CN112861163A - Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value - Google Patents

Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value Download PDF

Info

Publication number
CN112861163A
CN112861163A CN202110277565.4A CN202110277565A CN112861163A CN 112861163 A CN112861163 A CN 112861163A CN 202110277565 A CN202110277565 A CN 202110277565A CN 112861163 A CN112861163 A CN 112861163A
Authority
CN
China
Prior art keywords
node
evidence
server
manager
rsu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110277565.4A
Other languages
Chinese (zh)
Other versions
CN112861163B (en
Inventor
王基书
朱锐
李彤
高烽森
王强
肖强
苗晨
候振
汤雅惠
黄月
李松霖
吕昌龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan University YNU
Original Assignee
Yunnan University YNU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan University YNU filed Critical Yunnan University YNU
Priority to CN202110277565.4A priority Critical patent/CN112861163B/en
Publication of CN112861163A publication Critical patent/CN112861163A/en
Application granted granted Critical
Publication of CN112861163B publication Critical patent/CN112861163B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5083Techniques for rebalancing the load in a distributed system

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a credit ETC system based on an evidence chain frame, which comprises an RSU, an OBU, a Server and at least one Manager, wherein the RSU, the OBU, the Server and the Manager form a block chain network; the method also comprises a Trusted Storage Center for constructing the evidence chain framework; the RSU is used for storing data of a block head in a block chain, verifying transaction and encrypting transaction information; the OBU is used for storing block head data in the block chain and conducting transaction; the Server is used for storing complete block chain data and participating in verification of the evidence file; the Manager is used for managing nodes in the block chain system; and the Trustedstorage Center is used for storing an evidence file generated by the transaction in the block chain system. The invention solves the problems of low fee evasion, transaction safety and inspection efficiency in the current ETC.

Description

Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value
Technical Field
The invention relates to the field of ETC, in particular to a credit ETC system based on an evidence chain framework, a data protection method for the system and a vehicle behavior management method based on a credit value.
Background
ETC plays an important role in an intelligent transportation system, changes a station charging mode of an expressway, gradually replaces a traditional manual charging mode, contributes to reducing human resource cost, improves vehicle passing efficiency of roads, accelerates development of the expressway, and provides better service for people.
However, there are many problems with current ETC, mainly:
1) ETC is dominated by the government, but the imperfection of the ETC at present causes various problems that the fare can not be traced, which becomes a loophole for some drivers to use, and the fare evasion is carried out by using a mode such as mixed use of a pass card, so that relevant departments and the government suffer great loss.
2) The evidence auditing efficiency is low, in order to audit the illegal behaviors, the auditor needs to check a large amount of data and obtain valuable clues from the data, and meanwhile, the auditor takes a large amount of time for collecting the evidence of fee evasion behaviors.
3) ETC stores a large amount of user data, an on-board unit (OBU) of a vehicle has the risk of data leakage in the process of communicating with a Road Station Unit (RSU), and the traditional database storage mode also has the problems of data safety and effectiveness.
Disclosure of Invention
The invention aims to: aiming at the existing problems, the credit ETC system based on the evidence chain frame is provided, and vehicle fee evasion behaviors are restrained by a vehicle behavior management method based on a credit value; the burden of block chain storage is relieved by constructing an evidence storage framework and the evidence storage framework is used for checking; meanwhile, the transaction data is encrypted and protected through a data protection method, so that the system ensures efficiency and improves data security.
The technical scheme adopted by the invention is as follows:
the invention relates to a credit ETC system based on an evidence chain frame, which comprises a road station unit RSU, a vehicle-mounted unit OBU, a Server and at least one Manager, wherein the road station unit RSU, the vehicle-mounted unit OBU, the Server and the Manager form a block chain network;
the road station unit RSU is used for storing data of a block head in a block chain, verifying the transaction, and encrypting transaction information by using a symmetric key distributed by a manager and an AES (advanced encryption standard) algorithm;
the OBU is used for storing block head data in the block chain, carrying out transaction in the system and inquiring transaction information of the OBU;
the Server is used for storing complete block chain data, participating in verification of the evidence file and verifying the evidence file by using an SHA-256 algorithm;
the Manager is used for managing nodes in the block chain system, distributing the symmetric key to the server and the RSU by using an RSA algorithm, and managing the nodes in the system through a legal node list;
the system also comprises a managed Storage Center Trusted Storage Center for constructing an evidence chain framework;
the managed Storage Center is used for storing an evidence file generated by transaction in the block chain system, and an evidence chain frame is constructed by verifying the evidence file and checking the evidence file with evidence information stored in the local Server.
Preferably, the road station unit RSU and the on-board unit OBU are both light nodes of a block chain network, and store block header information of the block chain; the Server and the Manager are all nodes of the block chain network, and the Server stores complete data of the block chain; the managed Storage Center belongs to an external role of the blockchain network, is an entity outside the blockchain network, and preferably selects a Trusted third-party Storage mechanism.
Preferably, the RSU and the OBU are authorized by the manager to be added into the system; the RSU and the server acquire a legal node list issued by the manager from the blockchain network.
Preferably, the evidence chain framework comprises a blockchain module and a storage module; the block chain module is a block chain network and is used for receiving the transaction data of the nodes and obtaining evidence of the transaction records; the Storage module comprises a managed Storage Center used for storing the evidence file and a Server used for storing the evidence information; and verifying the validity of the evidence files in the evidence chain framework by using a hash algorithm during uploading and downloading.
Preferably, the method for verifying the validity of the evidence file comprises the following steps:
s1: node i initiates the jth transaction
Figure BDA0002977260600000021
S2: the RSU verifies whether the node i is in a legal node list issued by the manager, and if the node i does not exist in the list, the RSU stops the transaction;
s3: RSU handle
Figure BDA0002977260600000022
Produced by
Figure BDA0002977260600000023
Sending the data to a server;
s4: server pair
Figure BDA0002977260600000024
To find
Figure BDA0002977260600000025
Then will be
Figure BDA0002977260600000027
Deposit to FsiPerforming the following steps;
s5: server will send
Figure BDA0002977260600000026
Ft uploaded to a regulated storage centeri
S6: an inspector inspects the evidence files of the nodes i;
s7: server will slave FtiIn-download of the required evidence file Ei
S8: server will use hash algorithm pair EiThe evidence file in (1) is verified, and the solved hash value and Fs areiHash of middle correspondenceiCompare if hash (E)i)=HashiIf yes, the evidence file is not tampered, and if yes, hash (E)i)≠HashiIf the evidence file is tampered, the evidence file is downloaded from the next trusted storage center and verified.
The invention discloses a data protection method for a credit ETC system based on an evidence chain framework, which comprises the following steps:
the method comprises the following steps: manager generates a symmetric key SK for distributions
Step two: manager pair SKsTime stamp TS corresponding to ciphertext1And a nonce for judging whether the private key SKs of the Server is successfully distributed1Using the private key SK of ManagerMSigned and then using the public key PK of the RSUREncrypt and generate ciphertext M1Sending the data to the RSU;
step three: RSU uses private key SK of RSURTo M1Performs decryption to obtain SKsAnd nonce1
Step four: RSU to TS2,nonce1Using SKRSigning is performed and then PK is usedMGenerates M by encryption2Sending the data to manager;
step five: manager uses SKsTo M2Decrypting if the obtained nonce is obtained2And nonce1Same, then SK is explainedsAnd (6) successfully distributing.
Step six: manager pair SKsTime stamp TS corresponding to ciphertext3And a nonce for judging whether the private key SKs of the Server is successfully distributed3Using the private key SK of ManagerMSigning, and encrypting by using public key PKS of Server to generate ciphertext M3Sending the data to a Server;
step seven: server uses SKs pair M of Server's private key3Performs decryption to obtain SKsAnd nonce3
Step eight: server pairs TS4,nonce3Signature using SKs followed by PKSGenerates M by encryption4Sending the data to manager;
step nine: manager uses SKsTo M4Decrypting if the obtained nonce is obtained3And nonce1Same, then SK is explainedsAnd (6) successfully distributing.
The invention discloses a vehicle behavior management method based on a credit value for a credit ETC system based on an evidence chain framework, which comprises the following steps: setting a credit value for each vehicle, and operating the credit value according to the legality of the vehicle behavior; and managing the authority of the node according to the credit value of the node.
Preferably, the method of operating the reputation value in accordance with the legitimacy of the vehicle behaviour comprises:
setting up a message for node iReputation value of Cvi,Cvi=60+Cvi l+Cvi iWherein, Cvi lCredit score, Cv, representing legal behavior of node ii iA credit score representing illegal behavior of node i; cvi l=λ(i)ni lWherein n isi lDenotes the number of successive legal behaviors of node i, and λ (i) denotes Cvi l(ii) an increasing weight of;
Cvi i=λ3ni iwherein n isi iRepresenting the number of illegal actions of node i, λ3Is denoted by Cvi i(ii) an increasing weight of;
when node i performs legal action, ni lAdding 1; when node i performs illegal activities, ni iPlus 1, ni lWill be reduced to 0 while the owner of node i will be subjected to the AND Cvi iCorresponding to the row restriction penalty of days.
Preferably, λ (i) is different for nodes of different reputation values, λ (i) ═ λ1,if 60<=Cvi<100;λ(i)=λ2,if Cvi<60,λ1And λ2Different.
Preferably, the specific method for managing the authority of the node according to the reputation value of the node is as follows: the manager issues a legal node list, public keys of the legal nodes are stored in the list, and the server and the RSU judge whether the nodes for transaction are legal according to the legal node list to allow or prevent the nodes from participating in the transaction; when node i performs illegal action, CviIs deducted a certain reputation score, CviLess than 60, and node i is penalized for a limited period of time, the manager removes node i from the list of legitimate devices until the penalty time for node i expires, and the manager adds node i to the list of legitimate devices.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
1. the invention establishes a block chain architecture facing an ETC system, and solves the problems that the traditional block chain has high power consumption and low efficiency, cannot be used for the ETC system with high throughput and is not suitable for Internet of things (IOT) equipment with limited power.
2. The invention solves the problem of vehicle fee evasion in ETC by a credit value-based ETC vehicle behavior management method. In the method, a parameter of a credit value is added for the node, the credit value is calculated according to whether the behavior of the vehicle is legal or not, the node is managed according to the credit value, and the penalty of illegal behaviors is controlled by adjusting the parameter, so that the illegal behaviors are reduced.
3. The invention also provides a data protection method for improving the safety of the data in the ETC. The asymmetric encryption is used for distributing the symmetric key, so that the contradiction between the openness of block chain data and the need of data confidentiality in an ETC system is solved, and the safety of the data is protected.
4. The evidence chain framework constructed by the method has good performance, effectively reduces the storage load of the block chain server while ensuring the validity of the evidence file, and simultaneously realizes the construction of the evidence chain. The evidence files of the transaction are specially stored through the trusted storage center of the third party, and the evidence files are verified through the hash algorithm, so that the integrity and the validity of the evidence can be ensured, the check of the evidence files of the fee evasion behavior by inspectors can be facilitated, and the load of the block chain can be reduced.
Drawings
The invention will now be described, by way of example, with reference to the accompanying drawings, in which:
FIG. 1 is a structural framework diagram of a reputation ETC system based on an evidence chain framework according to the invention.
Fig. 2 is a flowchart of a symmetric key assignment process in an embodiment.
FIG. 3 is a diagram of a storage structure framework of an evidence file in an embodiment.
FIG. 4 is a flowchart of a verification process for validity of an evidence file in an embodiment.
FIG. 5 is a graph of reputation value as a function of node behavior when an illegal activity occurs.
FIG. 6 is a graph of reputation value versus node behavior as violations occur repeatedly.
Fig. 7 is the effect of an asymmetric encryption algorithm on system transaction performance.
Fig. 8 is a graph of the effect of a symmetric encryption algorithm on system transaction performance.
FIG. 9 is the effect of the SHA256 algorithm on authentication of a document.
Detailed Description
All of the features disclosed in this specification, or all of the steps in any method or process so disclosed, may be combined in any combination, except combinations of features and/or steps that are mutually exclusive.
Any feature disclosed in this specification (including any accompanying claims, abstract) may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.
As shown in fig. 1, the credit ETC system based on the evidence chain framework of the present invention includes a road site unit RSU, a vehicle-mounted unit OBU, a Server and at least one Manager, which form a block chain network; the system also comprises a managed Storage Center Trusted Storage Center for constructing an evidence chain framework;
the road station unit RSU is used for storing data of a block head in a block chain, verifying the transaction, and encrypting transaction information by using a symmetric key distributed by a manager and an AES (advanced encryption standard) algorithm;
ETC mainly comprises RSUs and belongs to light nodes. The RSU keeps part of the chunk header in the blockchain, which will be authorized by the manager to join the system. Whenever the OBU interacts with the RSU, a new transaction is generated and the RSU sends the transaction to the server.
The OBU is used for storing block head data in the block chain, carrying out transaction in the system and inquiring transaction information of the OBU;
and the OBU is used for mainly completing the communication between the vehicle and the RSU and belongs to a light node. The OBU stores the part of the block head in the block chain, has a query function, and is authorized by the manager to be added into the system.
The Server is used for storing complete block chain data, participating in verification of the evidence file and verifying the evidence file by using an SHA-256 algorithm;
the Server is used for maintaining the whole block chain network and belongs to a full node. The Server stores the complete data of the block chain, the Server verifies the transaction sent by the RSU, the transaction is added into the new block after the verification is passed, and when the transaction number of the new block reaches a certain scale, the Server uploads the block to the block chain. The server simultaneously saves a transaction record chain, namely an evidence chain, of each OBU node.
The Manager is used for managing nodes in the block chain system, distributing the symmetric key to the server and the RSU by using an RSA algorithm, and managing the nodes in the system through a legal node list;
manager, the Manager is responsible for managing the nodes in the blockchain system and is a special whole node. The public key and the private key of the manager are written into the code, and the identity of the manager is ensured not to be forged. The RSU and server may obtain the list of legitimate nodes issued by manager from the network to identify the legitimacy of the node. In the system, there may be one or more managers depending on the needs of the ETC department. Manager can effectively manage nodes in the blockchain system, thereby preventing illegal equipment from entering the blockchain system.
The managed Storage Center is used for storing an evidence file generated by transaction in the block chain system, and an evidence chain frame is constructed by verifying the evidence file and checking the evidence file with evidence information stored in the local Server. Several safe and reliable third-party storage mechanisms are selected as the trusted storage center.
Trusted Storage Center is an external role. Due to the characteristics of the blockchain, the blockchain is not suitable for storing a large amount of data, otherwise, the performance and efficiency of the blockchain can be greatly influenced. Therefore, data generated by node transaction, such as pictures, are stored in the managed storage center.
In order to ensure the safety of the system, the system architecture is a federation chain built based on HyperLegger Fabric. Each node in the block chain network has a unique public key/private key pair, is used for identifying the node during communication, is used for signing and authenticating, and ensures the authenticity of the node and the validity of transactions, and meanwhile, a manager can manage the node through the public key/private key of the node.
The first embodiment is as follows: a vehicle behavior management method based on reputation values is disclosed.
The invention processes the behavior of the OBU node by a vehicle behavior management method based on the reputation value.
Defining node i as having a reputation value CviThe reputation value will be updated in real time according to the behavior of the node. Legal behavior, i.e., compliance with ETC rules and normal payment of fees, will increase in credit value as the number of legitimate transactions increases. Conversely, a node performing illegal activities will be lowered in reputation value, in real life, fee evasion when using ETC is illegal activity, so we will also punish the owner of the node, for example: ETC will restrict the owners of nodes that conduct illegal activities from accessing the highway.
According to the behavior of node i, CviIs determined by two parts and can be expressed as
Cvi=60+Cvi l+Cvi i
Wherein, Cvi lCredit score, Cv, representing legitimate behavior of node ii iA reputation score representing the illegal activity of node i. Cvi lAnd λ (i) and ni lCorrelation, can be expressed as
Cvi l=λ(i)ni l
Wherein n isi lRepresenting the number of successive legal actions of node i, Cv if node i performs legal actions within a certain time periodi lWill increase faster if node i performs an illegal action, ni lWill be cleared, thus Cvi lWill also be cleared until node i begins to perform legal behavior. λ (i) denotes Cvi lThe weight of (a) is increased by (b),for nodes with different reputation values, λ (i) is also different, defined as
λ(i)=λ1if 60<=Cvi<100
λ(i)=λ2if Cvi<60
The initial reputation value of each node is 60, and λ can be set if the node is to be encouraged to act legally from the beginning1The setting is larger, so that the node credit value is increased quickly, and meanwhile, if the punishment degree of illegal behaviors is to be emphasized, lambda can be set2The setting is smaller, so that the reputation value of the node subjected to illegal action is increased slowly.
Cvi iAnd λ3And ni iCorrelation, can be expressed as
Cvi i=λ3ni i
Wherein n isi iRepresenting the number of illegal actions of node i, λ3Is denoted by Cvi iIs increased.
Table-node list
Figure BDA0002977260600000071
And dividing the nodes into three classes according to the reputation values of the nodes. Table one lists the information for these three types of nodes. Take node i as an example. Integrity node Cv i100. When node i performs illegal activities, ni iWill add 1, and ni lWill be reduced to 0 while the owner of node i will be subjected to the AND Cvi iAnd (4) a line restriction punishment measure corresponding to days. Progressive node 60<=Cvi<100. When node i performs legal action, ni lWill add 1, when node i performs illegal action, ni iWill add 1, ni lWill be reduced to 0 while the owner of node i will be subjected to the AND Cvi iAnd (4) a line restriction punishment measure corresponding to days. Untrusted node 0<Cvi<60. When festivalWhen point i performs legal action, ni lWill add 1. When node i performs illegal activities, ni iWill add 1, ni lWill be reduced to 0 while the owner of node i will be subjected to the AND Cvi iAnd (4) a line restriction punishment measure corresponding to days. Cvi lRepresenting the positive impact of the reputation value. Cvi iRepresenting the negative influence of the reputation value, λ (i) and λ3Representing the weight coefficients of the two parts respectively. By adjusting λ (i) and λ3To change the weights of the two parts. If one wants to increase the reputation value of the progressive node quickly, λ can be set1Set larger, if the reputation value of the untrusted node is to be slowed down and increased, λ can be set2Set smaller, λ can also be set if a more stringent penalty strategy is to be adopted in the system3The setting is larger. Therefore, the degree of penalty for illegal activities can be controlled by adjusting the values of different parameters, thereby effectively reducing the number of illegal activities. In order to punish a vehicle, the authority of a node is managed according to the credit value of the node, firstly, a manager issues a legal node list, public keys of the legal nodes are stored in the list, and a server and an RSU can judge whether a node for transaction is legal or not according to the legal node list. Taking node i as an example, when node i performs illegal action, CviWill be deducted a certain fraction, in this case CviWill be less than 60 and node i will be penalized for a limited period of time, manager will remove node i from the list of legitimate devices until the penalty time for node i is over, and manager will add node i to the list of legitimate nodes. Manager can smoothly manage vehicle behaviors in ETC by managing the legal node list, and server and RSU can allow or prevent nodes from participating in transactions according to the legal node list issued by Manager.
Example two: a data protection method is disclosed.
Since the blockchain has transparency, the data stored in the blockchain is public and has integrity and validity. However, many data in the ETC system relate to security and privacy and need to be protected, in order to protect data security, a data protection method is provided to protect data in a block chain, and meanwhile, in order to suppress illegal behaviors, authority management is performed on nodes according to credit values of the nodes.
In a block chain network, the most effective method for protecting data is encryption, and the current encryption algorithm mainly has two categories, namely symmetric encryption and asymmetric encryption, wherein the symmetric encryption is faster than the asymmetric encryption, but the security of the symmetric encryption is weaker than that of the asymmetric encryption. The traditional block chain, such as bitcoin, adopts asymmetric encryption. For a high-throughput ETC system, the efficiency of asymmetric encryption cannot meet the requirement, the number of RSUs in the ETC is large, the ETC is not suitable for a hard coding mode, and if the symmetric encryption is directly adopted, the problem of safety is caused, so that a safe mode must be used for distributing the symmetric key. Therefore, a convenient and safe key distribution scheme is adopted, the symmetric key is distributed by using asymmetric encryption, and the security of the distribution process is ensured by the asymmetric encryption.
List of symbols of table two
Figure BDA0002977260600000081
Each node has a unique public/private key pair as an identifier, so that the symmetric key distribution can be performed by using the key pair, and the symbols used in the part are shown in table two. Manager needs to distribute the symmetric key of each RSU node to server at the same time, after the RSU nodes encrypt the transaction, the server needs to decrypt and verify the transaction, and after the verification is passed, the transaction with a certain scale is packaged into a block and added into a block chain.
The distribution steps of the symmetric key are shown in fig. 2.
Step 1, manager generates SKs
Step 2, manager pairs SKs,TS1,nonce1Using SKMSigning is performed and then PK is usedRGenerates M by encryption1Sent to the RSU.
Step 3, the RSU uses SKRTo M1Performs decryption to obtain SKsAnd nonce1
Step 4, RSU pairs TS2,nonce1Using SKRSigning is performed and then PK is usedMGenerates M by encryption2And sending the data to the manager.
Step 5, manager uses SKsTo M2Decrypting if the obtained nonce is obtained2And nonce1Same, then SK is explainedsAnd (6) successfully distributing.
Manager not only needs SKsTo RSU, SK is also requiredsAnd distributing to a server, wherein the step of distributing to the server is the same as the step of distributing to the RSU. Server can distinguish RSU according to public key, thereby using corresponding SKsThe RSU encrypted transaction data is decrypted.
Example three: evidence chain framework.
The system comprises an evidence chain framework which forms the transaction records of each OBU node into an evidence chain. The evidence information is stored in the block chain, and the evidence file is stored in a regulated storage center, such as a picture when entering ETC.
The ETC system has some illegal behaviors, finds the illegal behaviors in time and acquires evidences for inspection, and is an important task to be solved urgently by the conventional ETC system. Similar to the situation in the block chain, in the ETC, most nodes are honest, only few nodes can perform illegal behaviors, and an evidence framework is proposed based on the situation.
Table three symbol list
Figure BDA0002977260600000091
The symbols used in this section are shown in table three. The evidence chain framework is shown in fig. 3, which contains two parts: a block chain module and a storage module, taking node i as an example, and performing the jth transaction T at the node ii jIn time, will be guaranteed in the blockchainStorage Ti jThe information of (1).
In order to improve efficiency of evidence chain inspection and reduce storage load, a storage module is divided into a server storage and a regulated storage center storage, and when a node i joins a block chain network, the server and the regulated storage center respectively create FsiAnd Fti,FtiFor storing Ei,FsiFor storing Hashi
The Trusted storage center has high trust, but in order to ensure the validity of the evidence file stored in the Trusted storage center, a plurality of Trusted storage centers are used for simultaneously storing the evidence file, and the evidence file is verified through a hash algorithm.
Taking node i as an example, the step of verifying the validity of the evidence file is shown in fig. 4 and is divided into 8 steps.
Step 1, a node i initiates a jth transaction Ti j
Step 2, the RSU verifies whether the node i is in the legal node list issued by manager, and if the node i does not exist in the list, the RSU stops the transaction.
Step 3, RSU will send Ti jProduction of Ei jAnd sending the data to the server.
Step 4, server will be right to Ei jHash calculationi jThen Hash the Hashi jDeposit to FsiIn (1).
Step 5, server will Ei jUploading to a regulated storage center.
And 6, the inspection personnel inspects the evidence file of the node i.
Step 7, server will slave FtiIn-download of the required evidence file Ei
Step 8, the server will use the hash algorithm to pair EiThe evidence file in (1) is verified, and the solved hash value and Fs areiHash of middle correspondenceiCompare if hash (E)i)=HashiIf yes, the evidence file is not tampered, and if yes, hash (E)i)≠HashiIf the evidence file is tampered, the evidence file is downloaded from the next trusted storage center and verified.
Because of the higher security of the strusted storage center, all Ft occurs simultaneouslyiThe possibility of tampering is very small, so the evidence framework can reduce the load of the server while ensuring data validity.
Verification evaluation
The effect of the credit-based vehicle management method, the influence of the evidence chain framework on the block chain load and the influence of the introduction of the data protection method on the block chain performance are evaluated through experiments. Because the application scene of the system is oriented to ETC, in order to be closer to the actual situation, the light nodes in the system use 3 Raspberry Pi 4B simulations, and the light nodes are provided with a 64-bit 1.5GHz processor, an 8G RAM and a Linux operating system, wherein 1 simulation RSU node and 2 simulation OBU nodes. The whole node uses 1 server simulation and is provided with a 64bit Intel Xeon 2.3GHz processor, a 32GB RAM and a Linux operating system.
A. Performance of vehicle behavior management method based on reputation value
Legal behaviors and illegal behaviors of the nodes are simulated, changes of credit values of the nodes are analyzed, and in real life, fee evasion is serious illegal behaviors when ETC is used, so that a restriction strategy is adopted according to the credit values of the nodes.
Firstly setting lambda1=3,λ2=2,λ3Taking node i as an example, when not set, Cvi iAnd Cvi lFor CviThe influence of (A) is the same, but in order to effectively suppress the occurrence of illegal actions, lambda is used3Set ratio λ1And λ2More importantly, and node i once it performs illegal activity, Cvi lWill be zeroed and Cvi iAnd is not reduced. Therefore, each time the node i performs illegal action, more legal actions are needed to make up for CviAnd node i will also be penalized for restricted traffic.
As shown in FIG. 5, initially, Cv i60, howeverWhen ETC is used for the 1 st time, the node i performs illegal behaviors, and the Cv performs illegal behaviorsiNode i will be penalized for 15 days, and in order to compensate for the deducted reputation value, node i must continue to act 8 times legitimately.
As shown in fig. 6, node i performs an illegal act at the 3 rd time of using ETC and then performs an illegal act again at the 7 th and 13 th times of using ETC, and thus Cvi iThe number of the nodes is always increased, but each time the node i performs illegal action, the illegal action can cause
Figure BDA0002977260600000111
This will cause node i to need 22 consecutive legal actions before Cv can be returned to zeroiAnd returns to normal level while node i is penalized for a total of 90 days of traffic restriction.
Therefore, for a node, if the node performs two or more illegal actions, the penalty of the node becomes heavier and heavier, and the penalty of the node is divided into two parts, wherein the first part is the limited days calculated according to the reputation value of the node, and the second part is that the node needs to perform more legal actions to restore the reputation value to a normal level.
The result shows that the vehicle management method based on the reputation value is homonymous for each type of nodes, and the vehicle management method can set the lambda1,λ2,λ3To control the outcome of the behaviour in the system, lambda can be set if a stricter penalty is to be applied3The larger the setting. Therefore, as long as the node performs illegal behaviors, strict punishment is carried out, and the more the number of the illegal behaviors is, the heavier the punishment is, and the mechanism can effectively restrain the occurrence of illegal behaviors such as vehicle fee evasion in the ETC system.
B. Impact of data protection methods on system performance
Because a data protection method is introduced into the system, the most important evaluation criterion is the influence of the data protection method on the performance of the blockchain, and the data protection method comprises two modules, namely a symmetric key distribution module and an RSU transaction data encryption module. For the symmetric key distribution module, because each node is only performed once, the impact on blockchain performance is not large. And for the RSU transaction data encryption module, the transaction data is encrypted at each transaction of the RSU, so the usage times are more frequent.
The RSA algorithm is used to distribute symmetric keys, the light nodes are used to perform simulation experiments, the average data encryption time under different message lengths is tested, from 64B to 1MB, each message length is tested 500 times, and the result is shown in fig. 7, where the value of the X axis is the logarithm of the message length.
Obviously, the running time of the asymmetric encryption algorithm increases with the increase of the message length, and when the message length is 64B, the running time of the RSA algorithm is 1.95 ms. When the message length is 1MB, the running time of the RSA algorithm is 16.05 s. For each node, the manager only distributes the symmetric key once, and because the length of the symmetric key is limited and the key distribution is actually performed by the full nodes with better performance, the asymmetric encryption algorithm is adopted to distribute the symmetric key, so that the influence on the efficiency of the system is small.
Compared with an asymmetric encryption algorithm, the symmetric encryption algorithm has higher efficiency, the AES algorithm is adopted to encrypt transaction data, the average data encryption time under different message lengths is tested, each message length is tested 500 times from 1KB to 1MB, and the result is shown in FIG. 8, wherein the value of the X axis is the logarithm value of the message length.
The running time of the symmetric encryption algorithm increases with the increase of the message length, and when the message length is 1KB, the running time of the AES algorithm is 0.49 ms. When the message length is 1MB, the running time of the AES algorithm is 0.43 s. This shows that the transaction data encryption by adopting the symmetric encryption algorithm is much faster than that by adopting the asymmetric encryption algorithm, under the condition that the message length is 1MB, the RSA algorithm needs 16.05s to complete the encryption, while the AES only needs 0.43s, and the influence of the AES algorithm on the whole transaction process is very small, so that the influence of introducing the data protection method on the transaction performance of the system is not large.
C. Impact of evidence chain framework on blockchain load
In the evidence frame, a very important part is to verify an evidence file stored in a trained storage center, the evidence file can be a text or a picture or other types of files, in any case, the evidence file can be verified by adopting a hash algorithm, if the evidence file is a picture, the picture can be converted into base64 code, and then the hash algorithm is used for the coded data.
The SHA-256 algorithm is used for verifying the validity of the evidence file, the evidence file comprises texts and pictures, a simulation experiment is carried out by adopting full nodes, the average running time of the SHA-256 algorithm under different data sizes is tested, from 64B to 2MB, each data size is tested 500 times, and the result is shown in FIG. 9, wherein the value of the X axis is the logarithmic value of the data length.
For text files, the runtime of the SHA256 algorithm is 0.0012s when the data size is 1 KB. For picture files, the runtime of the SHA256 algorithm is 0.387s when the data size is 256 KB. While 256KB pictures are already clear and can be used as evidence files. Therefore, the SHA256 algorithm is adopted to verify the validity of the evidence file, and the influence on the system performance is small.
A large number of experiments and evaluation results show that the system has good performance, the vehicle behavior management method based on the credit value aggravates the consequences of illegal behaviors, is beneficial to reducing the occurrence frequency of illegal behaviors in ETC, and can manage nodes in the system so as to process the behaviors of the vehicle in time. The data protection method can protect the transaction data under the condition of not influencing the system performance, thereby increasing the safety of the node privacy data. The evidence chain framework can construct an evidence chain for the behavior of each vehicle, reduce the pressure of server storage, and improve the evidence obtaining efficiency of the vehicle behavior.
The invention is not limited to the foregoing embodiments. The invention extends to any novel feature or any novel combination of features disclosed in this specification and any novel method or process steps or any novel combination of features disclosed.

Claims (10)

1. A credit ETC system based on an evidence chain frame is characterized by comprising a road station unit RSU, a vehicle-mounted unit OBU, a Server and at least one Manager, wherein the road station unit RSU, the vehicle-mounted unit OBU, the Server and the Manager form a block chain network; the system also comprises a managed Storage Center Trusted Storage Center for constructing an evidence chain framework;
the road station unit RSU is used for storing data of a block head in a block chain, verifying the transaction, and encrypting transaction information by using a symmetric key distributed by a manager and an AES (advanced encryption standard) algorithm;
the OBU is used for storing block head data in the block chain, carrying out transaction in the system and inquiring transaction information of the OBU;
the Server is used for storing complete block chain data, participating in verification of the evidence file and verifying the evidence file by using an SHA-256 algorithm;
the Manager is used for managing nodes in the block chain system, distributing the symmetric key to the server and the RSU by using an RSA algorithm, and managing the nodes in the system through a legal node list;
the managed Storage Center is used for storing an evidence file generated by transaction in the block chain system, and an evidence chain frame is constructed by verifying the evidence file and checking the evidence file with evidence information stored in the local Server.
2. The evidence chain framework-based reputation ETC system of claim 1, wherein the road site unit RSU and the on-board unit OBU are both light nodes of a blockchain network, storing blockchain blockhead information; the Server and the Manager are all nodes of the block chain network, and the Server stores complete data of the block chain; the managed Storage Center belongs to an external role of the block chain network and is an entity outside the block chain network.
3. An evidence chain framework based reputation ETC system according to claim 1, wherein both the RSU and OBU are authorized by manager to join the system; the RSU and the server acquire a legal node list issued by the manager from the blockchain network.
4. The evidence chain framework-based reputation ETC system of claim 1, wherein the evidence chain framework comprises a blockchain module and a storage module; the block chain module is a block chain network and is used for receiving the transaction data of the nodes and obtaining evidence of the transaction records; the Storage module comprises a managed Storage Center used for storing the evidence file and a Server used for storing the evidence information; and verifying the validity of the evidence files in the evidence chain framework by using a hash algorithm during uploading and downloading.
5. The evidence chain framework-based reputation ETC system according to claim 4, wherein the evidence file validity verification method comprises:
s1: node i initiates the jth transaction
Figure FDA0002977260590000011
S2: the RSU verifies whether the node i is in a legal node list issued by the manager, and if the node i does not exist in the list, the RSU stops the transaction;
s3: RSU handle
Figure FDA0002977260590000021
Produced by
Figure FDA0002977260590000022
Sending the data to a server;
s4: server pair
Figure FDA0002977260590000023
To find
Figure FDA0002977260590000024
Then will be
Figure FDA0002977260590000025
Deposit to FsiPerforming the following steps;
s5: server will send
Figure FDA0002977260590000026
Ft uploaded to a regulated storage centeri
S6: an inspector inspects the evidence files of the nodes i;
s7: server will slave FtiIn-download of the required evidence file Ei
S8: server will use hash algorithm pair EiThe evidence file in (1) is verified, and the solved hash value and Fs areiHash of middle correspondenceiCompare if hash (E)i)=HashiIf yes, the evidence file is not tampered, and if yes, hash (E)i)≠HashiIf the evidence file is tampered, the evidence file is downloaded from the next trusted storage center and verified.
6. A data protection method for the evidence chain framework based reputation ETC system according to any one of claims 1-5, characterized by comprising the steps of:
the method comprises the following steps: manager generates a symmetric key SK for distributions
Step two: manager pair SKsTime stamp TS corresponding to cipher text1And a nonce for judging whether the private key SKs of the Server is successfully distributed1Using the private key SK of ManagerMSigned and then using the public key PK of the RSUREncrypt and generate ciphertext M1Sending the data to the RSU;
step three: RSU uses private key SK of RSURTo M1Performs decryption to obtain SKsAnd nonce1
Step four: RSU to TS2,nonce1Using SKRSigning is performed and then PK is usedMGenerates M by encryption2Sending the data to manager;
step five: manager uses SKsTo M2Carry out decryptionIf the obtained nonce is obtained2And nonce1Same, then SK is explainedsAnd (6) successfully distributing.
Step six: manager pair SKsTime stamp TS corresponding to cipher text3And a nonce for judging whether the private key SKs of the Server is successfully distributed3Using the private key SK of ManagerMSigning, and encrypting by using public key PKS of Server to generate ciphertext M3Sending the data to a Server;
step seven: server uses SKs pair M of Server's private key3Performs decryption to obtain SKsAnd nonce3
Step eight: server pairs TS4,nonce3Signature using SKs followed by PKSGenerates M by encryption4Sending the data to manager;
step nine: manager uses SKsTo M4Decrypting if the obtained nonce is obtained3And nonce1Same, then SK is explainedsAnd (6) successfully distributing.
7. A reputation value-based vehicle behavior management method for the evidence chain framework-based reputation ETC system according to any one of claims 1 to 5, comprising: and setting a credit value for each vehicle, operating the credit value according to the legality of the vehicle behavior, and managing the authority of the node according to the credit value of the node.
8. The reputation value-based vehicle behavior management method according to claim 7, wherein the method of operating on the reputation value according to the legitimacy of the vehicle behavior comprises:
setting the reputation value of node i to Cvi,Cvi=60+Cvi l+Cvi iWherein, Cvi lCredit score, Cv, representing legal behavior of node ii iA credit score representing illegal behavior of node i; cvi l=λ(i)ni lWherein n isi lRepresenting successive legal behaviour of node iDegree of rotation, λ (i) denotes Cvi l(ii) an increasing weight of;
Cvi i=λ3ni iwherein n isi iRepresenting the number of illegal actions of node i, λ3Is denoted by Cvi i(ii) an increasing weight of;
when node i performs legal action, ni lAdding 1; when node i performs illegal activities, ni iPlus 1, ni lWill be reduced to 0 while the owner of node i will be subjected to the AND Cvi iCorresponding to the row restriction penalty of days.
9. A reputation value-based vehicle behavior management method according to claim 8, wherein λ (i) is different for nodes of different reputation values, λ (i) ═ λ1,if 60<=Cvi<100;λ(i)=λ2,if Cvi<60,λ1And λ2Different.
10. The reputation-value-based vehicle behavior management method according to claim 7, wherein a specific method of managing the rights of a node according to the reputation value of the node is: the manager issues a legal node list, public keys of the legal nodes are stored in the list, and the server and the RSU judge whether the nodes for transaction are legal according to the legal node list to allow or prevent the nodes from participating in the transaction; when node i performs illegal action, CviIs deducted a certain reputation score, CviLess than 60, and node i is penalized for a limited period of time, the manager removes node i from the list of legitimate devices until the penalty time for node i expires, and the manager adds node i to the list of legitimate devices.
CN202110277565.4A 2021-03-15 2021-03-15 Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value Active CN112861163B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110277565.4A CN112861163B (en) 2021-03-15 2021-03-15 Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110277565.4A CN112861163B (en) 2021-03-15 2021-03-15 Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value

Publications (2)

Publication Number Publication Date
CN112861163A true CN112861163A (en) 2021-05-28
CN112861163B CN112861163B (en) 2022-12-30

Family

ID=75994548

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110277565.4A Active CN112861163B (en) 2021-03-15 2021-03-15 Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value

Country Status (1)

Country Link
CN (1) CN112861163B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113610642A (en) * 2021-08-05 2021-11-05 北京百度网讯科技有限公司 Data processing method and device based on block chain and electronic equipment

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109118219A (en) * 2018-08-01 2019-01-01 中国联合网络通信集团有限公司 Transaction data processing method and device
US20190180519A1 (en) * 2017-12-09 2019-06-13 Brian Hausman System and Method for Toll Transactions Utilizing a Distributed Ledger
US20190208442A1 (en) * 2017-12-29 2019-07-04 Veniam, Inc. Methods and system for distributed transactions in a network of moving things
CN110428351A (en) * 2019-07-29 2019-11-08 电子科技大学 Semi vehicle violation based on block chain reports method
CN110427432A (en) * 2019-08-08 2019-11-08 英华达(上海)科技有限公司 Violation event processing method, system, equipment and storage medium based on block chain
CN111079196A (en) * 2019-11-29 2020-04-28 山东爱城市网信息技术有限公司 Block chain-based radio frequency vehicle illegal recording management method, device and medium
CN111080445A (en) * 2019-10-28 2020-04-28 北京大学 Credible certificate storing method and system based on graph structure
CN111405011A (en) * 2020-03-07 2020-07-10 北京工业大学 Block chain based trusted node joining method in VANET
CN111435349A (en) * 2019-01-15 2020-07-21 费希尔-罗斯蒙特系统公司 Automated architecture network security based on blockchains
CN111444257A (en) * 2020-02-11 2020-07-24 江苏荣泽信息科技股份有限公司 Block chain-based electronic evidence storage method and system
CN111464980A (en) * 2020-04-08 2020-07-28 南通大学 Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment
CN111756546A (en) * 2020-06-15 2020-10-09 杭州电子科技大学 Block chain consensus method based on dynamic credit mechanism in Internet of vehicles environment
CN111915752A (en) * 2020-06-16 2020-11-10 山东浪潮质量链科技有限公司 High-speed ETC charging method, device and medium based on block chain
CN111932699A (en) * 2020-08-12 2020-11-13 中国银行股份有限公司 ETC charging method, system, device and storage medium based on block chain
CN111967952A (en) * 2020-10-21 2020-11-20 南京云链智运科技有限公司 Intelligent truck logistics transaction system based on intelligent Internet of vehicles and block chain
CN111988381A (en) * 2020-08-07 2020-11-24 南通大学 HashGraph-based vehicle networking distributed trust system and trust value calculation method
CN112019481A (en) * 2019-05-30 2020-12-01 上海交通大学 Block chain equipment management and data transmission system based on directed acyclic graph architecture
CN112116726A (en) * 2020-08-23 2020-12-22 江苏通行宝智慧交通科技股份有限公司 ETC transaction security method and device based on block chain technology

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190180519A1 (en) * 2017-12-09 2019-06-13 Brian Hausman System and Method for Toll Transactions Utilizing a Distributed Ledger
US20190208442A1 (en) * 2017-12-29 2019-07-04 Veniam, Inc. Methods and system for distributed transactions in a network of moving things
CN109118219A (en) * 2018-08-01 2019-01-01 中国联合网络通信集团有限公司 Transaction data processing method and device
CN111435349A (en) * 2019-01-15 2020-07-21 费希尔-罗斯蒙特系统公司 Automated architecture network security based on blockchains
CN112019481A (en) * 2019-05-30 2020-12-01 上海交通大学 Block chain equipment management and data transmission system based on directed acyclic graph architecture
CN110428351A (en) * 2019-07-29 2019-11-08 电子科技大学 Semi vehicle violation based on block chain reports method
CN110427432A (en) * 2019-08-08 2019-11-08 英华达(上海)科技有限公司 Violation event processing method, system, equipment and storage medium based on block chain
CN111080445A (en) * 2019-10-28 2020-04-28 北京大学 Credible certificate storing method and system based on graph structure
CN111079196A (en) * 2019-11-29 2020-04-28 山东爱城市网信息技术有限公司 Block chain-based radio frequency vehicle illegal recording management method, device and medium
CN111444257A (en) * 2020-02-11 2020-07-24 江苏荣泽信息科技股份有限公司 Block chain-based electronic evidence storage method and system
CN111405011A (en) * 2020-03-07 2020-07-10 北京工业大学 Block chain based trusted node joining method in VANET
CN111464980A (en) * 2020-04-08 2020-07-28 南通大学 Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment
CN111756546A (en) * 2020-06-15 2020-10-09 杭州电子科技大学 Block chain consensus method based on dynamic credit mechanism in Internet of vehicles environment
CN111915752A (en) * 2020-06-16 2020-11-10 山东浪潮质量链科技有限公司 High-speed ETC charging method, device and medium based on block chain
CN111988381A (en) * 2020-08-07 2020-11-24 南通大学 HashGraph-based vehicle networking distributed trust system and trust value calculation method
CN111932699A (en) * 2020-08-12 2020-11-13 中国银行股份有限公司 ETC charging method, system, device and storage medium based on block chain
CN112116726A (en) * 2020-08-23 2020-12-22 江苏通行宝智慧交通科技股份有限公司 ETC transaction security method and device based on block chain technology
CN111967952A (en) * 2020-10-21 2020-11-20 南京云链智运科技有限公司 Intelligent truck logistics transaction system based on intelligent Internet of vehicles and block chain

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
JISHU WANG等: "ETC-Oriented Efficient and Secure Blockchain: Credit-Based Mechanism and Evidence Framework for Vehicle Management", 《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 *
刘小明 等: "基于区块链技术的高速公路收费凭证信息认证方法研究", 《智能科学与技术学报》 *
李萌 等: "基于区块链的安全车联网数字取证系统", 《物联网学报》 *
杨洪路 等: "基于区块链的ETC管理系统设计与实现", 《中国交通信息化》 *
黄世泽 等: "区块链技术在ETC系统中的应用探讨", 《上海公路》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113610642A (en) * 2021-08-05 2021-11-05 北京百度网讯科技有限公司 Data processing method and device based on block chain and electronic equipment

Also Published As

Publication number Publication date
CN112861163B (en) 2022-12-30

Similar Documents

Publication Publication Date Title
EP3451578B1 (en) Turn-control rewritable blockchain
CN107566116B (en) Method and apparatus for digital asset weight registration
US11223487B2 (en) Method and system for secure blockchain-based vehicular digital forensics
CN112073484B (en) GDPR compliance supervision method and system based on alliance chain
Li et al. Eunomia: Anonymous and secure vehicular digital forensics based on blockchain
CN109417478A (en) Multilink cryptologic block chain
CN110912705B (en) Distributed electronic voting method and system based on block chain
Li et al. Toward vehicular digital forensics from decentralized trust: An accountable, privacy-preserving, and secure realization
CN114139203B (en) Block chain-based heterogeneous identity alliance risk assessment system and method and terminal
CN111859446A (en) Agricultural product traceability information sharing-privacy protection method and system
Accorsi Log data as digital evidence: What secure logging protocols have to offer?
CN116405187A (en) Distributed node intrusion situation sensing method based on block chain
Wang et al. ETC-oriented efficient and secure blockchain: Credit-based mechanism and evidence framework for vehicle management
CN112861163B (en) Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value
CN117155644A (en) Medical data hierarchical access control and sharing method with link-up and link-down cooperation
Zhang et al. Secure and reliable parking protocol based on blockchain for VANETs
Wang et al. Housing rental scheme based on redactable blockchain
KR20190027207A (en) System and method for verifying integrity of personal information
CN116484969A (en) Training method and device of federal learning model and automobile
Chen et al. Design and formal analysis of a group signature based electronic toll pricing system
Gallo et al. T-DRE: a hardware trusted computing base for direct recording electronic vote machines
CN110391912B (en) Distributed evaluation decision method and system based on secret sharing mechanism
Yang et al. A multi-grained log auditing scheme for cloud data confidentiality
Chen et al. CDEdit: A Highly Applicable Redactable Blockchain with Controllable Editing Privilege and Diversified Editing Types
CN111555857A (en) Edge network and network transmission method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant