CN115051983B - Internet of vehicles trust management system and method based on blockchain - Google Patents

Internet of vehicles trust management system and method based on blockchain Download PDF

Info

Publication number
CN115051983B
CN115051983B CN202111635186.4A CN202111635186A CN115051983B CN 115051983 B CN115051983 B CN 115051983B CN 202111635186 A CN202111635186 A CN 202111635186A CN 115051983 B CN115051983 B CN 115051983B
Authority
CN
China
Prior art keywords
vehicle
vehicles
message
trust
trust value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111635186.4A
Other languages
Chinese (zh)
Other versions
CN115051983A (en
Inventor
汪淑娟
忽英南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kunming University of Science and Technology
Original Assignee
Kunming University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kunming University of Science and Technology filed Critical Kunming University of Science and Technology
Priority to CN202111635186.4A priority Critical patent/CN115051983B/en
Publication of CN115051983A publication Critical patent/CN115051983A/en
Application granted granted Critical
Publication of CN115051983B publication Critical patent/CN115051983B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/66Trust-dependent, e.g. using trust scores or trust relationships
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention relates to a block chain-based internet of vehicles trust management system and method, and belongs to the field of vehicle-mounted communication. The invention comprises a node authentication part for initializing all node information in the communication field, a data collection layer for collecting road information, a data processing layer for processing data and a blockchain network layer for storing the data. When traffic information appears, the mobile node in the range collects the traffic information to form a data content packet and uploads the data content packet to the RSU; then, adopting different algorithms to calculate the credibility of the uploaded message content according to the event type and the number of vehicles; and finally, calculating the trust value of the vehicle by utilizing the trust value and adopting a deep learning algorithm, and detecting the malicious vehicle according to the trust value. According to the invention, the blockchain is added in the traditional Internet of vehicles, so that the data processing speed in the Internet of vehicles is improved, the uploaded data is effectively prevented from being tampered, and the problems of safety, privacy and trust management of the Internet of vehicles are effectively solved.

Description

Internet of vehicles trust management system and method based on blockchain
Technical Field
The invention relates to a block chain-based internet of vehicles trust management system and method, and belongs to the field of vehicle-mounted communication.
Background
With the continuous development of the economy in China, the life quality of people is continuously improved, and the vehicle travel becomes the preferred transportation travel mode of people. However, a series of road traffic safety problems are brought while the travel of the vehicle brings convenience to people. According to the latest data of the department of transportation, 17 tens of thousands of automobile traffic accidents occur in China in 2020, so that more than 4 tens of thousands of people die and more than 16 tens of thousands of people are injured, and about 10 hundred million RMB is directly lost. The main cause of traffic accidents is that vehicles cannot predict the road conditions in front, the speed, the position and the like of surrounding vehicles are not known, and the vehicle owners cannot timely respond to the rapid change of road traffic. The vehicle-mounted ad hoc network is expected to effectively reduce the road traffic accident rate as an important application scene of the next generation 5G communication network, relieve traffic jams and improve traffic efficiency. However, due to the high mobility of the vehicle-mounted ad hoc network, various problems are caused in practical application due to the characteristics of limited resources, data disclosure and the like. Among other things, trust issues have attracted attention, especially when there are malicious vehicles in the on-board ad hoc network. A malicious vehicle may not only monitor all messages in the network to track other vehicles, but may also forge some important road messages to fool other vehicles. In some extreme cases, these forged road messages may lead to serious traffic accidents. The trust management mechanism based on the block chain can effectively solve the problem of trust in the vehicle-mounted ad hoc network. The well-designed trust management model can reward honest vehicles or punish malicious vehicles through reputation evaluation, so that the reliability of messages in the vehicle-mounted ad hoc network is ensured. However, in the method for judging that the vehicle is a benign vehicle in the field of vehicle network trust management by the prior art center, the trust value of the vehicle is calculated by mostly adopting a fuzzy logic algorithm, a game theory and the like, a large number of vehicles are required to upload different types of information for calculating the accurate trust value, and the information is required to be collected to calculate the trust value of the vehicle every time the vehicle reaches a new RSU coverage area, so that the time for detecting the malicious vehicle is greatly increased.
Disclosure of Invention
The invention aims to provide a block chain-based internet-of-vehicles trust management system and method. The authenticity of information uploaded by the vehicles is guaranteed by using the disclosure, transparency, non-tamper property and traceability of the blockchain, and malicious vehicles existing in the area of the vehicle-mounted network are detected, so that strange vehicles can trust each other, and trust management of the vehicle networking is realized.
The technical scheme of the invention is as follows: a trust management system of the Internet of vehicles based on a blockchain comprises a node authentication part for initializing all node information in the communication field range, a data collection layer for collecting road information, a data processing layer for processing data and a blockchain network layer for storing the data;
the node authentication section includes:
the related department is used for issuing new certificates, public keys and private keys to nodes in the communication field range, wherein the nodes refer to all mobile nodes and RSUs in the communication field range;
the data collection layer comprises:
a mobile node for all vehicles within the communication field;
data content, all urgent messages and non-urgent messages in the communication field range;
the data processing layer comprises:
the RSU is in the communication field range and is used for processing the data content uploaded by the vehicle;
the data storage layer includes:
and the public blockchain is used for storing the data content and the content credibility obtained after the RSU processing by adopting a POS consensus algorithm.
And the alliance block chain adopts a PBFT consensus algorithm to store the vehicle trust value obtained after the RSU processing.
Further, the mobile node has a certain computing power and storage power.
Further, RSUs are stationary nodes fixed on both sides of the road, and the coverage area of one RSU is ten kilometers.
Further, the public blockchain is public and transparent, and all nodes can upload information and access the content in the public blockchain; the federated blockchain is translucent and only designated nodes can upload information and access content therein.
The method for carrying out the internet of vehicles trust management by adopting the system comprises the following steps: in the communication range of an RSU, when available traffic information is generated, the mobile node in the range collects the traffic information to form a data content packet and uploads the data content packet to the RSU; then, adopting different algorithms to calculate the credibility of the uploaded message content according to the event type and the number of vehicles; and finally, calculating the trust value of the vehicle by utilizing the trust value and adopting a deep learning algorithm, and detecting the malicious vehicle according to the trust value, thereby realizing trust management.
The method comprises the following specific steps:
when Step1 traffic information appears, the mobile node collects and uploads the traffic information to the RSU in the range of the corresponding communication field;
step2 RSU calculates the credibility of the uploaded message content according to the event type and the number of vehicles, and stores the message content and the credibility in a public blockchain;
step3, comparing the calculated credibility of the message content with a credibility threshold, and when the credibility is less than the credibility threshold, the message is not credible, ignoring the message, subtracting the trust value of the corresponding vehicle and storing the trust value in a alliance block chain; when the credibility is more than or equal to the credibility threshold, entering the next step;
step4, calculating the trust value of the vehicle for transmitting the message according to the credibility, storing the trust value in the alliance blockchain, deleting the certificate issued for the vehicle by the related department and punishing the vehicle when the trust value of the vehicle is less than the lowest trust value threshold of the vehicle, and issuing rewards when the trust value of the vehicle is more than or equal to the lowest trust value threshold of the vehicle.
When the event type uploaded by the vehicle is an emergency message, the message uploaded by the vehicle with the highest trust value and greater than the threshold value of the lowest trust value of the vehicle is assumed to be trusted, the unified message credibility is given to the message, otherwise, the message is false and the trust value of the vehicle is reduced, meanwhile, the vehicle in the area competes for obtaining the right of uploading the block, the vehicle with the higher trust value obtains the right of uploading the block successfully and rewards a certain trust value, a data block related to the content of the message, the signature of the vehicle and the credibility of the message is generated, the data block is uploaded to a public block chain through a POS consensus algorithm, the public block chain is stored on the vehicle, and the updated trust value of the vehicle is stored in a alliance block chain.
When the event type uploaded by the vehicle is a non-emergency event, determining the message credibility according to the number of vehicles;
when the content similarity of the messages uploaded by vehicles exceeds 100 vehicles and uploads the messages to the RSU, judging whether the content similarity of the messages uploaded by the vehicles reaches 80%, if so, considering that the messages uploaded by the vehicles are the same message, and when the number of the messages with the content similarity reaching 80% reaches a message number threshold, considering that the messages are true, otherwise, considering that the messages are false and reducing the trust value of the vehicles;
when fewer than 100 vehicles upload the message to the RSU, judging the credibility of the message by using a convolutional neural network algorithm, thereby designing a credibility level, if the credibility is more than or equal to a credibility threshold value, the message is true, otherwise, the message is false and the vehicle trust value is reduced;
and after the RSU processes, returning the result that the information is true or false to the vehicle, wherein the vehicles in the area compete for obtaining the right of uploading the block, the vehicle with higher trust value successfully obtains the right of uploading the block and rewards a certain trust value, a data block related to the content of the message, the signature of the vehicle and the credibility of the message is generated, and the data block is uploaded to a public block chain through a POS consensus algorithm, and the public block chain is stored on the vehicle.
Further, the vehicle trust value is calculated by adopting a convolutional neural network algorithm,
input layer: the reliability of the information, the original trust value before the vehicle sends the information, the position and speed of the vehicle sending the information, the information uploading time, the vehicle type, the position and time of the uploaded information content and the event type contained in the information.
Output layer: the updated trust level of the vehicle;
obtaining a data training set by using SUMO, so that a trust value of a vehicle at the moment can be calculated according to a message only by uploading the message by one vehicle, when the trust value of the vehicle is lower than a minimum trust value threshold value of the vehicle, the vehicle is a malicious vehicle, the vehicle is punished according to the true identity of the malicious vehicle found by certificates issued by related departments, and all rights of the malicious vehicle in the Internet of vehicles are revoked; for benign vehicles, their trust values are stored in the coalition blockchain, which is processed by the RSU as a coalition member in the coalition chain, so that only the RSU and the vehicle itself know its trust values, the coalition blockchain is deposited on the RSU.
The beneficial effects are that: compared with the traditional vehicle network trust management, the method breaks through the traditional scheme that only the situations of more vehicles and more uploading information are considered, and the accuracy of the uploading information of the vehicles can be accurately judged under the situation that the number of vehicles on the road is less, so that the malicious vehicles in the area are detected. The trust value is calculated by adopting the deep learning algorithm, a data set of the trust value calculated by the vehicle is trained in the coverage area of one RSU in the early stage, and then the trust value updated by the vehicle can be quickly obtained according to the data set when the vehicle arrives in the coverage area of one new RSU, so that the time for detecting the malicious vehicle in the whole trust management system is greatly shortened. Finally, the blockchain technology adopted by the invention is a two-layer blockchain combining a public chain and a alliance chain, which well ensures the privacy safety problem of vehicles, effectively prevents malicious vehicles from inquiring the trust value of benign vehicles and simultaneously ensures that all vehicles can access road condition information without limitation; compared with the POW consensus algorithm, the POS consensus algorithm saves the calculation power, shortens the time and well solves the problem of single-point faults.
Drawings
FIG. 1 is a schematic diagram of the structure of the present invention;
FIG. 2 is a schematic diagram of the principles of the present invention;
fig. 3 is a schematic diagram of a communication scheme of the present invention.
Fig. 4 is an overall block diagram of the present invention.
Fig. 5 is a block diagram of a system for calculating information trustworthiness in an emergency event in accordance with the present invention.
Fig. 6 is a block diagram of a system for calculating information trustworthiness in the event of a non-emergency event in accordance with the present invention.
FIG. 7 is a block diagram of a system for calculating a vehicle trust value according to the present invention.
FIG. 8 is a schematic diagram of the PBFT consensus algorithm of the present invention.
Detailed Description
The invention will be further described with reference to the drawings and detailed description.
1-2, the system comprises a node authentication part for initializing all node information in the communication field range, a data collection layer for collecting road information, a data processing layer for processing data and a blockchain network layer for storing the data;
the node authentication section includes:
the relevant departments are real and credible entities and are used for issuing new certificates and public keys and private keys to nodes in the communication field range, and the certificates and key pairs issued for the vehicles are stored in the OBU because the vehicles are provided with the OBU (on-board unit) and have good tamper resistance and confidentiality, and the nodes refer to all mobile nodes and RSUs and infrastructures in the communication field range.
The data collection layer comprises:
and the mobile node has certain calculation power and storage power on all vehicles within the communication field range, and an owner collects traffic information and stores the traffic information in an OBU of the vehicle, and then the OBU uploads the traffic information to a nearby RSU for processing.
Data content, all urgent messages and non-urgent messages in the communication domain.
The data processing layer comprises:
RSU, RSU in communication field scope for processing the data content that the vehicle uploaded, RSU is the stationary node in road both sides, and the coverage of an RSU is ten kilometers, and each RSU handles the traffic information that its vehicle in coverage uploaded.
The data storage layer includes:
the public block chain is stored on the OBU of the vehicle, and is used for storing data content and content credibility obtained after RSU processing by adopting a POS consensus algorithm, and is public and transparent, and all nodes can upload information and access the content in the public block chain.
And the alliance block chain is stored on the RSU, and is used for storing the vehicle trust value obtained after the RSU is processed by adopting a PBFT consensus algorithm, is semitransparent, and can upload information and access the content only by a designated node.
And when the traffic accident happens, the mobile nodes in the area range collect the information to form a data packet, then upload the data packet to the RSU for processing, generate a block according to the processing result and upload the block to the block chain through a consensus algorithm.
As shown in fig. 3, the manner in which mobile nodes within communication range collect data is V2V communication and V2I communication. When a vehicle wants to upload some traffic messages, he can get the information he wants from other vehicles through V2V communication, and can also package it into data packets through the true looks of what is witnessed in his own view. And finally, uploading the data packet to the RSU of the data processing part by adopting a V2I communication mode.
As shown in fig. 4, in the communication range of an RSU, when useful traffic information is present, the mobile node vehicles in the range collect the information to form a data packet and upload the data packet to the RSU; different algorithms are then employed to calculate the trustworthiness of the uploaded message content based on the event type and number of vehicles. Finally, the trust value of the vehicle is calculated by utilizing the trust value and adopting a deep learning algorithm. Malicious vehicles are detected according to the trust value, so that trust management is achieved.
The method comprises the following specific steps:
when Step1 traffic information appears, the mobile node collects and uploads the traffic information to the RSU in the range of the corresponding communication field;
step2 RSU calculates the credibility of the uploaded message content according to the event type and the number of vehicles, and stores the message content and the credibility in a public blockchain;
step3, comparing the calculated credibility of the message content with a credibility threshold, and when the credibility is less than the credibility threshold, the message is not credible, ignoring the message, subtracting the trust value of the corresponding vehicle and storing the trust value in a alliance block chain; when the credibility is more than or equal to the credibility threshold, entering the next step;
step4, calculating the trust value of the vehicle for transmitting the message according to the credibility, storing the trust value in the alliance blockchain, deleting the certificate issued for the vehicle by the related department and punishing the vehicle when the trust value of the vehicle is less than the lowest trust value threshold of the vehicle, and issuing rewards when the trust value of the vehicle is more than or equal to the lowest trust value threshold of the vehicle.
As shown in fig. 5, when an urgent message (such as traffic jam, traffic accident, etc.) is uploaded by a vehicle, we assume that the message uploaded by the vehicle with the highest trust value and greater than the threshold is authentic, in which case a unified message credibility is given to such message, otherwise the message is false and the vehicle trust value is lowered (fig. 6). Meanwhile, vehicles in the area compete to obtain the right of uploading the block, vehicles with higher trust values successfully obtain the right of uploading the block and rewards a certain trust value, data blocks related to message content, vehicle signatures and message credibility are generated, the data blocks are uploaded to a public blockchain through a POS consensus algorithm, the public blockchain is stored on the vehicles, and updated vehicle trust values (shown in figure 6) are stored in the alliance blockchain.
As shown in fig. 6, when more than 100 vehicles upload messages to the RSU, it is first determined whether the content similarity of the messages uploaded by the vehicles reaches 80%, if yes, we consider that the messages uploaded by the vehicles are the same message, and the number of the messages with the content similarity reaching 80% reaches the message quantity threshold (set to 40 in this embodiment), we consider the messages as true (and divide the message trust into high, medium and low according to the message number), otherwise the messages are false and the vehicle trust value is reduced (fig. 6).
When fewer than 100 vehicles upload messages to the RSU, the reliability level (high, medium and low) of the messages is judged by utilizing a convolutional neural network algorithm (according to the accident occurrence position and time contained in the uploaded messages, the position, time and vehicle speed when the vehicles upload the messages), and accordingly the reliability level (high, medium and low) is designed. If the confidence value is greater than a certain threshold, the message is true, otherwise the message is false and the vehicle confidence value is reduced (FIG. 6).
And after the RSU processes, returning the result that the information is true or false to the vehicle. Vehicles in the area compete to obtain the right of uploading the block, vehicles with higher trust values successfully obtain the right of uploading the block and rewards a certain trust value, data blocks related to message content, vehicle signatures and message credibility are generated, the data blocks are uploaded to a public blockchain through a POS consensus algorithm, and the public blockchain is stored on the vehicles.
As shown in fig. 7, a convolutional neural network algorithm is employed to calculate a trust value for a vehicle.
Input layer: the credibility of the information, the original trust value before the vehicle sends the information, the position and speed of the vehicle, the uploading time of the information, the type of the vehicle (police car, bus, private Che), the position and time of the occurrence of the uploaded information content, and the event type (road condition, safety accident: such as car accident emergency) contained in the information.
Output layer: and (5) updating the trust level of the vehicle.
The SUMO is used to derive a training set of data from which the trust value of a vehicle can be calculated whenever it is uploading a message. When the trust value of the vehicle is lower than a certain threshold value, the vehicle is considered as a malicious vehicle, the true identity of the malicious vehicle is found according to the certificate issued by the related department to punish the vehicle, and all rights of the malicious vehicle in the internet of vehicles are revoked. For benign vehicles, we store their trust values in the coalition blockchain, which are processed by the RSU. The RSU acts as a coalition member in the coalition chain so that only the RSU and the vehicle itself are aware of its trust value. The federated blockchain is stored on the RSU.
As shown in FIG. 8, the federated blockchain employs a PBFT consensus algorithm. It can not only tolerate node faults, but also tolerate the existence of certain malicious nodes or Bayesian nodes. Because the algorithm only needs a primary node to upload the block, a secondary node to verify, and 3f+1 fault tolerance exists, the PBFT algorithm can tolerate less than 1/3 invalid or malicious nodes. In this consensus algorithm, we let the RSU nearest to the occurrence of the event act as the master node to generate a block (the block content contains the vehicle trust value, the vehicle signature) and upload the block, which is verified by other RSUs, and when 2/3 RSUs agree on the block, upload to the blockchain.
While the present invention has been described in detail with reference to the drawings, the present invention is not limited to the above embodiments, and various changes can be made without departing from the spirit of the present invention within the knowledge of those skilled in the art.

Claims (6)

1. The utility model provides a car networking trust management system based on block chain which characterized in that: the system comprises a node authentication part for initializing all node information in the communication field range, a data collection layer for collecting road information, a data processing layer for processing data and a block chain network layer for storing the data;
the node authentication section includes:
the traffic management office is used for issuing new certificates and entities of public keys and private keys to nodes in the communication field range, wherein the nodes refer to all mobile nodes and RSUs in the communication field range;
the data collection layer comprises:
a mobile node for all vehicles within the communication field;
data content, all urgent messages and non-urgent messages in the communication field range;
the data processing layer comprises:
the RSU is in the communication field range and is used for processing the data content uploaded by the vehicle;
the data storage layer includes:
the public block chain is used for storing data content and content credibility obtained after RSU processing by adopting a POS consensus algorithm;
the alliance block chain is used for storing a vehicle trust value obtained after RSU processing by adopting a PBFT consensus algorithm;
in the internet of vehicles trust management method based on the system, when traffic information appears in the communication range of an RSU, a mobile node in the range collects the traffic information to form a data content packet and uploads the data content packet to the RSU; then, adopting different algorithms to calculate the credibility of the uploaded message content according to the event type and the number of vehicles; finally, the trust value of the vehicle is calculated by utilizing the trust value and adopting a deep learning algorithm, and the malicious vehicle is detected according to the trust value, so that trust management is realized;
when the event type uploaded by the vehicle is an emergency message, the message uploaded by the vehicle with the highest trust value and greater than the threshold value of the lowest trust value of the vehicle is assumed to be trusted, the unified message credibility is given to the message, otherwise, the message is false and the trust value of the vehicle is reduced, meanwhile, the vehicle in the area competes for mining, the vehicle with the higher trust value successfully mines and rewards virtual currency, a data block related to the content of the message, the signature of the vehicle and the credibility of the message is generated, the data block is uploaded to a public blockchain through a POS consensus algorithm, the public blockchain is stored on the vehicle, and the updated trust value of the vehicle is stored in a alliance blockchain;
when the event type uploaded by the vehicle is a non-emergency event, determining the message credibility according to the number of vehicles;
when the content similarity of the messages uploaded by vehicles exceeds 100 vehicles and uploads the messages to the RSU, judging whether the content similarity of the messages uploaded by the vehicles reaches 80%, if so, considering that the messages uploaded by the vehicles are the same message, and when the number of the messages with the content similarity reaching 80% reaches a message number threshold, considering that the messages are true, otherwise, considering that the messages are false and reducing the trust value of the vehicles;
when fewer than 100 vehicles upload the message to the RSU, judging the credibility of the message by using a convolutional neural network algorithm, thereby designing a credibility level, if the credibility is more than or equal to a credibility threshold value, the message is true, otherwise, the message is false and the vehicle trust value is reduced;
and after the RSU processes, returning the result that the information is true or false to the vehicle, competing the vehicle in the area for mining, successfully mining the vehicle with higher trust value and rewarding virtual currency, generating a data block related to the content of the message, the signature of the vehicle and the credibility of the message, uploading the data block to a public blockchain through a POS consensus algorithm, and storing the public blockchain on the vehicle.
2. The blockchain-based internet of vehicles trust management system of claim 1, wherein: the mobile node has a computational power and a memory power.
3. The blockchain-based internet of vehicles trust management system of claim 1, wherein: the RSU is a stationary node fixed on two sides of a road, and the coverage area of one RSU is ten kilometers.
4. The blockchain-based internet of vehicles trust management system of claim 1, wherein: for the common blockchain, all nodes can upload information and access the content therein; for the federated blockchain, only designated nodes can upload information and access the content therein.
5. The blockchain-based internet of vehicles trust management system of claim 1, wherein: the internet of vehicles trust management method comprises the following specific steps:
when Step1 traffic information appears, the mobile node collects and uploads the traffic information to the RSU in the range of the corresponding communication field;
step2 RSU calculates the credibility of the uploaded message content according to the event type and the number of vehicles, and stores the message content and the credibility in a public blockchain;
step3, comparing the calculated credibility of the message content with a credibility threshold, and when the credibility is less than the credibility threshold, the message is not credible, ignoring the message, subtracting the trust value of the corresponding vehicle and storing the trust value in a alliance block chain; when the credibility is more than or equal to the credibility threshold, entering the next step;
step4, calculating the trust value of the vehicle for transmitting the message according to the credibility, storing the trust value in the alliance blockchain, deleting the certificate issued for the vehicle by the traffic administration and punishing the vehicle when the trust value of the vehicle is less than the lowest trust value threshold of the vehicle, and issuing rewards when the trust value of the vehicle is more than or equal to the lowest trust value threshold of the vehicle.
6. The blockchain-based internet of vehicles trust management system of claim 1, wherein: the vehicle trust value is calculated by adopting a convolutional neural network algorithm;
input layer: the reliability of the information, the original trust value before the vehicle sends the information, the position and speed of the vehicle sending the information, the information uploading time, the vehicle type, the position and time of the occurrence of the uploaded information content and the event type contained in the information;
output layer: the updated trust level of the vehicle;
obtaining a data training set by using SUMO, so that a trust value of a vehicle at the moment can be calculated according to a message only by uploading the message by one vehicle, when the trust value of the vehicle is lower than a minimum trust value threshold value of the vehicle, the vehicle is a malicious vehicle, the vehicle is punished according to the true identity of the malicious vehicle found by a certificate issued by a traffic administration, and all rights of the malicious vehicle in the Internet of vehicles are revoked; for benign vehicles, their trust values are stored in the coalition blockchain, mined by the RSU as a coalition member in the coalition chain so that only the RSU and the vehicle itself know its trust values, the coalition blockchain is deposited on the RSU.
CN202111635186.4A 2021-12-29 2021-12-29 Internet of vehicles trust management system and method based on blockchain Active CN115051983B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111635186.4A CN115051983B (en) 2021-12-29 2021-12-29 Internet of vehicles trust management system and method based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111635186.4A CN115051983B (en) 2021-12-29 2021-12-29 Internet of vehicles trust management system and method based on blockchain

Publications (2)

Publication Number Publication Date
CN115051983A CN115051983A (en) 2022-09-13
CN115051983B true CN115051983B (en) 2023-10-03

Family

ID=83156651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111635186.4A Active CN115051983B (en) 2021-12-29 2021-12-29 Internet of vehicles trust management system and method based on blockchain

Country Status (1)

Country Link
CN (1) CN115051983B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109816995A (en) * 2019-03-25 2019-05-28 江西理工大学 A kind of intelligent traffic lamp Safety actuality regulation method based on alliance's block chain technology
CN111447177A (en) * 2020-03-02 2020-07-24 西北工业大学 Vehicle networking trust management method based on block chain
CN111601258A (en) * 2020-05-15 2020-08-28 浙江树人学院(浙江树人大学) Vehicle networking node data safety communication method based on block chain
CN111756546A (en) * 2020-06-15 2020-10-09 杭州电子科技大学 Block chain consensus method based on dynamic credit mechanism in Internet of vehicles environment
CN111988381A (en) * 2020-08-07 2020-11-24 南通大学 HashGraph-based vehicle networking distributed trust system and trust value calculation method
CN112862311A (en) * 2021-02-07 2021-05-28 福建工程学院 Internet of vehicles trust management method based on double-layer block chain
CN112929845A (en) * 2021-01-26 2021-06-08 兰州理工大学 Vehicle networking node trust evaluation method and system based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109816995A (en) * 2019-03-25 2019-05-28 江西理工大学 A kind of intelligent traffic lamp Safety actuality regulation method based on alliance's block chain technology
CN111447177A (en) * 2020-03-02 2020-07-24 西北工业大学 Vehicle networking trust management method based on block chain
CN111601258A (en) * 2020-05-15 2020-08-28 浙江树人学院(浙江树人大学) Vehicle networking node data safety communication method based on block chain
CN111756546A (en) * 2020-06-15 2020-10-09 杭州电子科技大学 Block chain consensus method based on dynamic credit mechanism in Internet of vehicles environment
CN111988381A (en) * 2020-08-07 2020-11-24 南通大学 HashGraph-based vehicle networking distributed trust system and trust value calculation method
CN112929845A (en) * 2021-01-26 2021-06-08 兰州理工大学 Vehicle networking node trust evaluation method and system based on block chain
CN112862311A (en) * 2021-02-07 2021-05-28 福建工程学院 Internet of vehicles trust management method based on double-layer block chain

Also Published As

Publication number Publication date
CN115051983A (en) 2022-09-13

Similar Documents

Publication Publication Date Title
Zhang et al. Misbehavior detection based on support vector machine and Dempster-Shafer theory of evidence in VANETs
CN107508859B (en) Vehicle communication method based on block chain technology in vehicle-mounted self-organizing network
Sharma et al. Trust based location finding mechanism in VANET using DST
Karmakar et al. Assessing trust level of a driverless car using deep learning
Yu et al. LSTM-based intrusion detection system for VANETs: A time series classification approach to false message detection
Pu A novel blockchain-based trust management scheme for vehicular networks
Khot et al. Position falsification misbehavior detection in vanets
Wang et al. Blockchain and deep learning based trust management for internet of vehicles
Mangla et al. A misbehavior detection framework for cooperative intelligent transport systems
Liu et al. CT2‐MDS: Cooperative trust‐aware tolerant misbehaviour detection system for connected and automated vehicles
Huber et al. Behavioral model based trust management design for iot at scale
Chowdhury et al. Trusted autonomous vehicle: Measuring trust using on-board unit data
Jing et al. Joint trust management and sharing provisioning in iov-based urban road network
Souissi et al. Towards a Self-adaptive Trust Management Model for VANETs.
CN115051983B (en) Internet of vehicles trust management system and method based on blockchain
Al Falasi et al. Similarity-based trust management system for detecting fake safety messages in vanets
Wan et al. A trust scheme based on vehicles reports of events in VANETs
Huang On reputation and data-centric misbehavior detection mechanisms for VANET
Saudagar et al. An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet
Alzahrani et al. Robust misbehavior detection scheme for vehicular network
Magsi et al. A machine learning-based attack detection and prevention system in vehicular named data networking
Eze et al. A Context-Based Decision-Making Trust Scheme for Malicious Detection in Connected and Autonomous Vehicles
Fernandes et al. RS4VANETs-a decentralized reputation system for assessing the trustworthiness of nodes in vehicular networks
CN115174615B (en) Distributed Internet of vehicles dynamic trust management method based on origin information
Kuang et al. GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant