CN112861163B - Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value - Google Patents

Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value Download PDF

Info

Publication number
CN112861163B
CN112861163B CN202110277565.4A CN202110277565A CN112861163B CN 112861163 B CN112861163 B CN 112861163B CN 202110277565 A CN202110277565 A CN 202110277565A CN 112861163 B CN112861163 B CN 112861163B
Authority
CN
China
Prior art keywords
node
evidence
server
manager
rsu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110277565.4A
Other languages
Chinese (zh)
Other versions
CN112861163A (en
Inventor
王基书
朱锐
李彤
高烽森
王强
肖强
苗晨
候振
汤雅惠
黄月
李松霖
吕昌龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan University YNU
Original Assignee
Yunnan University YNU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan University YNU filed Critical Yunnan University YNU
Priority to CN202110277565.4A priority Critical patent/CN112861163B/en
Publication of CN112861163A publication Critical patent/CN112861163A/en
Application granted granted Critical
Publication of CN112861163B publication Critical patent/CN112861163B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5083Techniques for rebalancing the load in a distributed system

Abstract

The invention discloses a credit ETC system based on an evidence chain frame, which comprises an RSU, an OBU, a Server and at least one Manager, wherein the RSU, the OBU, the Server and the Manager form a block chain network; the method also comprises a Trusted Storage Center for constructing the evidence chain framework; the RSU is used for storing data of a block head in a block chain, verifying transaction and encrypting transaction information; the OBU is used for storing the block head data in the block chain and conducting transaction; the Server is used for storing complete block chain data and participating in verification of the evidence file; the Manager is used for managing nodes in the block chain system; and the Trustedstorage Center is used for storing the evidence files generated by the transactions in the block chain system. The invention solves the problems of low fee evasion, transaction safety and inspection efficiency in the current ETC.

Description

Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value
Technical Field
The invention relates to the field of ETC, in particular to a credit ETC system based on an evidence chain framework, a data protection method for the system and a vehicle behavior management method based on a credit value.
Background
ETC plays an important role in an intelligent transportation system, changes a station toll collection mode of an expressway, gradually replaces a traditional manual toll collection mode, contributes to reducing human resource cost, improves vehicle passing efficiency of roads, accelerates development of the expressway, and provides better service for people.
However, there are many problems with current ETC, mainly:
1) ETC is dominated by the government, but the imperfection of the ETC at present causes various problems that the fare can not be traced, which becomes a loophole for some drivers to use, and the fare evasion is carried out by using a mode such as mixed use of a pass card, so that relevant departments and the government suffer great loss.
2) The evidence auditing efficiency is low, in order to audit the illegal behaviors, the auditor needs to check a large amount of data and obtain valuable clues from the data, and meanwhile, the auditor takes a large amount of time for collecting the evidence of fee evasion behaviors.
3) ETC stores a large amount of user data, an on-board unit (OBU) of a vehicle has the risk of data leakage in the process of communicating with a Road Station Unit (RSU), and the traditional database storage mode also has the problems of data safety and effectiveness.
Disclosure of Invention
The invention aims to: aiming at the existing problems, the credit ETC system based on the evidence chain frame is provided, and vehicle fee evasion behaviors are restrained by a vehicle behavior management method based on a credit value; the burden of block chain storage is relieved by constructing an evidence storage framework and the evidence storage framework is used for checking; meanwhile, the transaction data is encrypted and protected through a data protection method, so that the system ensures efficiency and improves data security.
The technical scheme adopted by the invention is as follows:
the invention relates to a credit ETC system based on an evidence chain frame, which comprises a road station unit RSU, a vehicle-mounted unit OBU, a Server and at least one Manager, wherein the road station unit RSU, the vehicle-mounted unit OBU, the Server and the Manager form a block chain network;
the road station unit RSU is used for storing data of a block head in a block chain, verifying the transaction, and encrypting transaction information by using a symmetric key distributed by a manager and an AES (advanced encryption standard) algorithm;
the OBU is used for storing block head data in the block chain, carrying out transaction in the system and inquiring transaction information of the OBU;
the Server is used for storing complete block chain data, participating in verification of the evidence file and verifying the evidence file by using an SHA-256 algorithm;
the Manager is used for managing nodes in the block chain system, distributing the symmetric key to the server and the RSU by using an RSA algorithm, and managing the nodes in the system through a legal node list;
the system also comprises a managed Storage Center Trusted Storage Center for constructing an evidence chain framework;
the managed Storage Center is used for storing an evidence file generated by transaction in the block chain system, and an evidence chain frame is constructed by verifying the evidence file and checking the evidence file with evidence information stored in the local Server.
Preferably, the road station unit RSU and the on-board unit OBU are both light nodes of a block chain network, and store block header information of the block chain; the Server and the Manager are all nodes of the block chain network, and the Server stores complete data of the block chain; the managed Storage Center belongs to an external role of the block chain network, is an entity outside the block chain network, and preferably selects a Trusted third-party Storage mechanism.
Preferably, the RSU and the OBU are authorized by the manager to be added into the system; the RSU and the server acquire a legal node list issued by the manager from the blockchain network.
Preferably, the evidence chain framework comprises a blockchain module and a storage module; the block chain module is a block chain network and is used for receiving the transaction data of the nodes and obtaining evidence of the transaction records; the Storage module comprises a managed Storage Center Trusted Storage Center for storing the evidence files and a Server for storing the evidence information; and verifying the validity of the evidence files in the evidence chain framework by using a hash algorithm during uploading and downloading.
Preferably, the method for verifying the validity of the evidence file comprises the following steps:
s1: node i initiates the jth transaction
Figure BDA0002977260600000021
S2: the RSU verifies whether the node i is in a legal node list issued by the manager, and if the node i does not exist in the list, the RSU stops the transaction;
s3: RSU handle
Figure BDA0002977260600000022
Produced by
Figure BDA0002977260600000023
Sending the data to a server;
s4: server pair
Figure BDA0002977260600000024
To find
Figure BDA0002977260600000025
Then will be
Figure BDA0002977260600000027
Deposit to Fs i Performing the following steps;
s5: server will send
Figure BDA0002977260600000026
Ft uploaded to a regulated storage center i
S6: an inspector inspects the evidence files of the nodes i;
s7: server will slave Ft i In-download of the required evidence file E i
S8: server will use hash algorithm pair E i Verifying the evidence file in (1), and solving the hash value and Fs i Hash corresponding to (1) i Compare if hash (E) i )=Hash i If yes, the evidence file is not tampered, and if yes, hash (E) i )≠Hash i If the evidence file is tampered, the evidence file is downloaded from the next trusted storage center and verified.
The invention discloses a data protection method for a credit ETC system based on an evidence chain framework, which comprises the following steps:
the method comprises the following steps: manager generates a symmetric key SK for distribution s
Step two: manager pair SK s Time stamp TS corresponding to ciphertext 1 And a nonce for judging whether the private key SKs of the Server is successfully distributed 1 Using the private key SK of Manager M Signed and then using the public key PK of the RSU R Encrypt and generate ciphertext M 1 Sending the data to the RSU;
step three: RSU uses private key SK of RSU R To M 1 Performs decryption to obtain SK s And nonce 1
Step four: RSU to TS 2 ,nonce 1 Using SK R Signature is made and then PK is used M Generates M by encryption 2 Sending the data to manager;
step five: manager uses SK s To M 2 Performing decryption, if the obtained nonce 2 And nonce 1 Same, then SK is explained s And (6) successfully distributing.
Step six: manager pair SK s Time stamp TS corresponding to ciphertext 3 And a nonce for judging whether the private key SKs of the Server is successfully distributed 3 Using the private key SK of Manager M Signing, and encrypting by using public key PKS of Server to generate ciphertext M 3 Sending the data to a Server;
step seven: server uses SKs pair M of Server's private key 3 Performs decryption to obtain SK s And nonce 3
Step eight: server pairs TS 4 ,nonce 3 Signature using SKs followed by PK S Generates M by encryption 4 Sending the data to manager;
step nine: manager uses SK s To M 4 Performing decryption, if the obtained nonce 3 And nonce 1 Same, then SK is explained s And (6) successfully distributing.
The invention discloses a vehicle behavior management method based on a credit value for a credit ETC system based on an evidence chain framework, which comprises the following steps: setting a credit value for each vehicle, and operating the credit value according to the legality of the vehicle behavior; and managing the authority of the node according to the reputation value of the node.
Preferably, the method of operating the reputation value in accordance with the legitimacy of the vehicle behaviour comprises:
setting the reputation value of node i to Cv i ,Cv i =60+Cv i l +Cv i i Wherein, cv i l Credit score, cv, representing legal behavior of node i i i A credit score representing illegal behavior of node i; cv i l =λ(i)n i l Wherein n is i l Denotes the number of successive legal behaviors of node i, and λ (i) denotes Cv i l (ii) an increasing weight of;
Cv i i =λ 3 n i i wherein n is i i Representing the number of illegal actions of node i, λ 3 Is denoted by Cv i i (ii) an increasing weight of;
when node i performs legal action, n i l Adding 1; when node i performs illegal activities, n i i Adding 1,n i l Will be reduced to 0 while the owner of node i will be subjected to the AND Cv i i Corresponding to the row restriction penalty of days.
Preferably, λ (i) = λ (i) is different for nodes of different reputation values 1 ,if 60<=Cv i <100;λ(i)=λ 2 ,if Cv i <60,λ 1 And λ 2 Different.
Preferably, the specific method for managing the authority of the node according to the reputation value of the node is as follows: the manager issues a legal node list, public keys of the legal nodes are stored in the list, and the server and the RSU judge whether the nodes for transaction are legal according to the legal node list to allow or prevent the nodes from participating in the transaction; when node i performs illegal action, cv i Is deducted a certain reputation score, cv i Less than 60, and node i is penalized for a limited period of time, the manager removes node i from the list of legitimate devices until the penalty time for node i expires, and the manager adds node i to the list of legitimate devices.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
1. the invention establishes a block chain architecture facing an ETC system, and solves the problems that the traditional block chain has high power consumption and low efficiency, cannot be used for the ETC system with high throughput and is not suitable for Internet of things (IOT) equipment with limited power.
2. The invention solves the problem of vehicle fee evasion in ETC by a credit value-based ETC vehicle behavior management method. In the method, a parameter of a credit value is added for the node, the credit value is calculated according to whether the behavior of the vehicle is legal or not, the node is managed according to the credit value, and the penalty of illegal behaviors is controlled by adjusting the parameter, so that the illegal behaviors are reduced.
3. The invention further provides a data protection method for improving the safety of the data in the ETC. The asymmetric encryption is used for distributing the symmetric key, so that the contradiction between the openness of block chain data and the need of data confidentiality in an ETC system is solved, and the safety of the data is protected.
4. The evidence chain framework constructed by the method has good performance, effectively reduces the storage load of the block chain server while ensuring the validity of the evidence file, and simultaneously realizes the construction of the evidence chain. The evidence files of the transaction are specially stored through the trusted storage center of the third party, and the evidence files are verified through the hash algorithm, so that the integrity and the validity of the evidence can be ensured, the check of the evidence files of the fee evasion behavior by inspectors can be facilitated, and the load of the block chain can be reduced.
Drawings
The invention will now be described, by way of example, with reference to the accompanying drawings, in which:
FIG. 1 is a structural framework diagram of a reputation ETC system based on an evidence chain framework according to the invention.
Fig. 2 is a flowchart of a symmetric key assignment process in an embodiment.
FIG. 3 is a diagram of a storage structure framework of an evidence file in an embodiment.
FIG. 4 is a flowchart of a verification process for validity of an evidence file in an embodiment.
FIG. 5 is a graph of reputation value versus node behavior as illegal activities occur.
FIG. 6 is a graph of reputation value versus node behavior as violations occur repeatedly.
Fig. 7 is the effect of an asymmetric encryption algorithm on system transaction performance.
Fig. 8 is a graph of the effect of a symmetric encryption algorithm on system transaction performance.
FIG. 9 is the effect of the SHA256 algorithm on authentication of a document.
Detailed Description
All of the features disclosed in this specification, or all of the steps in any method or process so disclosed, may be combined in any combination, except combinations of features and/or steps that are mutually exclusive.
Any feature disclosed in this specification (including any accompanying claims, abstract) may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.
As shown in fig. 1, the credit ETC system based on the evidence chain framework of the present invention includes a road site unit RSU, a vehicle-mounted unit OBU, a Server and at least one Manager, which form a block chain network; the managed Storage Center Trusted Storage Center is used for constructing an evidence chain framework;
the road station unit RSU is used for storing data of a block head in a block chain, verifying the transaction, and encrypting transaction information by using a symmetric key distributed by a manager and an AES (advanced encryption standard) algorithm;
ETC mainly comprises RSUs and belongs to light nodes. The RSU keeps part of the chunk header in the blockchain, which will be authorized by the manager to join the system. Whenever the OBU interacts with the RSU, a new transaction is generated and the RSU sends the transaction to the server.
The OBU is used for storing block head data in the block chain, carrying out transaction in the system and inquiring transaction information of the OBU;
and the OBU is mainly used for completing the communication between the vehicle and the RSU and belongs to a light node. The OBU saves the part of the chunk header in the chunk chain, has a query function, and is authorized by the manager to join the system.
The Server is used for storing complete block chain data, participating in verification of the evidence file and verifying the evidence file by using an SHA-256 algorithm;
the Server is used for maintaining the whole block chain network and belongs to a full node. The Server stores the complete data of the block chain, the Server verifies the transaction sent by the RSU, the transaction is added into the new block after the verification is passed, and when the transaction number of the new block reaches a certain scale, the Server uploads the block to the block chain. The server simultaneously saves a transaction record chain, namely an evidence chain, of each OBU node.
The Manager is used for managing nodes in the block chain system, distributing the symmetric key to the server and the RSU by using an RSA algorithm, and managing the nodes in the system through a legal node list;
manager, the Manager is responsible for managing the nodes in the block chain system and is a special full node. The public key and the private key of the manager are written into the code, so that the identity of the manager is ensured not to be forged. The RSU and server may obtain the list of legitimate nodes issued by manager from the network to identify the legitimacy of the node. In the system, there may be one or more managers depending on the needs of the ETC department. Manager can effectively manage nodes in the blockchain system, thereby preventing illegal equipment from entering the blockchain system.
The managed Storage Center is used for storing an evidence file generated by transaction in the block chain system, and an evidence chain frame is constructed by verifying the evidence file and checking the evidence file with evidence information stored in the local Server. Several safe and reliable third-party storage mechanisms are selected as the trusted storage center.
Trusted Storage Center is an external role. Due to the characteristics of the blockchain, the blockchain is not suitable for storing a large amount of data, otherwise, the performance and efficiency of the blockchain can be greatly influenced. Therefore, data generated by node transaction, such as pictures, are stored in the managed storage center.
In order to ensure the safety of the system, the system architecture is a federation chain built based on HyperLegger Fabric. Each node in the block chain network has a unique public key/private key pair, is used for identifying the node during communication, is used for signing and authenticating, and ensures the authenticity of the node and the validity of transactions, and meanwhile, a manager can manage the node through the public key/private key of the node.
The first embodiment is as follows: a vehicle behavior management method based on reputation values is disclosed.
The invention processes the behavior of the OBU node through a vehicle behavior management method based on the reputation value.
Defining node i as having a reputation value Cv i The reputation value will be updated in real time according to the behavior of the node. Legal behavior, i.e., compliance with ETC rules and normal payment of fees, will increase in credit value as the number of legitimate transactions increases. Conversely, a node performing illegal activities will be lowered in reputation value, in real life, fee evasion when using ETC is illegal activity, so we will also punish the owner of the node, for example: ETC will restrict the owners of nodes that conduct illegal activities from accessing the highway.
According to the behavior of node i, cv i Is determined by two parts and can be expressed as
Cv i =60+Cv i l +Cv i i
Wherein, cv i l Credit score, cv, representing legitimate behavior of node i i i A reputation score representing the illegal activity of node i. Cv i l And λ (i) and n i l Correlation, can be expressed as
Cv i l =λ(i)n i l
Wherein n is i l Representing the number of successive legal actions of node i, cv if node i performs legal actions within a certain time period i l Will increase faster if node i performs an illegal action, n i l Will be cleared, thus Cv i l Will also be cleared until node i begins to perform legal behavior. λ (i) denotes Cv i l The added weight of (b) is different for nodes with different reputation values, and is defined as
λ(i)=λ 1 if 60<=Cv i <100
λ(i)=λ 2 if Cv i <60
Initial reputation value for each nodeAre all 60, lambda may be assigned if it is desired to encourage the node to act legally from the outset 1 The setting is larger, so that the node credit value is increased quickly, and meanwhile, if the punishment to illegal behaviors is to be emphasized, the lambda can be set 2 The setting is smaller, so that the reputation value of the node subjected to illegal action is increased slowly.
Cv i i And λ 3 And n i i Correlation, can be expressed as
Cv i i =λ 3 n i i
Wherein n is i i Representing the number of illegal actions of node i, λ 3 Is denoted by Cv i i Is increased.
Table-node list
Figure BDA0002977260600000071
And dividing the nodes into three classes according to the reputation values of the nodes. Table one lists the information for these three types of nodes. Take node i as an example. Integrity node Cv i =100. When node i performs illegal activities, n i i Will add 1, and n i l Will be reduced to 0 while the owner of node i will be subjected to the AND Cv i i And (4) a line restriction punishment measure corresponding to days. Progressive node 60<=Cv i <100. When node i performs legal action, n i l Will add 1, when node i performs illegal action, n i i Add 1,n i l Will be reduced to 0 while the owner of node i will be subjected to the AND Cv i i And (4) a restriction punishment measure corresponding to the number of days. Untrusted node 0<Cv i <60. When node i performs legal action, n i l Will add 1. When node i performs illegal activities, n i i Add 1,n i l Will be reduced to 0 while the owner of node i will be subjected to the AND Cv i i And (4) a restriction punishment measure corresponding to the number of days. Cv i l Representing the positive impact of the reputation value. Cv i i Representing the negative influence of the reputation value, λ (i) and λ 3 Representing the weight coefficients of the two parts respectively. By adjusting λ (i) and λ 3 To change the weights of the two parts. If one wants to increase the reputation value of the progressive node quickly, λ can be set 1 Set larger, if the reputation value of the untrusted node is to be slowed down and increased, λ can be set 2 Set smaller, λ can also be set if a more stringent penalty strategy is to be adopted in the system 3 The setting is larger. Therefore, the degree of penalty for illegal activities can be controlled by adjusting the values of different parameters, thereby effectively reducing the number of illegal activities. In order to punish a vehicle, the authority of the node is managed according to the reputation value of the node, firstly, the manager issues a legal node list, public keys of the legal nodes are stored in the list, and the server and the RSU can judge whether the node for transaction is legal or not according to the legal node list. Taking node i as an example, when node i performs illegal action, cv i Will be deducted a certain fraction, in this case Cv i Will be less than 60 and node i will be penalized for a limited period of time, manager will remove node i from the list of legitimate devices until the penalty time for node i is over, and manager will add node i to the list of legitimate nodes. Manager can smoothly manage vehicle behaviors in ETC by managing the legal node list, and server and RSU can allow or prevent nodes from participating in transactions according to the legal node list issued by Manager.
Example two: a data protection method is disclosed.
Since the blockchain has transparency, the data stored in the blockchain is public and has integrity and validity. However, many data in the ETC system relate to security and privacy and need to be protected, in order to protect data security, a data protection method is provided to protect data in a block chain, and meanwhile, in order to suppress illegal behaviors, authority management is performed on nodes according to credit values of the nodes.
In a block chain network, the most effective method for protecting data is encryption, and the current encryption algorithm mainly has two categories, namely symmetric encryption and asymmetric encryption, wherein the symmetric encryption is faster than the asymmetric encryption, but the security of the symmetric encryption is weaker than that of the asymmetric encryption. The traditional block chain, such as bitcoin, adopts asymmetric encryption. For a high-throughput ETC system, the efficiency of asymmetric encryption cannot meet the requirement, the number of RSUs in the ETC is large, the ETC is not suitable for a hard coding mode, and if the symmetric encryption is directly adopted, the problem of safety is caused, so that a safe mode must be used for distributing the symmetric key. Therefore, a convenient and safe key distribution scheme is adopted, the symmetric key is distributed by using asymmetric encryption, and the security of the distribution process is ensured by the asymmetric encryption.
List of symbols of table two
Figure BDA0002977260600000081
Each node has a unique public/private key pair as an identifier, so that the symmetric key distribution can be performed by using the key pair, and the symbols used in the part are shown in table two. The Manager needs to distribute the symmetric key of each RSU node to the server at the same time, after the RSU nodes encrypt the transaction, the server needs to decrypt and verify the transaction, and after the verification is passed, the transaction with a certain scale is packaged into a block and added into a block chain.
The distribution steps of the symmetric key are shown in fig. 2.
Step 1, manager generates SK s
Step 2, manager pairs SK s ,TS 1 ,nonce 1 Using SK M Signing is performed and then PK is used R Generates M by encryption 1 Sent to the RSU.
Step 3, the RSU uses SK R To M 1 Performs decryption to obtain SK s And nonce 1
Step 4, RSU to TS 2 ,nonce 1 Using SK R Signing is performed and then PK is used M Carry out encryption to generate M 2 And sending the data to the manager.
Step 5, manager uses SK s To M is aligned with 2 Decrypting if the obtained nonce is obtained 2 And nonce 1 Same, then SK is explained s And (6) successfully distributing.
Manager not only needs SK s To RSU, SK is also required s And distributing to a server, wherein the step of distributing to the server is the same as the step of distributing to the RSU. Server can distinguish RSU according to public key, thereby using corresponding SK s The RSU encrypted transaction data is decrypted.
Example three: evidence chain framework.
The system comprises an evidence chain framework which forms the transaction records of each OBU node into an evidence chain. The evidence information is stored in the block chain, and the evidence file is stored in a regulated storage center, such as a picture when entering ETC.
Some illegal behaviors exist in the ETC system, the illegal behaviors are found in time, and evidences are obtained to check, so that the ETC system is an important task to be solved urgently at present. Similar to the situation in the block chain, in ETC, most nodes are honest, and only a very few nodes perform illegal behaviors, and an evidence framework is proposed based on the situation.
Table three symbol list
Figure BDA0002977260600000091
The symbols used in this section are shown in table three. The evidence chain framework is shown in fig. 3, which contains two parts: a block chain module and a storage module, taking node i as an example, and performing the jth transaction T at the node i i j Then, T will be saved in the blockchain i j The information of (1).
In order to improve efficiency of evidence chain inspection and reduce storage load, a storage module is divided into a server storage and a regulated storage center storage, and the server storage and the regulated storage center storage are divided when a node i joins a block chain networkCreating Fs i And Ft i ,Ft i For storing E i ,Fs i For storing Hash i
The Trusted storage center has high trust, but in order to ensure the validity of the evidence file stored in the Trusted storage center, a plurality of Trusted storage centers are used for simultaneously storing the evidence file, and the evidence file is verified through a hash algorithm.
Taking node i as an example, the step of verifying the validity of the evidence file is shown in fig. 4 and is divided into 8 steps.
Step 1, a node i initiates a jth transaction T i j
Step 2, the RSU will verify if node i is in the list of legitimate nodes issued by manager, and if node i is not in the list, the RSU will stop the transaction.
Step 3, RSU will send T i j Production of E i j And sending the data to the server.
Step 4, server will be paired with E i j Hash calculation i j Then Hash the Hash i j Deposit to Fs i In (1).
Step 5, server will E i j Uploading to a regulated storage center.
And 6, the inspection personnel inspects the evidence file of the node i.
Step 7, server will slave Ft i In-download of the required evidence file E i
Step 8, the server will use the hash algorithm to pair E i The evidence file in (1) is verified, and the solved hash value and Fs are i Hash of middle correspondence i Compare if hash (E) i )=Hash i If yes, the evidence file is not tampered, and if yes, hash (E) i )≠Hash i If the evidence file is tampered, the evidence file is downloaded from the next trusted storage center and verified.
Because of the higher security of the trained storage center, all Fts occur simultaneously i The possibility of being tampered is very small, so thatAccording to the framework, the load of the server can be reduced while the data effectiveness is ensured.
Verification evaluation
The effect of the credit-based vehicle management method, the influence of the evidence chain framework on the block chain load and the influence of the introduction of the data protection method on the block chain performance are evaluated through experiments. Because the application scene of the system faces ETC, in order to be closer to the actual situation, the light node in the system uses 3 Raspberry Pi 4B simulations, and the light node is provided with 64bit 1.5GHz processor, 8G RAM and Linux operating system, wherein 1 simulation RSU node and the other 2 simulation OBU nodes. The whole node uses 1 server simulation, and is provided with a 64bit Intel Xeon 2.3GHz processor, 32GB RAM and a Linux operating system.
A. Performance of vehicle behavior management method based on reputation value
Legal behaviors and illegal behaviors of the nodes are simulated, changes of credit values of the nodes are analyzed, and in real life, fee evasion is serious illegal behaviors when ETC is used, so that a restriction strategy is adopted according to the credit values of the nodes.
Firstly setting lambda 1 =3,λ 2 =2,λ 3 = -15, take node i as example, in case of not setting, cv i i And Cv i l For Cv i The influence of (A) is the same, but in order to effectively suppress the occurrence of illegal actions, lambda is used 3 Set ratio λ 1 And λ 2 More importantly, and node i once it performs illegal activity, cv i l Will return to zero and Cv i i And will not be reduced. Therefore, each time the node i performs illegal action, more legal actions are needed to make up for Cv i And node i will also be penalized for restricted traffic.
As shown in FIG. 5, initially, cv i =60, but when using ETC 1 st time, node i has performed illegal activity, cv in this case i =45, node i will be penalized for 15 days, and in order to compensate for the deducted reputation value, node i must continue to act legitimately 8 times.
As shown in FIG. 6, node i performed ETC on the 3 rd useIllegal acts are carried out subsequently when ETC is used 7 th and 13 th times, so Cv i i The number of the nodes is always increased, but each time the node i performs illegal action, the illegal action can cause
Figure BDA0002977260600000111
This will cause node i to need 22 consecutive legal actions before Cv can be returned to zero i And returns to normal level while node i is penalized for a total of 90 days of traffic restriction.
Therefore, for a node, if the node performs two or more illegal actions, the penalty of the node becomes heavier and heavier, and the penalty of the node is divided into two parts, wherein the first part is the limited days calculated according to the reputation value of the node, and the second part is that the node needs to perform more legal actions to restore the reputation value to a normal level.
The result shows that the vehicle management method based on the reputation value is homonymous for each type of nodes, and the vehicle management method can set the lambda 1 ,λ 2 ,λ 3 To control the outcome of the behaviour in the system, lambda can be set if a stricter penalty is to be applied 3 The setting is larger. Therefore, as long as the node performs illegal behaviors, strict punishment is carried out, and the more the number of illegal behaviors is, the heavier the punishment is, and the mechanism can effectively restrain the illegal behaviors such as vehicle fee evasion in the ETC system.
B. Impact of data protection methods on system performance
Because a data protection method is introduced into the system, the most important evaluation criterion is the influence of the data protection method on the performance of the blockchain, and the data protection method comprises two modules, namely a symmetric key distribution module and an RSU transaction data encryption module. For the symmetric key distribution module, the impact on blockchain performance is not large because each node is only done once. And for the RSU transaction data encryption module, the transaction data is encrypted at each transaction of the RSU, so the usage times are more frequent.
The RSA algorithm is used to distribute symmetric keys, the light nodes are used to perform simulation experiments, the average data encryption time under different message lengths is tested, from 64B to 1MB, each message length is tested 500 times, and the result is shown in fig. 7, where the value of the X axis is the logarithm of the message length.
Obviously, the running time of the asymmetric encryption algorithm increases with the increase of the message length, and when the message length is 64B, the running time of the RSA algorithm is 1.95ms. When the message length is 1MB, the running time of the RSA algorithm is 16.05s. For each node, the manager only distributes the symmetric key once, and because the length of the symmetric key is limited and the key distribution is actually performed by the full nodes with better performance, the asymmetric encryption algorithm is adopted to distribute the symmetric key, so that the influence on the efficiency of the system is small.
Compared with an asymmetric encryption algorithm, the symmetric encryption algorithm has higher efficiency, the AES algorithm is adopted to encrypt transaction data, the average data encryption time under different message lengths is tested, each message length is tested 500 times from 1KB to 1MB, and the result is shown in FIG. 8, wherein the value of the X axis is the logarithm value of the message length.
The running time of the symmetric encryption algorithm increases with the increase of the message length, and when the message length is 1KB, the running time of the AES algorithm is 0.49ms. When the message length is 1MB, the running time of the AES algorithm is 0.43s. This shows that the transaction data encryption by adopting the symmetric encryption algorithm is much faster than that by adopting the asymmetric encryption algorithm, under the condition that the message length is 1MB, the RSA algorithm needs 16.05s to complete the encryption, while the AES only needs 0.43s, and the influence of the AES algorithm on the whole transaction process is very small, so that the influence of introducing the data protection method on the transaction performance of the system is not large.
C. Impact of evidence chain framework on Block chain load
In the evidence frame, a very important part is to verify an evidence file stored in a mastered storage center, the evidence file can be a text file or a picture file or other types of files, and in any case, the evidence file can be verified by adopting a hash algorithm, if the evidence file is a picture, the picture can be converted into base64 code, and then the hash algorithm is used for the coded data.
The SHA-256 algorithm is used for verifying the validity of the evidence file, the evidence file comprises texts and pictures, a simulation experiment is carried out by adopting full nodes, the average running time of the SHA-256 algorithm under different data sizes is tested, from 64B to 2MB, each data size is tested 500 times, and the result is shown in FIG. 9, wherein the value of the X axis is the logarithmic value of the data length.
For text files, the runtime of the SHA256 algorithm is 0.0012s when the data size is 1 KB. For picture files, the runtime of the SHA256 algorithm is 0.387s when the data size is 256 KB. While 256KB pictures are already clear and can be used as evidence files. Therefore, the SHA256 algorithm is adopted to verify the validity of the evidence file, and the influence on the system performance is small.
A large number of experiments and evaluation results show that the system has good performance, the vehicle behavior management method based on the credit value aggravates the consequences of illegal behaviors, is beneficial to reducing the occurrence frequency of illegal behaviors in ETC, and can manage nodes in the system so as to process the behaviors of the vehicle in time. The data protection method can protect the transaction data under the condition of not influencing the system performance, thereby increasing the safety of the node privacy data. The evidence chain framework can construct an evidence chain for the behavior of each vehicle, reduce the pressure of server storage, and improve the evidence obtaining efficiency of the vehicle behavior.
The invention is not limited to the foregoing embodiments. The invention extends to any novel feature or any novel combination of features disclosed in this specification and any novel method or process steps or any novel combination of features disclosed.

Claims (8)

1. A credit ETC system based on an evidence chain frame is characterized by comprising a road station unit RSU, a vehicle-mounted unit OBU, a Server and at least one Manager, wherein the road station unit RSU, the vehicle-mounted unit OBU, the Server and the Manager form a block chain network; the system also comprises a managed Storage Center Trusted Storage Center for constructing an evidence chain framework;
the road station unit RSU is used for storing data of a block head in a block chain, verifying the transaction, and encrypting transaction information by using a symmetric key distributed by a manager and an AES (advanced encryption standard) algorithm;
the OBU is used for storing block head data in the block chain, carrying out transaction in the system and inquiring transaction information of the OBU;
the Server is used for storing complete block chain data, participating in verification of the evidence file and verifying the evidence file by using an SHA-256 algorithm;
the Manager is used for managing nodes in the block chain system, distributing the symmetric key to the server and the RSU by using an RSA algorithm, and managing the nodes in the system through a legal node list;
the managed Storage Center is used for storing an evidence file generated by transaction in the block chain system, verifying the evidence file and checking the evidence file with evidence information stored in the local Server to construct an evidence chain frame;
the road station unit RSU and the vehicle-mounted unit OBU are light nodes of a block chain network and store block head information of the block chain; the Server and Manager are all nodes of the block chain network, and the Server stores complete data of the block chain; the managed Storage Center belongs to an external role of the block chain network and is an entity outside the block chain network;
the evidence chain frame comprises a block chain module and a storage module; the block chain module is a block chain network and is used for receiving the transaction data of the nodes and obtaining evidence of the transaction records; the Storage module comprises a managed Storage Center used for storing the evidence file and a Server used for storing the evidence information; and verifying the validity of the evidence files in the evidence chain framework by using a hash algorithm during uploading and downloading.
2. An evidence chain framework based reputation ETC system according to claim 1, wherein both the RSU and OBU are authorized by manager to join the system; the RSU and the server acquire a legal node list issued by the manager from the blockchain network.
3. The evidence chain framework-based reputation ETC system according to claim 1, wherein the method for evidence file validity verification comprises:
s1: node pointiInitiate a firstjSub-transactionT i j
S2: RSU authentication nodeiWhether the node is in a legal node list issued by manager or not, if the node is in the legal node list, the manager sends the legal node list to the manageriAbsent from the list, the RSU stops the transaction;
s3: RSU handleT i j Produced byE i j Sending the data to a server;E i j representing nodesiFirst, thejAn evidentiary file of a secondary transaction;
s4: server pairE i j To findHash i j Then will beHash i j Is stored toFs i Performing the following steps;Fs i representing deposits in ServerHash i The folder of (1);
s5: server will sendE i j Uploaded to a regulated storage centerFt i Ft i Indicating storage in the Trusted storage centerE i The folder of (1);
s6: check personnel to nodeiThe evidence document is checked;
s7: server will be selected fromFt i To download the required evidence filesE i
S8: server will use hash algorithm pairE i Verifying the evidence file in (1), and comparing the solved hash value withFs i In (1) correspond toHash i For comparison, ifhash(E i ) = Hash i If the evidence file is not tampered, the evidence file is not tamperedhash(E i ) ≠ Hash i If the evidence file is tampered, the evidence file is downloaded from the next trusted storage center and verified.
4. A data protection method for an evidence chain framework based reputation ETC system according to one of claims 1 to 3, characterized by comprising the steps of:
the method comprises the following steps: manager generates symmetric keys for distributionSK s
Step two: manager pairSK s Time stamp corresponding to cipher textTS 1 Judging the symmetric keySK s Whether the distribution is successful or notnonce 1 Using the private key of ManagerSK M Signed and then using the public key of the RSUPK R Encrypt and generate ciphertextM 1 Sending the data to the RSU;
step three: RSU uses private key of RSUSK R For is toM 1 Decrypting to obtain symmetric keySK s And are andnonce 1
step four: RSU pairTS 2nonce 1 Use ofSK R Signing is performed and then a symmetric key is usedSK s Perform encryption generationM 2 Sending the data to manager;
step five: manager uses symmetric keysSK s To pairM 2 Performing decryption, if obtainednonce 2 Andnonce 1 the same shall be saidSK s Successfully distributing;
step six: manager pair symmetric keySK s Time stamp corresponding to cipher textTS 3 Judging the symmetric keySK s Whether or not the distribution is successfulnonce 3 Using the private key of ManagerSK M Signing and then using the public key of ServerPK S Encrypt and generate ciphertextM 3 Sending the data to a Server;
step seven: server uses private key of ServerSK S For is toM 3 Decrypting to obtain symmetric keySK s And are andnonce 3
step eight: server pairTS 4nonce 3 Using the private key of the ServerSK S Signing is performed and then a symmetric key is usedSK s Perform encryption generationM 4 Sending the data to manager;
step nine: manager uses symmetric keysSK s To pairM 4 Performing decryption, if obtainednonce 4 And withnonce 3 The same shall explainSK s And (6) successfully distributing.
5. A reputation value-based vehicle behavior management method for the evidence chain framework-based reputation ETC system according to one of claims 1 to 3, comprising: and setting a credit value for each vehicle, operating the credit value according to the legality of the vehicle behavior, and managing the authority of the node according to the credit value of the node.
6. The reputation value-based vehicle behavior management method according to claim 5, wherein the method of operating on the reputation value according to the legitimacy of the vehicle behavior comprises:
setting a nodeiA reputation value ofCv i Cv i = 60 + Cv i l + Cv i i Wherein, in the step (A),Cv i l representing nodesiThe reputation score of the legitimate behavior of (a),Cv i i representing nodesiCredit score of illegal action of (1);Cv i l = λ(i)n i l in whichn i l Representing nodesiThe number of consecutive legal actions of (a) ((b))i) To representCv i l (ii) an increasing weight of;
Cv i i = λ 3 n i i whereinn i i Representing nodesiOf illegal actions, λ 3 To representCv i i (ii) an increasing weight of;
when nodeiWhen the legal action is carried out, the user can select the legal action,n i l adding 1; when nodeiWhen the illegal action is carried out, the user can select the illegal action,n i i adding 1 to the mixture, adding the mixture into the mixture,n i l will be reduced to 0, at the same time nodeiWill be subjected toCv i i Corresponding to the row restriction penalty of days.
7. A reputation value-based vehicle behavior management method according to claim 6, wherein λ (for nodes of different reputation values, λ: (c)) (i) Different, λ: (i) = λ 1 ,if 60 <= Cv i < 100;λ(i) = λ 2 ,if Cv i <60 ,λ 1 And λ 2 Different.
8. The reputation-value-based vehicle behavior management method according to claim 5, wherein a specific method of managing the rights of a node according to the reputation value of the node is: the manager issues a legal node list, public keys of the legal nodes are stored in the list, and the server and the RSU judge whether the nodes for transaction are legal according to the legal node list to allow or prevent the nodes from participating in the transaction; when nodeiWhen the illegal action is carried out, the user can select the illegal action,Cv i is deducted a certain reputation score,Cv i less than 60, and nodeiSubject to a penalty of being restricted for a period of time,manager nodeiRemoved from the list of legitimate devices until the nodeiThe manager then sends the node againiAnd adding to the list of legitimate nodes.
CN202110277565.4A 2021-03-15 2021-03-15 Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value Active CN112861163B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110277565.4A CN112861163B (en) 2021-03-15 2021-03-15 Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110277565.4A CN112861163B (en) 2021-03-15 2021-03-15 Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value

Publications (2)

Publication Number Publication Date
CN112861163A CN112861163A (en) 2021-05-28
CN112861163B true CN112861163B (en) 2022-12-30

Family

ID=75994548

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110277565.4A Active CN112861163B (en) 2021-03-15 2021-03-15 Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value

Country Status (1)

Country Link
CN (1) CN112861163B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113610642A (en) * 2021-08-05 2021-11-05 北京百度网讯科技有限公司 Data processing method and device based on block chain and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111079196A (en) * 2019-11-29 2020-04-28 山东爱城市网信息技术有限公司 Block chain-based radio frequency vehicle illegal recording management method, device and medium
CN111405011A (en) * 2020-03-07 2020-07-10 北京工业大学 Block chain based trusted node joining method in VANET
CN111435349A (en) * 2019-01-15 2020-07-21 费希尔-罗斯蒙特系统公司 Automated architecture network security based on blockchains
CN111444257A (en) * 2020-02-11 2020-07-24 江苏荣泽信息科技股份有限公司 Block chain-based electronic evidence storage method and system
CN111915752A (en) * 2020-06-16 2020-11-10 山东浪潮质量链科技有限公司 High-speed ETC charging method, device and medium based on block chain
CN111932699A (en) * 2020-08-12 2020-11-13 中国银行股份有限公司 ETC charging method, system, device and storage medium based on block chain
CN111967952A (en) * 2020-10-21 2020-11-20 南京云链智运科技有限公司 Intelligent truck logistics transaction system based on intelligent Internet of vehicles and block chain
CN112019481A (en) * 2019-05-30 2020-12-01 上海交通大学 Block chain equipment management and data transmission system based on directed acyclic graph architecture
CN112116726A (en) * 2020-08-23 2020-12-22 江苏通行宝智慧交通科技股份有限公司 ETC transaction security method and device based on block chain technology

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10699493B2 (en) * 2017-12-09 2020-06-30 Hausman Properties, Llc System and method for toll transactions utilizing a distributed ledger
US10932156B2 (en) * 2017-12-29 2021-02-23 Veniam, Inc. Methods and system for distributed transactions in a network of moving things
CN109118219B (en) * 2018-08-01 2021-09-14 中国联合网络通信集团有限公司 Transaction data processing method and device
CN110428351B (en) * 2019-07-29 2022-04-08 电子科技大学 Semi-distributed vehicle violation reporting method based on block chain
CN110427432A (en) * 2019-08-08 2019-11-08 英华达(上海)科技有限公司 Violation event processing method, system, equipment and storage medium based on block chain
CN111080445B (en) * 2019-10-28 2022-06-17 北京大学 Credible certificate storing method and system based on graph structure
CN111464980B (en) * 2020-04-08 2023-04-07 南通大学 Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment
CN111756546A (en) * 2020-06-15 2020-10-09 杭州电子科技大学 Block chain consensus method based on dynamic credit mechanism in Internet of vehicles environment
CN111988381B (en) * 2020-08-07 2023-11-21 南通大学 HashGraph-based Internet of vehicles distributed trust system and trust value calculation method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111435349A (en) * 2019-01-15 2020-07-21 费希尔-罗斯蒙特系统公司 Automated architecture network security based on blockchains
CN112019481A (en) * 2019-05-30 2020-12-01 上海交通大学 Block chain equipment management and data transmission system based on directed acyclic graph architecture
CN111079196A (en) * 2019-11-29 2020-04-28 山东爱城市网信息技术有限公司 Block chain-based radio frequency vehicle illegal recording management method, device and medium
CN111444257A (en) * 2020-02-11 2020-07-24 江苏荣泽信息科技股份有限公司 Block chain-based electronic evidence storage method and system
CN111405011A (en) * 2020-03-07 2020-07-10 北京工业大学 Block chain based trusted node joining method in VANET
CN111915752A (en) * 2020-06-16 2020-11-10 山东浪潮质量链科技有限公司 High-speed ETC charging method, device and medium based on block chain
CN111932699A (en) * 2020-08-12 2020-11-13 中国银行股份有限公司 ETC charging method, system, device and storage medium based on block chain
CN112116726A (en) * 2020-08-23 2020-12-22 江苏通行宝智慧交通科技股份有限公司 ETC transaction security method and device based on block chain technology
CN111967952A (en) * 2020-10-21 2020-11-20 南京云链智运科技有限公司 Intelligent truck logistics transaction system based on intelligent Internet of vehicles and block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ETC-Oriented Efficient and Secure Blockchain: Credit-Based Mechanism and Evidence Framework for Vehicle Management;Jishu Wang等;《IEEE Transactions on Vehicular Technology》;20210929;第70卷(第11期);第11324-11337页 *
基于区块链技术的高速公路收费凭证信息认证方法研究;刘小明 等;《智能科学与技术学报》;20200615;第02卷(第02期);第153-160页 *
基于区块链的ETC管理系统设计与实现;杨洪路 等;《中国交通信息化》;20200215(第02期);第18-24页 *

Also Published As

Publication number Publication date
CN112861163A (en) 2021-05-28

Similar Documents

Publication Publication Date Title
EP3451579B1 (en) Multiple-phase rewritable blockchain
Baza et al. Blockchain-based firmware update scheme tailored for autonomous vehicles
US11223487B2 (en) Method and system for secure blockchain-based vehicular digital forensics
CN110008720B (en) Dynamic data tracing method and device for Internet of things based on alliance chain
CN112073484B (en) GDPR compliance supervision method and system based on alliance chain
Oham et al. A blockchain based liability attribution framework for autonomous vehicles
CN109417479A (en) The rewritable block chain of cryptologic
CN111756546A (en) Block chain consensus method based on dynamic credit mechanism in Internet of vehicles environment
Lee et al. Modifiable public blockchains using truncated hashing and sidechains
CN109922039A (en) A kind of identity management method of half centralization based on block chain technology
Li et al. Eunomia: Anonymous and secure vehicular digital forensics based on blockchain
CN110912705B (en) Distributed electronic voting method and system based on block chain
CN114139203B (en) Block chain-based heterogeneous identity alliance risk assessment system and method and terminal
CN111859446A (en) Agricultural product traceability information sharing-privacy protection method and system
CN116405187A (en) Distributed node intrusion situation sensing method based on block chain
CN112861163B (en) Reputation ETC system based on evidence chain framework, data protection method and vehicle behavior management method based on reputation value
CN117155644A (en) Medical data hierarchical access control and sharing method with link-up and link-down cooperation
Zhang et al. Secure and reliable parking protocol based on blockchain for VANETs
Wang et al. ETC-oriented efficient and secure blockchain: Credit-based mechanism and evidence framework for vehicle management
Wang et al. Housing rental scheme based on redactable blockchain
Chen et al. Design and formal analysis of a group signature based electronic toll pricing system
Abdo et al. Secure ramp merging using blockchain
CN110391912B (en) Distributed evaluation decision method and system based on secret sharing mechanism
Mrabet et al. Dependable Decentralized Reputation Management System for Vehicular Ad Hoc Networks
Chen et al. CDEdit: A Highly Applicable Redactable Blockchain with Controllable Editing Privilege and Diversified Editing Types

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant