CN111601258A - Vehicle networking node data safety communication method based on block chain - Google Patents

Vehicle networking node data safety communication method based on block chain Download PDF

Info

Publication number
CN111601258A
CN111601258A CN202010410190.XA CN202010410190A CN111601258A CN 111601258 A CN111601258 A CN 111601258A CN 202010410190 A CN202010410190 A CN 202010410190A CN 111601258 A CN111601258 A CN 111601258A
Authority
CN
China
Prior art keywords
data
node
vehicle
nodes
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010410190.XA
Other languages
Chinese (zh)
Other versions
CN111601258B (en
Inventor
任条娟
陈友荣
郑佳莹
陈浩
刘半藤
万锦昊
陈秋霞
苏子漪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Shuren University
Original Assignee
Zhejiang Shuren University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Shuren University filed Critical Zhejiang Shuren University
Priority to CN202010410190.XA priority Critical patent/CN111601258B/en
Publication of CN111601258A publication Critical patent/CN111601258A/en
Application granted granted Critical
Publication of CN111601258B publication Critical patent/CN111601258B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]

Abstract

The invention relates to a block chain-based data security communication method for nodes of Internet of vehicles, which is characterized in that the whole network is divided into cellular areas with the same size, and an Internet of vehicles alliance chain and an inter-area public chain are designed by taking the areas as units, so that the traceability of data is ensured, and the data consensus efficiency is improved; in the vehicle data communication process, mutual trust among nodes is guaranteed by adopting vehicle identity authentication, data are divided into common data and emergency data according to different urgency of the data, the common data are communicated in regions, the emergency data are communicated among a plurality of regions, different data classification adopts different block structures, and the data consensus efficiency is improved; meanwhile, the movement condition of the nodes of the Internet of vehicles is considered, an improved practical Byzantine fault-tolerant consensus method is adopted, data safety communication of the nodes of the Internet of vehicles is achieved, and data safety risks brought by centralized data storage can be resisted. The invention has high consensus speed, can protect data safety and information privacy, reduces the storage space of data and has high communication efficiency.

Description

Vehicle networking node data safety communication method based on block chain
The technical field is as follows:
the invention relates to the technical field of block chains, in particular to a block chain-based data security communication method for nodes of a vehicle networking system.
Background art:
in recent years, smart vehicles increasingly occupy an important position in the automobile market, and the internet of vehicles is one of the core technologies of smart vehicles, and the development of the internet of vehicles can promote intelligent transportation and provide convenient information services. But periodically broadcasts its current position, velocity, acceleration, etc. to surrounding neighbors, which poses a potential threat to vehicle data security. The existing vehicle networking architecture is centralized and relies on a credible third party entity to carry out centralized management on vehicle information. However, once the centralized entity is attacked, serious data security risks are brought, and privacy such as identity, location, social status and the like is leaked. With the continuous development of sensor technology and internet of things technology, the data volume of the nodes of the internet of vehicles increases dramatically, and the centralized management mode of the architecture of the centralized system on the data of the nodes of the internet of vehicles causes the load of a central entity to be overlarge, so that the central entity faces the risk of single-point failure. Meanwhile, due to the characteristics of high mobility, changeability and the like of the internet of vehicles, huge challenges are brought to the large data storage, intelligent management and information safety of the vehicle communication system. Therefore, research on decentralized data communication structures of the internet of vehicles is urgently needed to ensure the safety of user data.
The block chain technology is a completely distributed public database or a classification account, is suitable for any type of data exchange, and has the characteristics of decentralization, transparency, tamper resistance and the like, so that domestic and foreign scholars propose to introduce the block chain technology into the Internet of vehicles. Some scholars study a vehicle networking data communication method based on a public chain without considering the division of areas, for example, Jiang T and the like design five types of independent block chains with different functions according to data types and provide a method for transmitting vehicle block chain data to the outside in consideration of distributed safe storage of big data and recording all information by vehicles. Cebe M et al propose a licensed blockchain approach to manage collected vehicle-related data, and design a fragmented ledger for storing vehicle maintenance information, history, vehicle diagnostic reports, and other data. The King hat swallow encourages the cluster heads to actively maintain and generate blocks by adding a reward mechanism, and four nodes of a software service provider, an automobile manufacturer, an automatic driving automobile and a cloud storage form a semi-distributed P2P (Peer to Peer) network model in the small world together. Zhang L et al propose a secure data sharing method based on a blockchain that encourages and incentivizes node participation, rewards broadcast announcement messages and block-generated vehicle cryptocurrency. Meanwhile, some scholars study the internet of vehicles data communication system by taking the alliance chain as a basis and considering the transfer of storage and calculation of vehicles to road Side unit rsu (road Side unit) which is used as an accounting node to execute an intelligent contract. For example, Kang J et al developed a secure P2P data sharing system that publicly audits and stores shared data and data sharing records. Zhang X et al propose a federation blockchain-based secure sharing and storage system for data that uses data coins to incentivize vehicles to share data according to the frequency of data contributions. The Wangwen lyre provides a decentralized network environment construction and sharing method based on a block chain, and safe sharing of automatic driving cloud control service and safe sharing of automatic driving related data in an open environment are achieved. However, the methods do not consider the huge number and mobility of the nodes of the internet of vehicles, and have the problems of difficult storage and maintenance of block chains, low data communication efficiency and the like.
Therefore, some scholars focus on dividing the block chain network into areas and research the block chain-based data communication method of the internet of vehicles in multiple areas, for example, madhaudan S and other people divide the internet of vehicles into a plurality of areas, each area is provided with a public chain, and a block chain branching algorithm is provided. Touchongming, Zhang Yong le and the like design the car networking as a alliance chain by taking a city as a unit, and divide RSU nodes into a central node and a boundary node, so as to realize data exchange among all city car networking alliance chains. However, the methods do not consider the classification of the data, and are difficult to process the data of the large-scale nodes of the internet of vehicles efficiently in real time by using a block chain technology.
In conclusion, the existing block chain-based data security communication method for the nodes of the internet of vehicles has the problems of difficulty in storage and maintenance, low communication efficiency, difficulty in real-time processing, potential safety hazards and the like. Accordingly, the present disclosure is directed to a method.
The invention content is as follows:
in view of the defects of the existing method, the invention provides a data security communication method of the car networking node based on the block chain by considering the cellular network framework, and the method has the characteristics of quick consensus, data security, privacy protection, light-weight storage, high-efficiency communication and the like, thereby solving the problems of user identity verification and privacy, protecting the data generated by the car networking node in real time, and being more suitable for the car networking communication environment.
In order to achieve the purpose of the invention, the technical scheme adopted by the invention is as follows:
a car networking node data safety communication method based on a block chain comprises the following steps:
step 1): the method comprises the following steps of dividing a car networking into cellular areas with the same size, designing car networking alliance chains and inter-area public chains by taking the areas as units, wherein the car networking alliance chains are formed by communication base stations, roadside embedded devices and vehicle nodes, and edge side devices of the communication base stations and the roadside embedded devices are called edge nodes;
step 2): the node identity authentication based on the cloud server and the verification group is executed by the Internet of vehicles, the node is allowed to access the network after the authentication is successful, and the step 3 is continuously executed); refusing access after authentication failure, and re-executing the step 2);
step 3): monitoring a vehicle by a vehicle-mounted sensor of a vehicle node, performing hash calculation according to generated data, and generating a digital signature and a data packet; dividing the generated data into common data and emergency data, wherein the common data mainly comprises the position, speed, direction, braking state and effective time of the vehicle and the emergency data mainly comprises special information data of traffic accidents, road congestion states, real-time road conditions and effective time; judging the type of the generated data, if the generated data is normal data, executing the step 4), and if the generated data is emergency data, executing the step 7);
step 4): the surrounding vehicles receive the common data packet and verify the digital signature of the common data packet; if the verification is passed, executing the step 5), and if the verification fails, deleting the current data and then executing the step 3);
step 5): the vehicle node broadcasts the common data packet in the area and submits the common data packet to a main node in the area, and the main node writes the received data into a request queue of the vehicle networking block, stores the request queue into a regional communication transaction list and broadcasts the request queue to other main nodes in the area; the structure of the car networking block consists of a block head and a block body, wherein the block head comprises a timestamp, a random number, a hash value of a current block, a hash value of a father block and a hash value of a Merck tree root; the block body comprises transaction block data, the transaction block data is composed of a plurality of data blocks, and every two of the data blocks are crossed to calculate a hash value; the data block of the transaction block comprises a plurality of storable vehicle data entries and data header information, each piece of data in each data entry comprises a timestamp, a data owner public key, metadata and an entry hash, the metadata comprises common data, and the entry hash is a total hash value of the timestamp, the data owner public key and the metadata in each data entry; the data header information comprises a time stamp and a hash value of the data block;
step 6): in the area where the vehicle nodes are located, besides the main node, part of the nodes are selected as replica nodes, and if the main node has malicious behaviors, the nodes are reselected from the replica nodes to serve as the main node; after the main node is determined, the vehicle networking node executes an in-area consensus mechanism according to a consistency protocol to complete vehicle networking block consensus; the car networking block which is verified firstly in the main node group in the area is reserved, and the car networking blocks generated by other main nodes are deleted, and then step 10) is executed;
step 7): after receiving the emergency data packet, the edge node in the area where the vehicle node is located verifies the digital signature of the emergency data packet, if the emergency data packet passes the verification, the edge node calculates the area interested by the emergency data, broadcasts and notifies all vehicle nodes in the area of interest, and then executes the step 8); if the verification fails, deleting the current data, and skipping to the step 3);
step 8): the Internet of vehicles node executes an inter-area consensus mechanism, namely, the emergency data is submitted to the main node of the Internet of vehicles public chain, the main node of the Internet of vehicles public chain writes the received emergency data into a request queue of a new Internet of vehicles block, stores the emergency data into a public chain communication transaction list, and broadcasts the emergency data to other main nodes among the areas of interest;
step 9): the vehicle networking area block which is verified firstly in the main node group between the interested areas is reserved, the vehicle networking area blocks generated by other main nodes are deleted, and the step 10) is continuously executed;
step 10): after the car networking block is generated, the data is updated on the list of each car networking node.
Further, the node identity authentication method in step 2) is specifically as follows:
2.1) the cloud server stores and manages factory information and real identities of the nodes of the Internet of vehicles, and manages pseudonyms of the nodes of the Internet of vehicles issued by a Certificate Authority (CA);
2.2) after the nodes of the Internet of vehicles are registered, a certificate issued by a Certificate Authority (CA) is obtained, wherein the certificate comprises a pseudonym, a pair of public and private keys and two hash values;
2.3) after the Internet of vehicles node is started, sending a request to a CA; CA calculates the hash value of the pseudonym + public key, and calculates the hash value of the real name + certificate; if the two hash values are the same, the CA passes the authentication of the Internet of vehicles node and executes the step 2.4); if the two hash values are different, the authentication fails, the CA records the node and refuses the node to access the network, and the step 2) is executed again;
2.4) after the nodes of the Internet of vehicles are authenticated by the cloud server, the nodes of the Internet of vehicles can be added into the block chain for data communication, the block chain network randomly selects edge nodes and vehicle nodes in each area to form a verification group, and the nodes which are selected to be the verification group cannot be considered until all possible combinations traverse in the next random combination process;
2.5) if the vehicle node does not move from the neighbor area to the current area, executing the step 2.6); if the vehicle node moves from the neighbor area to the current area, the vehicle node can continue to participate in data communication only after passing the identity authentication of the verification group; if the authentication of the verification group is not passed, the blockchain network stops the right of the vehicle node to participate in the data communication, and the step 2.4) is executed again;
2.6) if the vehicle node is newly added into the blockchain network, the main node where the vehicle node is located sends a verification request to a verification group in other areas; if the vehicle node does not pass the verification in each area, the identity verification of the vehicle node is considered to be successful, and the vehicle node can participate in data communication; otherwise, the data can not be participated in the communication, and the step 2.4) is executed again.
Further, in the step 2.4), the vehicle node and the edge node may store node information communicated within 1 hour in a communication list thereof; if the node information in the list exceeds the time range, the node information is deleted; the edge nodes not only update the communicable list with each other, but also communicate with the vehicle nodes and update the communicable list; when the edge node communicates with the vehicle node, the edge node only updates the same node information in the vehicle node.
Further, in the step 2.5), the vehicle node identity verification mode moving from the neighbor area to the current area is as follows: the method comprises the steps that a main node selected by a current area where a vehicle node is located sends a verification request to a verification group of the area where the vehicle node is located and the area around the vehicle node, and the vehicle node information can be considered to pass the verification of the area as long as a communicable list of 1 edge node or a plurality of vehicle nodes in the verification group can inquire the vehicle node information; if the vehicle node passes the verification of the region where the vehicle node is located before the cross-region and fails to pass the verification in the surrounding region, the identity verification of the vehicle node is considered to be successful, and the vehicle node can continue to participate in data communication.
Further, the method for the inter-region consensus mechanism in step 8) is as follows:
8.1) the master nodes in the master node group send preparation messages to other master nodes and uniformly collect approval messages returned by other master nodes;
8.2) if the number of the approval messages received by the master node exceeds 2/3 of the number of the master nodes in the master node group, indicating that the verification of other master nodes passes, at the moment, achieving consensus, writing the car networking block into the global main chain, and continuing to execute the step 8.3); if the acceptance message received by the main node does not meet the requirement, the consensus fails, and the program exits;
8.3) if the blockchain network finds that a certain main node is a malicious node, the blockchain network randomly selects one node in the replica nodes to replace the current main node, and then continues to finish the current consensus; and if the main node does not find the abnormity, the operation is not carried out.
Further, the updating method of the car networking block data in the step 10) is as follows: data of the current blockchain network and a list containing the hash value of each block are backed up on each Internet of vehicles node; updating the hash value of the current Internet of vehicles block in the list when one Internet of vehicles block is generated; when the vehicle node moves from one area to another area, deleting the block chain information in the original area, and updating and downloading the block chain information and data of the current area network; when the storage capacity of the vehicle nodes reaches a threshold value, judging the validity period of the vehicle networking block from the beginning;
if the validity period of the car networking block at the beginning of the block chain is exceeded, deleting all data in the overtime car networking block; if the validity period of the car networking block in the middle of the block chain is exceeded, the data of the car networking block is deleted, the hash value of the car networking block is kept, and then the step 3) is skipped again.
The invention has the following beneficial effects:
(1) the whole network is divided into cellular areas with the same size, and the car networking alliance chain and the inter-area public chain are designed by taking the areas as units, so that the data traceability can be ensured, and the data consensus efficiency is improved;
(2) in the vehicle data communication process, vehicle identity authentication is adopted to ensure mutual trust among nodes, data are classified according to different urgency of the data, the data are divided into common data communicated in areas and urgent data communicated among a plurality of areas, different block structures are provided according to different data classifications, and the efficiency of data consensus is improved;
(3) and in consideration of the motion condition of the nodes of the Internet of vehicles, an improved practical Byzantine fault-tolerant consensus method is adopted, so that the data security communication of the nodes of the Internet of vehicles is realized, and the data security risk brought by centralized data storage can be resisted.
In a word, the method and the device aim at the problems of difficult storage maintenance, low communication efficiency, difficult real-time processing, safety privacy and the like in the Internet of vehicles communication, can realize quick consensus, can protect data safety and information privacy, reduce the storage space of data, improve the communication efficiency, and are more suitable for being used in the Internet of vehicles communication environment compared with the existing method.
The invention is further illustrated by the accompanying drawings and detailed description.
Description of the drawings:
FIG. 1 is a block diagram of the operation of a communication method in an embodiment;
FIG. 2 is a flow chart of identity authentication in a communication method;
FIG. 3 is a block diagram of a method of communication with respect to data storage;
fig. 4 is a flow chart of a communication method regarding node data update.
The specific implementation mode is as follows:
the embodiment discloses a vehicle networking node data safety communication method based on a block chain, as shown in fig. 1 to 4, mainly comprising the following steps:
1) considering the deployment of communication base stations, the entire internet of vehicles is divided into cellular areas of the same size. All the areas comprise communication base stations, roadside embedded devices and vehicle networking nodes of vehicle nodes, the structures form a vehicle networking alliance chain, and all the edge side devices of the vehicle networking, such as the communication base stations, the roadside embedded devices and the like, are collectively called edge nodes.
2) Before the nodes of the Internet of vehicles join the network, node identity authentication based on the cloud server and the verification group is required to be executed. If the verification is successful, the nodes of the Internet of vehicles are legal nodes, the nodes are allowed to access the network, and the step 3) can be skipped; and if the verification fails, refusing the Internet of vehicles node to access the network, and after delaying for 10 minutes, re-executing the step 2).
Fig. 2 shows a node identity authentication method based on a cloud server and a verification group, which includes the following steps:
2.1) the cloud server is used for storing and managing factory information and real identity of the nodes of the Internet of vehicles, and managing pseudonyms of the nodes of the Internet of vehicles issued by a Certification Authority (CA).
2.2) when a node of the Internet of vehicles is registered in a system with a real identity, a certificate issued by the CA can be obtained, the certificate comprising a pseudonym, a pair of public and private keys and two hash values.
2.3) after the Internet of vehicles node is started, a request is sent to a CA responsible for certificate issuance; CA calculates the hash value of the pseudonym + public key, and calculates the hash value of the real name + certificate; if the two hash values are the same, the CA passes the authentication of the nodes in the Internet of vehicles and can jump to the step 2.4), if the two hash values are different, the CA cannot pass the identity authentication of the nodes in the Internet of vehicles, records the nodes, refuses the nodes to access the network and jumps to the step 2) again.
And 2.4) the vehicle networking nodes can be added into the block chain for data communication after being authenticated by the cloud server. In the data communication process, the vehicle node and the edge node can store the node information which is communicated within 1 hour in the communication list. If the node information in the list exceeds the time range, the node information is deleted. The edge nodes not only update the communicable list with each other, but also communicate with the vehicular nodes and update the communicable list. In order to ensure the reliability of the verification group, when the edge node communicates with the vehicle nodes, the edge node only updates the same node information in the m vehicle nodes.
And 2.5) randomly selecting M edge nodes and N vehicle nodes in each area by the block chain network to form a verification group. Wherein nodes that have been selected as verification groups will not be considered during the next random combination process until all possible combinations have been traversed.
2.6) if the vehicle node does not move from the neighbor area to the current area, directly executing the step 2.7); if the vehicle node moves from the neighbor area to the current area, the master node selected by the current area of the vehicle node sends a verification request to a verification group of the previous area and the surrounding area (excluding the current area) of the vehicle node, and the vehicle node information can be inquired by a communicable list of 1 edge node or n vehicle nodes in the verification group, namely the vehicle node passes the verification of the area. If the vehicle node passes the verification of the area where the vehicle node is located before the cross-region and fails to pass the verification in the surrounding area (excluding the current area and the area where the vehicle node is located before the cross-region), the vehicle node is unique, that is, the identity verification of the vehicle node is considered to be successful, and the vehicle node can continue to participate in data communication. If the above condition is not met, the blockchain network stops the right of the vehicle node to participate in data communication, and jumps to step 2.4) again.
2.7) if the vehicle node is newly added to the blockchain network, the main node where the vehicle node is located sends an authentication request to the authentication group of other areas. If the vehicle node does not pass the verification in each area, the uniqueness of the vehicle node is proved, namely the identity verification of the vehicle node is considered to be successful, and the vehicle node can participate in data communication; otherwise, the data can not be participated in the communication of the data, and the step 2.4) is skipped again.
3) The vehicle-mounted sensor of the vehicle node monitors the self state of the vehicle at any moment, carries out Hash calculation according to the data generated by the vehicle node, and generates a digital signature and a data packet, namely Msig{ Q | sig (r, s) | t | μ | h (μ) }. Wherein Q represents the public key of the sender, and the length is 65 bits; sigA(r, s) represents a digital signature, the length of which is variable; t represents a time stamp, which means the total number of milliseconds to the present and has a length of 13 bits; mu represents the number of elements transmitted by the vehicleAccordingly, the length is variable; h (mu) represents a data digest, and the length is 256 bits by using an SHA256 hash function. The generated data is divided into general data and emergency data, the general data refers to data including basic safety information of the vehicle such as the position, speed, direction, braking state and effective time of the vehicle, and the emergency data refers to data including special information such as traffic accidents, road congestion states, real-time road conditions and effective time. If the generated data is common data, executing the step 4); if the generated data is urgent data, step 7) is performed.
4) The surrounding vehicles receive the common data packet and verify the digital signature thereof. If the verification is passed, jumping to the step 5); and if the verification fails, deleting the current data, and jumping to the step 3).
5) And the vehicle node broadcasts the common data in the area and submits the common data to the main node in the area. And the main node writes the received data into a request queue of the Internet of vehicles block, stores the data into a regional communication transaction list and broadcasts the data to other main nodes in the region. The structure of the car networking block consists of a block head and a block body, wherein the block head comprises a timestamp, a random number, a hash value of a current block, a hash value of a father block and a hash value of a Merck tree root; the block body includes transaction block data. The time stamp in the block head represents the time when the block is generated, the hash value of the current block represents the hash value of the data of the whole block, the hash value of the parent block represents the hash value of the last block, and the root hash value of the Merckel tree represents the root hash value of all vehicle transaction information stored in the block body; the transaction block data of the block body consists of 10 data blocks, the hash values are calculated in a pairwise crossed mode, and the Merck tree root of the whole transaction block body can be calculated. The size of each block does not exceed 1 Mb.
Data storage Structure referring to FIG. 3, the data block of the transaction block of the block body includes 10 storable vehicle data entries (Item) and data header information. Each piece of data in each entry contains four pieces of information: a timestamp, a data owner public key, metadata, and an entry hash. The metadata comprises common data or emergency data, the common data comprises basic safety information of the vehicle such as the position, speed, direction, braking state and effective time of the vehicle, and the emergency data comprises special information such as traffic accidents, road congestion states, real-time road conditions and effective time. The size of each piece of data does not exceed 1 kb. The entry hash is the total hash value of the three types of data, namely the timestamp, the data owner public key and the metadata in each entry. The header information contains a timestamp and a hash value for the data block.
6) The total number of edge nodes and vehicle nodes in the region is set as R, and a main node is selected through p ═ vmodR, whereinpRepresenting a main node, v representing a view number, and selecting a part of nodes as replica nodes. And if the main node has malicious behaviors, reselecting the node from the replica nodes as the main node. After the master node is selected, the vehicle networking nodes execute an in-area consensus mechanism according to a consistency protocol to complete vehicle networking block consensus. The car networking block which is verified firstly in the main node group in the area is reserved, and the car networking blocks generated by other main nodes are deleted, and then step 10) is executed.
7) And the edge node in the area where the vehicle node is located receives the emergency data packet and verifies the digital signature of the emergency data packet. If the verification is passed, calculating an area interested in the emergency data, broadcasting and informing all vehicle nodes between the areas of interest, and then executing the step 8); and if the verification fails, deleting the current data, and jumping to the step 3).
8) The nodes of the Internet of vehicles execute an inter-region consensus mechanism, namely submitting emergency data to the main nodes of the public chain of the Internet of vehicles. And the main node of the Internet of vehicles public link writes the received emergency data into a request queue of a new Internet of vehicles block, stores the emergency data into a public link communication transaction list and broadcasts the emergency data to other main nodes between the interested areas. The inter-region consensus method adopted herein comprises the following steps:
8.1) the master nodes in the master node group send preparation messages to other master nodes and uniformly collect approval messages returned by other master nodes;
8.2) if the master node receives more than f an acknowledgement message1A (f)12/3 for the number of master nodes in the master node cluster), indicating other master nodesThe verification is passed, the consensus is achieved at the moment, the Internet of vehicles block is written into the global main chain, and the step 8.3) is continuously executed; if the acceptance message received by the master node does not meet the requirement, the consensus fails and the process exits.
8.3) if the blockchain network finds that a certain main node is a malicious node, the blockchain network randomly selects one node in the replica nodes to replace the current main node, and then continues to finish the current consensus; and if the main node does not find the abnormity, the operation is not carried out.
9) And (4) reserving the vehicle networking area which is verified firstly in the main node group among the interested areas, deleting the vehicle networking area generated by other main nodes, and continuing to execute the step 10).
10) After the generation of the car networking block, the data is updated as shown in fig. 4, and at each car networking node, the data of the current blockchain network and a list containing the hash value of each block are backed up. Each time a car networking tile is generated, the hash value for the current car networking tile is updated in the list. When the vehicle node moves from one area to another area, the block chain information in the original area is deleted, and the block chain information and data of the current area network are updated and downloaded. And when the storage amount of the vehicle nodes reaches a threshold value, judging the validity period of the Internet of vehicles block from the beginning. If the validity period of the car networking block at the beginning of the block chain is exceeded, deleting all data in the overtime car networking block; if the validity period of the car networking block in the middle of the block chain is exceeded, in order to verify the integrity and authenticity of the deleted data and the car networking block, the data of the car networking block is deleted, the hash value of the car networking block is reserved, and then the step 3) is skipped again.
The above embodiments are only for illustrating the technical solutions of the present invention and are not limited, and other modifications or equivalent substitutions made by the technical solutions of the present invention by the ordinary skilled person in the art are included in the scope of the claims of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (6)

1. A car networking node data safety communication method based on a block chain is characterized in that: the method comprises the following steps:
step 1): the method comprises the following steps of dividing a car networking into cellular areas with the same size, designing car networking alliance chains and inter-area public chains by taking the areas as units, wherein the car networking alliance chains are formed by communication base stations, roadside embedded devices and vehicle nodes, and edge side devices of the communication base stations and the roadside embedded devices are called edge nodes;
step 2): the node identity authentication based on the cloud server and the verification group is executed by the Internet of vehicles, the node is allowed to access the network after the authentication is successful, and the step 3 is continuously executed); refusing access after authentication failure, and re-executing the step 2);
step 3): monitoring a vehicle by a vehicle-mounted sensor of a vehicle node, performing hash calculation according to generated data, and generating a digital signature and a data packet; dividing the generated data into common data and emergency data, wherein the common data mainly comprises the position, speed, direction, braking state and effective time of the vehicle and the emergency data mainly comprises special information data of traffic accidents, road congestion states, real-time road conditions and effective time; judging the type of the generated data, if the generated data is normal data, executing the step 4), and if the generated data is emergency data, executing the step 7);
step 4): the surrounding vehicles receive the common data packet and verify the digital signature of the common data packet; if the verification is passed, executing the step 5), and if the verification fails, deleting the current data and then executing the step 3);
step 5): the vehicle node broadcasts the common data packet in the area and submits the common data packet to a main node in the area, and the main node writes the received data into a request queue of the vehicle networking block, stores the request queue into a regional communication transaction list and broadcasts the request queue to other main nodes in the area; the structure of the car networking block consists of a block head and a block body, wherein the block head comprises a timestamp, a random number, a hash value of a current block, a hash value of a father block and a hash value of a Merck tree root; the block body comprises transaction block data, the transaction block data is composed of a plurality of data blocks, and every two of the data blocks are crossed to calculate a hash value; the data block of the transaction block comprises a plurality of storable vehicle data entries and data header information, each piece of data in each data entry comprises a timestamp, a data owner public key, metadata and an entry hash, the metadata comprises common data, and the entry hash is a total hash value of the timestamp, the data owner public key and the metadata in each data entry; the data header information comprises a time stamp and a hash value of the data block;
step 6): in the area where the vehicle nodes are located, besides the main node, part of the nodes are selected as replica nodes, and if the main node has malicious behaviors, the nodes are reselected from the replica nodes to serve as the main node; after the main node is determined, the vehicle networking node executes an in-area consensus mechanism according to a consistency protocol to complete vehicle networking block consensus; the car networking block which is verified firstly in the main node group in the area is reserved, and the car networking blocks generated by other main nodes are deleted, and then step 10) is executed;
step 7): after receiving the emergency data packet, the edge node in the area where the vehicle node is located verifies the digital signature of the emergency data packet, if the emergency data packet passes the verification, the edge node calculates the area interested by the emergency data, broadcasts and notifies all vehicle nodes in the area of interest, and then executes the step 8); if the verification fails, deleting the current data, and skipping to the step 3);
step 8): the Internet of vehicles node executes an inter-area consensus mechanism, namely, the emergency data is submitted to the main node of the Internet of vehicles public chain, the main node of the Internet of vehicles public chain writes the received emergency data into a request queue of a new Internet of vehicles block, stores the emergency data into a public chain communication transaction list, and broadcasts the emergency data to other main nodes among the areas of interest;
step 9): the vehicle networking area block which is verified firstly in the main node group between the interested areas is reserved, the vehicle networking area blocks generated by other main nodes are deleted, and the step 10) is continuously executed;
step 10): after the car networking block is generated, the data is updated on the list of each car networking node.
2. The block chain-based data security communication method for the Internet of vehicles nodes according to claim 1, characterized in that: the node identity authentication method in the step 2) is specifically as follows:
2.1) the cloud server stores and manages factory information and real identities of the nodes of the Internet of vehicles, and manages pseudonyms of the nodes of the Internet of vehicles issued by a Certificate Authority (CA);
2.2) after the nodes of the Internet of vehicles are registered, a certificate issued by a Certificate Authority (CA) is obtained, wherein the certificate comprises a pseudonym, a pair of public and private keys and two hash values;
2.3) after the Internet of vehicles node is started, sending a request to a CA; CA calculates the hash value of the pseudonym + public key, and calculates the hash value of the real name + certificate; if the two hash values are the same, the CA passes the authentication of the Internet of vehicles node and executes the step 2.4); if the two hash values are different, the authentication fails, the CA records the node and refuses the node to access the network, and the step 2) is executed again;
2.4) after the nodes of the Internet of vehicles are authenticated by the cloud server, the nodes of the Internet of vehicles can be added into the block chain for data communication, the block chain network randomly selects edge nodes and vehicle nodes in each area to form a verification group, and the nodes which are selected to be the verification group cannot be considered until all possible combinations traverse in the next random combination process;
2.5) if the vehicle node does not move from the neighbor area to the current area, executing the step 2.6); if the vehicle node moves from the neighbor area to the current area, the vehicle node can continue to participate in data communication only after passing the identity authentication of the verification group; if the authentication of the verification group is not passed, the blockchain network stops the right of the vehicle node to participate in the data communication, and the step 2.4) is executed again;
2.6) if the vehicle node is newly added into the blockchain network, the main node where the vehicle node is located sends a verification request to a verification group in other areas; if the vehicle node does not pass the verification in each area, the identity verification of the vehicle node is considered to be successful, and the vehicle node can participate in data communication; otherwise, the data can not be participated in the communication, and the step 2.4) is executed again.
3. The block chain-based data security communication method for the vehicle networking nodes, according to claim 2, is characterized in that: in the step 2.4), the vehicle node and the edge node can store node information which is communicated within 1 hour in a communication list; if the node information in the list exceeds the time range, the node information is deleted; the edge nodes not only update the communicable list with each other, but also communicate with the vehicle nodes and update the communicable list; when the edge node communicates with the vehicle node, the edge node only updates the same node information in the vehicle node.
4. The block chain-based data security communication method for the vehicle networking nodes, according to claim 2, is characterized in that: in the step 2.5), the vehicle node identity verification mode moving from the neighbor area to the current area is as follows: the method comprises the steps that a main node selected by a current area where a vehicle node is located sends a verification request to a verification group of the area where the vehicle node is located and the area around the vehicle node, and the vehicle node information can be considered to pass the verification of the area as long as a communicable list of 1 edge node or a plurality of vehicle nodes in the verification group can inquire the vehicle node information; if the vehicle node passes the verification of the region where the vehicle node is located before the cross-region and fails to pass the verification in the surrounding region, the identity verification of the vehicle node is considered to be successful, and the vehicle node can continue to participate in data communication.
5. The block chain-based data security communication method for the Internet of vehicles nodes according to claim 1, characterized in that: the inter-region consensus mechanism in step 8) is as follows:
8.1) the master nodes in the master node group send preparation messages to other master nodes and uniformly collect approval messages returned by other master nodes;
8.2) if the number of the approval messages received by the master node exceeds 2/3 of the number of the master nodes in the master node group, indicating that the verification of other master nodes passes, at the moment, achieving consensus, writing the car networking block into the global main chain, and continuing to execute the step 8.3); if the acceptance message received by the main node does not meet the requirement, the consensus fails, and the program exits;
8.3) if the blockchain network finds that a certain main node is a malicious node, the blockchain network randomly selects one node in the replica nodes to replace the current main node, and then continues to finish the current consensus; and if the main node does not find the abnormity, the operation is not carried out.
6. The block chain-based data security communication method for the Internet of vehicles nodes according to claim 1, characterized in that: the updating method of the car networking block data in the step 10) is as follows: data of the current blockchain network and a list containing the hash value of each block are backed up on each Internet of vehicles node; updating the hash value of the current Internet of vehicles block in the list when one Internet of vehicles block is generated; when the vehicle node moves from one area to another area, deleting the block chain information in the original area, and updating and downloading the block chain information and data of the current area network; when the storage capacity of the vehicle nodes reaches a threshold value, judging the validity period of the vehicle networking block from the beginning;
if the validity period of the car networking block at the beginning of the block chain is exceeded, deleting all data in the overtime car networking block; if the validity period of the car networking block in the middle of the block chain is exceeded, the data of the car networking block is deleted, the hash value of the car networking block is kept, and then the step 3) is skipped again.
CN202010410190.XA 2020-05-15 2020-05-15 Vehicle networking node data safety communication method based on block chain Active CN111601258B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010410190.XA CN111601258B (en) 2020-05-15 2020-05-15 Vehicle networking node data safety communication method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010410190.XA CN111601258B (en) 2020-05-15 2020-05-15 Vehicle networking node data safety communication method based on block chain

Publications (2)

Publication Number Publication Date
CN111601258A true CN111601258A (en) 2020-08-28
CN111601258B CN111601258B (en) 2021-10-12

Family

ID=72185491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010410190.XA Active CN111601258B (en) 2020-05-15 2020-05-15 Vehicle networking node data safety communication method based on block chain

Country Status (1)

Country Link
CN (1) CN111601258B (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112399382A (en) * 2020-11-17 2021-02-23 平安科技(深圳)有限公司 Vehicle networking authentication method, device, equipment and medium based on block chain network
CN112449318A (en) * 2020-10-23 2021-03-05 浙江浙大中控信息技术有限公司 Message transmission method based on C-V2X vehicle-road cooperative application
CN112600672A (en) * 2020-11-30 2021-04-02 清华大学 Inter-domain credibility consensus method and device based on real identity
CN112636897A (en) * 2020-12-17 2021-04-09 清华大学 Data encryption method for intelligent networked automobile cloud control application and cloud control energy-saving system
CN112866399A (en) * 2021-01-28 2021-05-28 深圳大学 Improved PBFT consensus method, device, intelligent terminal and storage medium
CN113038427A (en) * 2021-03-01 2021-06-25 重庆邮电大学 Block chain cross-region authentication method based on credit mechanism and DPOS
CN113301047A (en) * 2021-05-25 2021-08-24 浙江树人学院(浙江树人大学) Vehicle networking node consistency consensus method based on malicious node attack detection
CN113630775A (en) * 2021-07-26 2021-11-09 一汽奔腾轿车有限公司 Intelligent networking automobile safety communication system and method
CN113704350A (en) * 2021-08-03 2021-11-26 西安交通大学 Intelligent electric vehicle data storage method based on block chain multi-chain technology fusion
CN113794711A (en) * 2021-09-10 2021-12-14 安徽江淮汽车集团股份有限公司 Vehicle information management and control architecture construction method based on block chain and national cryptographic algorithm
CN113838292A (en) * 2021-09-02 2021-12-24 徐州俊之邦智能科技有限公司 Cellular blockchain traffic data storage system
CN113922864A (en) * 2021-10-09 2022-01-11 郑州大学 Multi-layer satellite network security guarantee method based on Byzantine consensus
CN114449000A (en) * 2021-12-28 2022-05-06 北京邮电大学 Vehicle network data consensus optimization storage method and storage system
CN114466050A (en) * 2022-04-11 2022-05-10 国汽智控(北京)科技有限公司 Vehicle-mounted data processing method and device based on block chain and electronic equipment
CN114726877A (en) * 2022-03-18 2022-07-08 扬州大学 Block chain-based data storage updating method under edge calculation
CN115002145A (en) * 2021-05-26 2022-09-02 中移互联网有限公司 Block chain-based vehicle information sharing system and method
CN115051983A (en) * 2021-12-29 2022-09-13 昆明理工大学 Vehicle networking trust management system and method based on block chain
CN115086336A (en) * 2022-06-09 2022-09-20 重庆吼吼科技有限公司 Industrial Internet platform equipment data acquisition driving P2P downloading method and system
CN115150135A (en) * 2022-06-22 2022-10-04 国网数字科技控股有限公司 Block chain consensus method and device suitable for distributed power transaction
CN115514502A (en) * 2021-06-03 2022-12-23 中移雄安信息通信科技有限公司 Block chain-based edge computing platform identity authentication method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109922149A (en) * 2019-03-06 2019-06-21 中南大学 A kind of car networking Data Exchange Model based on block chain
CN110430061A (en) * 2019-07-19 2019-11-08 东南大学 A kind of car networking equipment identities authentication method based on block chain technology
CN110602117A (en) * 2019-09-20 2019-12-20 浙江树人学院(浙江树人大学) Vehicle networking node consistency consensus method based on block chain
CN111050317A (en) * 2019-12-07 2020-04-21 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109922149A (en) * 2019-03-06 2019-06-21 中南大学 A kind of car networking Data Exchange Model based on block chain
CN110430061A (en) * 2019-07-19 2019-11-08 东南大学 A kind of car networking equipment identities authentication method based on block chain technology
CN110602117A (en) * 2019-09-20 2019-12-20 浙江树人学院(浙江树人大学) Vehicle networking node consistency consensus method based on block chain
CN111050317A (en) * 2019-12-07 2020-04-21 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
TIGANG JIANG,HUA FANG,HONGGANG WANG: "Blockchain-Based Internet of Vehicles: Distributed Network Architecture and Performance Analysis", 《IEEE INTERNET OF THINGS JOURNAL》 *
万子龙,匡芬: "基于区块链技术的车联网安全体系结构探究", 《网络信息安全》 *
任条娟等: "基于信道切换的车联网数据传输算法", 《研究与开发》 *

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112449318A (en) * 2020-10-23 2021-03-05 浙江浙大中控信息技术有限公司 Message transmission method based on C-V2X vehicle-road cooperative application
CN112449318B (en) * 2020-10-23 2023-04-25 浙江中控信息产业股份有限公司 Message transmission method based on C-V2X vehicle-road cooperative application
CN112399382A (en) * 2020-11-17 2021-02-23 平安科技(深圳)有限公司 Vehicle networking authentication method, device, equipment and medium based on block chain network
CN112600672B (en) * 2020-11-30 2022-02-25 清华大学 Inter-domain credibility consensus method and device based on real identity
CN112600672A (en) * 2020-11-30 2021-04-02 清华大学 Inter-domain credibility consensus method and device based on real identity
CN112636897A (en) * 2020-12-17 2021-04-09 清华大学 Data encryption method for intelligent networked automobile cloud control application and cloud control energy-saving system
CN112866399A (en) * 2021-01-28 2021-05-28 深圳大学 Improved PBFT consensus method, device, intelligent terminal and storage medium
CN113038427A (en) * 2021-03-01 2021-06-25 重庆邮电大学 Block chain cross-region authentication method based on credit mechanism and DPOS
CN113038427B (en) * 2021-03-01 2022-04-01 重庆邮电大学 Block chain cross-region authentication method based on credit mechanism and DPOS
CN113301047A (en) * 2021-05-25 2021-08-24 浙江树人学院(浙江树人大学) Vehicle networking node consistency consensus method based on malicious node attack detection
CN113301047B (en) * 2021-05-25 2022-06-03 浙江树人学院(浙江树人大学) Vehicle networking node consistency consensus method based on malicious node attack detection
CN115002145B (en) * 2021-05-26 2023-07-21 中移互联网有限公司 Vehicle information sharing system and method based on block chain
CN115002145A (en) * 2021-05-26 2022-09-02 中移互联网有限公司 Block chain-based vehicle information sharing system and method
CN115514502A (en) * 2021-06-03 2022-12-23 中移雄安信息通信科技有限公司 Block chain-based edge computing platform identity authentication method and device
CN113630775A (en) * 2021-07-26 2021-11-09 一汽奔腾轿车有限公司 Intelligent networking automobile safety communication system and method
CN113704350A (en) * 2021-08-03 2021-11-26 西安交通大学 Intelligent electric vehicle data storage method based on block chain multi-chain technology fusion
CN113838292A (en) * 2021-09-02 2021-12-24 徐州俊之邦智能科技有限公司 Cellular blockchain traffic data storage system
CN113794711A (en) * 2021-09-10 2021-12-14 安徽江淮汽车集团股份有限公司 Vehicle information management and control architecture construction method based on block chain and national cryptographic algorithm
CN113922864A (en) * 2021-10-09 2022-01-11 郑州大学 Multi-layer satellite network security guarantee method based on Byzantine consensus
CN114449000A (en) * 2021-12-28 2022-05-06 北京邮电大学 Vehicle network data consensus optimization storage method and storage system
CN114449000B (en) * 2021-12-28 2022-10-11 北京邮电大学 Internet of vehicles data consensus optimization storage method and storage system
CN115051983A (en) * 2021-12-29 2022-09-13 昆明理工大学 Vehicle networking trust management system and method based on block chain
CN115051983B (en) * 2021-12-29 2023-10-03 昆明理工大学 Internet of vehicles trust management system and method based on blockchain
CN114726877A (en) * 2022-03-18 2022-07-08 扬州大学 Block chain-based data storage updating method under edge calculation
CN114466050A (en) * 2022-04-11 2022-05-10 国汽智控(北京)科技有限公司 Vehicle-mounted data processing method and device based on block chain and electronic equipment
CN115086336A (en) * 2022-06-09 2022-09-20 重庆吼吼科技有限公司 Industrial Internet platform equipment data acquisition driving P2P downloading method and system
CN115150135A (en) * 2022-06-22 2022-10-04 国网数字科技控股有限公司 Block chain consensus method and device suitable for distributed power transaction

Also Published As

Publication number Publication date
CN111601258B (en) 2021-10-12

Similar Documents

Publication Publication Date Title
CN111601258B (en) Vehicle networking node data safety communication method based on block chain
Yang et al. Blockchain-based traffic event validation and trust verification for VANETs
CN110300107B (en) Vehicle networking privacy protection trust model based on block chain
CN109451467B (en) Vehicle-mounted self-organizing network data secure sharing and storage system based on block chain technology
Cebe et al. Block4forensic: An integrated lightweight blockchain framework for forensics applications of connected vehicles
Lei et al. A blockchain based certificate revocation scheme for vehicular communication systems
CN109816995B (en) Intelligent traffic signal lamp safety dynamic regulation and control method based on alliance block chain technology
Sharma et al. Blockchain-based internet of vehicles (IoV): an efficient secure ad hoc vehicular networking architecture
Wang et al. Challenges and solutions in autonomous driving: A blockchain approach
Guo et al. Proof-of-event recording system for autonomous vehicles: A blockchain-based solution
CN111988381A (en) HashGraph-based vehicle networking distributed trust system and trust value calculation method
Zheng et al. Lightweight blockchain consensus protocols for vehicular social networks
Chen et al. A trust-based message propagation and evaluation framework in vanets
Li et al. Frame: An innovative incentive scheme in vehicular networks
CN112929333B (en) Vehicle networking data safe storage and sharing method based on hybrid architecture
Al Falasi et al. Revocation in VANETs: A survey
Liu et al. A byzantine-tolerant distributed consensus algorithm for connected vehicles using proof-of-eligibility
Lee et al. Design of a two layered blockchain-based reputation system in vehicular networks
CN112116349B (en) High-throughput-rate-oriented random consensus method and device for drawing account book
Hu et al. Vtrust: a robust trust framework for relay selection in hybrid vehicular communications
CN114048578A (en) High-throughput block chain system and performance optimization model for 6G network
CN114945022A (en) Internet of vehicles edge calculation sharing method based on block chain
Liu et al. Securing connected vehicle applications with an efficient dual cyber-physical blockchain framework
Zhang et al. Blockchain based secure package delivery via ridesharing
CN112272366A (en) Automobile emergency information communication method based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant