSA-N 0.000 description 1
- 206010039203 Road traffic accident Diseases 0.000 description 1
- 239000000654 additive Substances 0.000 description 1
- 230000000996 additive effect Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000008358 core component Substances 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000003912 environmental pollution Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of car networking method for evaluating trust of lightweight, specifically include step: S1, at the end of node previously interacts, and interaction both sides are that other side generates the trust comprising itself digital signature and proves and send to other side all in accordance with interactive experience;S2, interaction both sides, which receive new trust, proves that posteriority demonstrate,proves its signing messages, and updates and be locally stored to save to trust itself best at most η item and prove, wherein η ∈ Z+For system parameter;S3, it is potential interaction start when, potential interactive both sides by the trust being locally stored proof be sent to other side to prove that itself is believable;S4, potential interactive both sides are verified by digital signature information to be trusted the authenticity proved and exports the trust value of other side accordingly and decide whether to agree to interact, and is interacted when both sides agree to.The present invention does not depend on trust center and roadside unit, more meets extensive, the distributed nature of car networking.
Description
Technical field
The present invention relates to car networking security technology areas, and in particular to a kind of car networking method for evaluating trust of lightweight.
Background technique
Currently, traffic accident, congestion in road and environmental pollution have become the critical issue that global urban is faced, and vehicle joins
Net as Internet of Things in the main application of automobile industry and the core component of intelligent transportation system, in urban highway traffic side
Face plays vital effect.Car networking is considered as most one of the branch of market potential in Internet of Things, is arranged
For national " 12th Five-Year Plan ", the great research project of " 13 " planning outline.
However, due to characteristics such as extensive, open, distributed, sparse and high dynamics, car networking for malicious act and
Attack be it is fragile, safety and reliability, which has been increasingly becoming, restricts the bottleneck that further develops of car networking, and is related to vehicle connection
Can net be applied in true road environment.Existing scheme mostly uses digital signature and cryptological technique, can not assess section
The reliability of point (i.e. vehicle) and the quality of message.
Trust management plays the part of vital role in car networking, it enables each node to assess other sections in advance
The trust value of point and message, to avoid serious consequence caused by malicious node and not firm message.Currently, the trust pipe in car networking
Reason is still within the primary stage, and only small amounts of trust evaluation scheme is suggested.Based on architecture, existing scheme can be rough
Ground is divided into two classes, the i.e. scheme based on infrastructure and self-organizing scheme.
Li et al. people [X.Li, J.Liu, X.Li, and W.Sun, " RGTE:A reputation-based global
trust establishment in VANETs,"In Proceedings of the 5th International
Conference on Intelligent Networking and Collaborative Systems,2013,pp.210-
214.] propose that a global trusting based on popularity establishes scheme RGTE for car networking, wherein popularity administrative center is responsible for collection
The trust information of all legitimate nodes simultaneously calculates its popularity score.The model hypothesis popularity administrative center is completely credible and exists in real time
Line, needs higher maintenance cost, and there are the inherent shortcomings such as single point failure, time delay be big.Wei et al. [Z.Wei, F.R.Yu,
and A.Boukerche,"Trust based security enhancements for vehicular ad hoc
networks,"In Proceedings of the 4th International Symposium on Development
and Analysis of Intelligent Vehicular Networks and Applications,2014,pp.103-
109.] comprehensively consider the direct trust based on history interaction and the indirect trust based on trust recommendation, and one is proposed for car networking
Kind distributed trust appraisal procedure, is exported wherein directly trusting by Bayesian formula, and is trusted indirectly and led by D-S evidence theory
Out.The model needs to apply letter trust recommendation information of person's collection about receiver, it will usually biggish time, bandwidth be caused to disappear
Consumption.
Summary of the invention
The purpose of the present invention is to overcome the shortcomings of the existing technology and deficiency, and the car networking trust for providing a kind of lightweight is commented
Estimate method, the method does not depend on trust center and roadside unit, more meets extensive, the distributed nature of car networking.
The purpose of the present invention is realized by the following technical solution: a kind of car networking method for evaluating trust of lightweight, tool
Body includes the following steps:
S1, node previously interact at the end of, interaction both sides all in accordance with interactive experience be other side generate one include itself
The trust of digital signature is proved and is sent to other side;
S2, interaction both sides, which receive new trust, proves that posteriority demonstrate,proves its signing messages, and updates and be locally stored to save to certainly
The best at most η item of body, which is trusted, to be proved, wherein η ∈ Z+For system parameter;
S3, it is potential interaction start when, potential interactive both sides by the trust being locally stored proof be sent to other side to demonstrate,prove
It is bright that itself is believable;
S4, potential interactive both sides verify the letter trusted the authenticity proved and export other side accordingly by digital signature information
Appoint value and decide whether to agree to interact, is interacted when both sides agree to.
Preferably, in the step S1, trusting proves specific format are as follows:
TC (B, A)=(ID (B), ID (A), RT (B, A), WG (B), TS (B, A), DS (B, A))
Wherein B and A indicates node, and B is certifier, and A is receiver;ID (B) and ID (A) respectively indicate certifier B and by
The unique identifier of letter person A;RT (B, A) indicates assessed value vector, specific format are as follows:
RT (B, A)=(RT (B, A, 1), RT (B, A, 2) ..., RT (B, A, n))
Wherein n indicates to trust the number of aspect, and RT (B, A, i) (i ∈ [1, n]) indicates certifier B to the i-th of receiver A
Assessed value in terms of a trust;WG (B) indicates weighted value vector, specific format are as follows:
WG (B)=(WG (B, 1), WG (B, 2) ..., WG (B, n))
Wherein WG (B, i) (i ∈ [1, n]) indicates that certifier B trusts i-th the interest preference level of aspect;TS(B,A)
Indicate timestamp when TC (B, A) is generated;DS (B, A) indicates digital signature information.
Further, the RT (B, A, i) is expressed as linguistic variable, including " very good ", " good ", " general ", " poor "
" excessively poor ";The WG (B, i) is expressed as linguistic variable, including " very high ", "high", " in ", " low " and " very low ".
Preferably, in the step S2, it is that the trust itself generated proves TC (B, A) that receiver A, which receives certifier B,
Afterwards, it first verifies that its signature information D S (B, A), then judges that the size of the locally stored quantity NM (A) and η for trusting and proving is closed
System: if NM (A) < η, receiver A directly store TC (B, A);If NM (A)=η, receiver A calculate every trust proof pair
The weighting assessed value answered, and select accordingly and itself best η item trust proof is stored, while deleting other credentials
Bright, the trust that receiver A considers proves to include that TC (B, A) and locally stored η item trust proof.
Preferably, in the step S2, the specific steps of weighting assessed value are calculated by TC (B, A) are as follows:
S2.1, the RT (B, A, i) in TC (B, A) is converted to fuzzy evaluation RF (B, A, i) and clear assessment RC (B, A,
I), the wherein specific format of RF (B, A, i) are as follows:
RF (B, A, i)=(RF (B, A, i, 1), RF (B, A, i, 2), RF (B, A, i, 3), RF (B, A, i, 4))
Wherein 0≤RF (B, A, i, 1)≤RF (B, A, i, 2)≤RF (B, A, i, 3)≤RF (B, A, i, 4)≤100;RC(B,
A, i) be RF (B, A, i) symbolic distance, can specifically be exported by following formula:
S2.2, WG (B, i) in TC (B, A) is converted into fuzzy weighted values WF (B, i) and clear weight WC (B, i), wherein WF
The specific format of (B, i) are as follows:
WF (B, i)=(WF (B, i, 1), WF (B, i, 2), WF (B, i, 3), WF (B, i, 4))
Wherein 0≤WF (B, i, 1)≤WF (B, i, 2)≤WF (B, i, 3)≤WF (B, i, 4)≤10;WC (B, i) can be by following
Formula export:
The corresponding fuzzy evaluation value SF (B, A) of S2.3, TC (B, A) can calculate are as follows:
The corresponding clear assessed value SC (B, A) of TC (B, A) can calculate are as follows:
S2.4, receiver A only consider time decaying weight WT (B, A) when the most advantageous trust of selection proves, calculate public
Formula are as follows:
Wherein, TN indicates current time stamp;TS (B, A) is contained timestamp in TC (B, A);ω indicates that time window is big
It is small;θ is time decay factor, the speed of control WT (B, A) poor decaying at any time;
The corresponding weighting assessed value SW (B, A) of S2.5, TC (B, A) can calculate are as follows:
SW (B, A)=SC (B, A) * WT (B, A).
Preferably, in the step S3, trust the specific format for proving set are as follows:
TCs (A)={ TC (B1,A),TC(B2,A),...,TC(BNM(A),A)}
Wherein NM (A)≤η.
Preferably, the step S4 specific steps are as follows:
S4.1, it is potential interaction start when, the node C as Shi Xinzhe receives the credentials of the node A as receiver
After bright set TCs (A), extracting trust therein first is proved, i.e. TC (B1,A)、TC(B2,A)、…、TC(BNM(A), A), if
NM (A) < η, then the person C that applies letter to the trust value TV (C, A) of receiver A be set as constant, τ ∈ [0,1);Otherwise, it applies letter person C passes through
Trust the digital signature information in proving for every and verify its authenticity, then exporting every trust proves corresponding weighting assessed value
And calculate TV (C, A);Similarly, the person A that applies letter can be obtained to the trust value TV (A, C) of receiver C;
S4.2, when TV (C, A) >=TH (C) and TV (A, C) >=TH (A), node A is interacted with node C,
Middle TH (C), TH (A) ∈ [0,1] are respectively the trust thresholding of node C, node A.
Preferably, in the step S4, applying letter, person C removes consideration time decaying weight WT (B, A) outside, it is also contemplated that interest is inclined
Good similarity weight WS (C, B), the weight by the person C that applies letter and certifier B interest preference vector weighted euclidean distance DS (C,
B it) exports, specific formula for calculation are as follows:
WS (C, B)=1-DS (C, B).
Further, in the step S4, the corresponding weighting assessed value ST (C, B, A) of TC (B, A) can be calculated are as follows:
ST (C, B, A)=SC (B, A) * WT (B, A) * WS (C, B)
Similarly, it applies letter person C can export TC (B1,A)、TC(B2,A)、…、TC(Bη, A) and corresponding weighting assessed value, and count
Calculate the trust value TV (C, A) to receiver A, specific formula for calculation are as follows:
Compared with the prior art, the invention has the following advantages and beneficial effects:
1, the present invention uses complete Ad hoc mode, and the Three roles such as Shi Xinzhe, receiver, certifier are in different assessment ranks
Duan Jinhang conversion, independent of trust center and roadside unit, thus more adapts to extensive, distributed car networking environment.
2, the present invention voluntarily stores and provides trust information by receiver, collects without Shi Xinzhe, it is thus possible to substantially
Time, bandwidth consumption are reduced, realizes quick, lightweight trust evaluation.
Detailed description of the invention
Fig. 1 is the key step schematic diagram of the car networking method for evaluating trust embodiment of lightweight of the present invention.
Fig. 2 is the simplified example of the car networking method for evaluating trust embodiment of lightweight of the present invention.
Specific embodiment
Technical solution for a better understanding of the present invention, the implementation that the present invention is described in detail provides with reference to the accompanying drawing
Example, embodiments of the present invention are not limited thereto.
Embodiment
As shown in Figs. 1-2, the present embodiment is free of trust center and roadside unit, and only by a large amount of ordinary nodes (i.e. vehicle)
Composition, is communicated by wireless self-networking mode therebetween.The role of each node be Shi Xinzhe, receiver or certifier it
One, and can be converted in different evaluation stages.
Step S1, at the end of node A, B is previously interacted, the B as certifier is the A as receiver according to interactive experience
Generating a trust proves TC (B, A), specific format are as follows:
TC (B, A)=(ID (B), ID (A), RT (B, A), WG (B), TS (B, A), DS (B, A)) (1)
Wherein ID (B) and ID (A) respectively indicates the unique identifier of certifier B and receiver A;RT (B, A) indicates assessment
It is worth vector, specific format are as follows:
RT (B, A)=(RT (B, A, 1), RT (B, A, 2) ..., RT (B, A, n)) (2)
Wherein n indicates to trust the number of aspect, and RT (B, A, i) (i ∈ [1, n]) indicates certifier B to the i-th of receiver A
Assessed value in terms of a trust, value are represented as linguistic variable, as " very good ", " good ", " ", " poor ", " excessively poor "
Deng;WG (B) indicates weighted value vector, specific format are as follows:
WG (B)=(WG (B, 1), WG (B, 2) ..., WG (B, n) (3)
Wherein WG (B, i) (i ∈ [1, n]) indicates that certifier B trusts i-th the interest preference level of aspect, value
Be represented as linguistic variable, such as " very high ", "high", " in ", " low ", " very low ";TS (B, A) indicates that TC (B, A) is generated
When timestamp;DS (B, A) indicates digital signature information.
Similarly, as the B of receiver be as certifier A generate TC (B, A) after send it to certifier A.It is similar
Ground, it was demonstrated that person A is also that receiver B generates trust proof TC (A, B) and sends it to receiver B.
Step S2, it is that the trust itself generated proves to first verify that its signature after TC (B, A) that receiver A, which receives certifier B,
Information DS (B, A) then judges the size relation of locally stored quantity NM (A) and η for trusting and proving, wherein η ∈ Z+To be
System parameter: if NM (A) < η, receiver A directly store TC (B, A);If NM (A)=η, receiver A calculate every credentials
Bright corresponding weighting assessed value, and select accordingly and itself best η item trust proof is stored, while deleting other letters
Appointing proves, the trust that receiver A is calculated is proved to trust including TC (B, A) and locally stored η item and be proved.
For calculating the corresponding weighting assessed value of TC (B, A): RT (B, A, i) can be by existing fuzzy letter in TC (B, A)
Single additivity weight system [S.Y.Chou, Y.H.Chang, and C.Y.Shen, " A fuzzy simple additive
weighting system under group decision-making for facility location selection
with objective/subjective attributes,"European Journal of Operational
Research, 2008, vol.189, no.1, pp.132-145.] be converted to fuzzy evaluation RF (B, A, i) and clear assessment RC (B,
A, i), the wherein specific calculating step of RF (B, A, i) are as follows:
RF (B, A, i)=(RF (B, A, i, 1), RF (B, A, i, 2), RF (B, A, i, 3), RF (B, A, i, 4)) (4)
Wherein, 0≤RF (B, A, i, 1)≤RF (B, A, i, 2)≤RF (B, A, i, 3)≤RF (B, A, i, 4)≤100;RC(B,
A, i) be RF (B, A, i) symbolic distance, can specifically be exported by following formula:
Similarly, WG (B, i) can be exchanged into fuzzy weighted values WF (B, i) and clear weight WC (B, i), wherein WF (B, i)
Specific format are as follows:
WF (B, i)=(WF (B, i, 1), WF (B, i, 2), WF (B, i, 3), WF (B, i, 4)) (6)
Wherein 0≤WF (B, i, 1)≤WF (B, i, 2)≤WF (B, i, 3)≤WF (B, i, 4)≤10;WC (B, i) can be by following
Formula export:
Wherein, j, k are the temporary variable of summation.
Then, the corresponding fuzzy evaluation value SF (B, A) of TC (B, A) can calculate are as follows:
The corresponding clear assessed value SC (B, A) of TC (B, A) can calculate are as follows:
Receiver A only considers time decaying weight WT (B, A) when the most advantageous trust of selection proves, its calculation formula is:
Wherein TN indicates current time stamp;TS (B, A) is contained timestamp in TC (B, A);ω indicates time window size;
θ is time decay factor, the speed of control WT (B, A) poor decaying at any time.
Therefore, the corresponding weighting assessed value SW (B, A) of TC (B, A) can calculate are as follows:
SW (B, A)=SC (B, A) * WT (B, A) (11)
By formula (4)-(10) can be derived from RC (B, A, i) range be [0,100], and WC (B, i), WT (B, A), SC (B,
A), the range of SW (B, A) is [0,1].
Similarly, receiver A, which calculates separately locally stored η item trust, proves corresponding weighting assessed value SW (B1,A)、
SW(B2,A)、…、SW(Bη, A), then from SW (B, A), SW (B1,A)、…、SW(Bη, A) in select η the larger value and store pair
The trust answered proves, while deleting other and trusting proof.
Step S3, when potential interaction starts, receiver A desire is interacted with the node C as Shi Xinzhe, receiver A
Taking out the trust being locally stored first proves, set is denoted as TCs (A), it may be assumed that
TCs (A)={ TC (B1,A),TC(B2,A),...,TC(BNM(A),A)}(12)
Wherein NM (A)≤η.Then, TCs (A) is sent to the person C that applies letter to prove that itself is believable by receiver A.
Similarly, TCs (C) is sent to the node A as Shi Xinzhe to prove that oneself is credible as the node C of receiver
Rely.
Step S4, the trust that the person C that applies letter receives receiver A proves to pass through digital signature information first after set TCs (A)
The authenticity proved is trusted in verifying, and extracting trust therein proves, i.e. TC (B1,A)、TC(B2,A)、…、TC(BNM(A), A),
If NM (A) < η, the person C that applies letter to the trust value TV (C, A) of receiver A be set as lesser constant, τ ∈ [0,1);Otherwise, it applies
Letter person C trusts the digital signature information in proving by every and verifies its authenticity, and it is corresponding then to export every trust proof
Weighting assessed value simultaneously calculates TV (C, A).
By taking the corresponding weighting assessed value ST (C, B, A) of the person C that applies letter export TC (B, A) as an example: the person C that applies letter is except the consideration time declines
Subtract weight WT (B, A) (i.e. formula (10)) outside, it is also contemplated that interest preference similarity weight WS (C, B), the weight by the person C that applies letter with
The weighted euclidean distance DS (C, B) of the interest preference vector of certifier B is exported, specific formula for calculation are as follows:
WS (C, B)=1-DS (C, B) (14)
Therefore, the corresponding weighting assessed value ST (C, B, A) of TC (B, A) can calculate are as follows:
ST (C, B, A)=SC (B, A) * WT (B, A) * WS (C, B) (15)
According to formula (13)-(15) the method, applying letter, person C can export TC (B1,A)、TC(B2,A)、…、TC(Bη,A)
Corresponding weighting assessed value, and calculate the trust value TV (C, A) to receiver A, specific formula are as follows:
By formula (13)-(16) can be derived from WS (C, B), ST (C, B, A), TV (C, A) range be [0,1].
If TV (C, A) >=TH (C) (the wherein trust thresholding that TH (C) ∈ [0,1] is node C), then the person C that applies letter agree to by
Letter person A interaction, vice versa.
Similarly, also set can be proved according to the trust that the node C as receiver is provided as the node A of Shi Xinzhe
TCs (C) exports the trust value TV (A, C) to receiver C, and is according to the size relation decision for trusting thresholding TH (A) with itself
No agreement is interacted with receiver C.
When TV (C, A) >=TH (C) and TV (A, C) >=TH (A), node A is interacted with node C.
The above embodiment is a preferred embodiment of the present invention, but embodiments of the present invention are not by above-described embodiment
Limitation, other any changes, modifications, substitutions, combinations, simplifications made without departing from the spirit and principles of the present invention,
It should be equivalent substitute mode, be included within the scope of the present invention.
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811315880.6A CN109347852B (en) | 2018-11-07 | 2018-11-07 | A lightweight trust evaluation method for Internet of Vehicles |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811315880.6A CN109347852B (en) | 2018-11-07 | 2018-11-07 | A lightweight trust evaluation method for Internet of Vehicles |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109347852A true CN109347852A (en) | 2019-02-15 |
CN109347852B CN109347852B (en) | 2020-12-11 |
Family
ID=65313869
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811315880.6A Active CN109347852B (en) | 2018-11-07 | 2018-11-07 | A lightweight trust evaluation method for Internet of Vehicles |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109347852B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110445788A (en) * | 2019-08-09 | 2019-11-12 | 西安电子科技大学 | The trust evaluation system and method for content oriented under a kind of vehicular ad hoc network environment |
CN113115317A (en) * | 2021-03-05 | 2021-07-13 | 暨南大学 | Privacy protection method for vehicle trust score in Internet of vehicles |
CN113380024A (en) * | 2021-05-27 | 2021-09-10 | 重庆邮电大学 | Reputation updating method and trust calculation method based on Internet of vehicles |
CN116996521A (en) * | 2023-09-28 | 2023-11-03 | 江西农业大学 | Cross-chain interaction system and method of relay committee based on trust evaluation model |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101404592A (en) * | 2008-11-14 | 2009-04-08 | 西安交通大学 | Total trust degree decision method based on history evidence window |
CN102222305A (en) * | 2011-06-13 | 2011-10-19 | 北京理工大学 | Creditworthiness evaluation method under distributed environment |
CN104392373A (en) * | 2014-12-02 | 2015-03-04 | 西安邮电大学 | Interactive decision-making method based on key historical behaviors in cloud computing environment |
US20160248746A1 (en) * | 2015-02-25 | 2016-08-25 | Verisign, Inc. | Automating internet of things security provisioning |
CN106330910A (en) * | 2016-08-25 | 2017-01-11 | 重庆邮电大学 | Strong Privacy Preserving Dual Authentication Method Based on Node Identity and Reputation in Internet of Vehicles |
CN106412912A (en) * | 2016-06-22 | 2017-02-15 | 长安大学 | Node trust assessment method facing car networking |
CN107665405A (en) * | 2017-09-26 | 2018-02-06 | 北京邮电大学 | A kind of vehicle credit management method and device |
-
2018
- 2018-11-07 CN CN201811315880.6A patent/CN109347852B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101404592A (en) * | 2008-11-14 | 2009-04-08 | 西安交通大学 | Total trust degree decision method based on history evidence window |
CN102222305A (en) * | 2011-06-13 | 2011-10-19 | 北京理工大学 | Creditworthiness evaluation method under distributed environment |
CN104392373A (en) * | 2014-12-02 | 2015-03-04 | 西安邮电大学 | Interactive decision-making method based on key historical behaviors in cloud computing environment |
US20160248746A1 (en) * | 2015-02-25 | 2016-08-25 | Verisign, Inc. | Automating internet of things security provisioning |
CN106412912A (en) * | 2016-06-22 | 2017-02-15 | 长安大学 | Node trust assessment method facing car networking |
CN106330910A (en) * | 2016-08-25 | 2017-01-11 | 重庆邮电大学 | Strong Privacy Preserving Dual Authentication Method Based on Node Identity and Reputation in Internet of Vehicles |
CN107665405A (en) * | 2017-09-26 | 2018-02-06 | 北京邮电大学 | A kind of vehicle credit management method and device |
Non-Patent Citations (2)
Title |
---|
ARPITA BHARGAVA: ""Computational trust model for Internet of Vehicles"", 《2017 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT)》 * |
张文博、包振山、李健: ""基于可信计算的车联网云安全模型"", 《武汉大学学报(理学版)》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110445788A (en) * | 2019-08-09 | 2019-11-12 | 西安电子科技大学 | The trust evaluation system and method for content oriented under a kind of vehicular ad hoc network environment |
CN113115317A (en) * | 2021-03-05 | 2021-07-13 | 暨南大学 | Privacy protection method for vehicle trust score in Internet of vehicles |
CN113380024A (en) * | 2021-05-27 | 2021-09-10 | 重庆邮电大学 | Reputation updating method and trust calculation method based on Internet of vehicles |
CN116996521A (en) * | 2023-09-28 | 2023-11-03 | 江西农业大学 | Cross-chain interaction system and method of relay committee based on trust evaluation model |
CN116996521B (en) * | 2023-09-28 | 2023-12-15 | 江西农业大学 | Cross-chain interaction system and method of relay committee based on trust evaluation model |
Also Published As
Publication number | Publication date |
---|---|
CN109347852B (en) | 2020-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109347852A (en) | A lightweight trust evaluation method for Internet of Vehicles | |
Liu et al. | TCEMD: A trust cascading-based emergency message dissemination model in VANETs | |
Tangade et al. | Trust management scheme based on hybrid cryptography for secure communications in VANETs | |
AU2018102186A4 (en) | An aggregated trust evaluation method for message reliability in vanets | |
Deng et al. | Electronic payment schemes based on blockchain in VANETs | |
WO2020258060A2 (en) | Blockchain-based privacy protection trust model for internet of vehicles | |
Rostamzadeh et al. | A context-aware trust-based information dissemination framework for vehicular networks | |
CN109005542A (en) | A fast message authentication method for 5G Internet of Vehicles based on reputation system | |
Li et al. | A dynamic and scalable user-centric route planning algorithm based on polychromatic sets theory | |
Chaqfeh et al. | Vehicular cloud data collection for intelligent transportation systems | |
Wu et al. | Information design for regulating traffic flows under uncertain network state | |
CN110377672B (en) | Real-time map updating system and method based on trust management and Internet of vehicles terminal | |
CN107231363B (en) | A Distributed Authentication Method and Authentication Model | |
CN104010302A (en) | Trust evaluation method for road condition data in vehicle ad hoc network | |
CN116994423B (en) | Lightweight, privacy-protected lead vehicle selection system and method in vehicle formation | |
CN104363586A (en) | Lightweight roaming access authentication method in Internet of vehicles | |
Knorn et al. | A result on implicit consensus with application to emissions control | |
CN116707755A (en) | Traffic jam prediction system and method based on homomorphic encryption and blockchain | |
Didouh et al. | TileChain: A Blockchain-Based Framework for Security Service Management For Vehicular Communications | |
CN114172655B (en) | Secure multiparty computing data system, method, equipment and data processing terminal | |
Li et al. | Deep reinforcement learning for intelligent computing and content edge service in ICN-based IoV | |
CN113645028B (en) | Vehicle networking condition privacy protection system and method supporting dynamic key management | |
CN110809253A (en) | A certificateless aggregate signature method for vehicle ad hoc network | |
Temurnikar et al. | Development of multi-hop clustering approach for vehicular ad-hoc network | |
Huang et al. | Trust management model of vanets based on machine learning and active detection technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |