CN116233177A - Block chain and dynamic reputation based Internet of vehicles data secure sharing method and system - Google Patents

Block chain and dynamic reputation based Internet of vehicles data secure sharing method and system Download PDF

Info

Publication number
CN116233177A
CN116233177A CN202211709057.XA CN202211709057A CN116233177A CN 116233177 A CN116233177 A CN 116233177A CN 202211709057 A CN202211709057 A CN 202211709057A CN 116233177 A CN116233177 A CN 116233177A
Authority
CN
China
Prior art keywords
node
rsu
nodes
vehicle
reputation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211709057.XA
Other languages
Chinese (zh)
Inventor
王连海
管晨曦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qilu University of Technology
Shandong Computer Science Center National Super Computing Center in Jinan
Original Assignee
Qilu University of Technology
Shandong Computer Science Center National Super Computing Center in Jinan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qilu University of Technology, Shandong Computer Science Center National Super Computing Center in Jinan filed Critical Qilu University of Technology
Priority to CN202211709057.XA priority Critical patent/CN116233177A/en
Publication of CN116233177A publication Critical patent/CN116233177A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/10Internal combustion engine [ICE] based vehicles
    • Y02T10/40Engine management systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a safe sharing method and a safe sharing system for Internet of vehicles data based on a blockchain and dynamic reputation, which relate to the technical field of data safety and privacy protection, and are characterized in that training tasks are issued through the blockchain, and model parameters and reputation values of participating nodes are stored in a decentralization mode; verifying the legitimacy of the vehicle node and the RSU node; adding RSU to screen and aggregate model parameters uploaded by vehicle nodes by combining secret sharing and Multi-Krum algorithm; and improving a subjective logic model in the reputation evaluation process, setting weights for different data sets, eliminating uncertain interaction events occurring to vehicle nodes in the training process by adopting Bayesian theory, and performing reputation evaluation on RSU nodes and vehicle nodes according to historical interaction behaviors of the participating nodes to realize safe storage of global model parameters and reputation values of the participating nodes on a chain. Under the conditions of protecting local privacy and training model safety, the data safety sharing application in the Internet of vehicles scene is realized.

Description

Block chain and dynamic reputation based Internet of vehicles data secure sharing method and system
Technical Field
The invention relates to the technical field of data security and privacy protection, in particular to a method and a system for safely sharing internet of vehicles data based on blockchains and dynamic reputation.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
The internet of vehicles is an important infrastructure for the intelligent access to the internet by a single vehicle in the automatic driving era. The information exchange in the Internet of vehicles can be realized more safely and efficiently through a model sharing mechanism of federal learning, and each vehicle node participating in training can store training data locally without sharing and only share the trained model parameters with the RSU node. But there are still some challenges in the internet of vehicles scenario:
(1) Because the RSU is a semi-trusted or untrusted entity, part or even all of the original data of the vehicle can be deduced according to the local model parameters of the vehicle, so that the privacy information of the vehicle is exposed to the leakage risk;
(2) The vehicle nodes may initiate a poisoning attack during local training or use a low-quality data set for model training, thereby damaging the global model;
(3) In the sharing process, a trust relationship is not established in advance between the participating nodes, and potential safety hazards exist in the cooperative training process.
To address these challenges, some schemes ensure that the server can decrypt after at least k participating nodes upload parameters by combining secret sharing techniques, preventing inference attacks by malicious nodes; but such schemes lack verification of the legitimacy of the participating nodes, with the risk of an external adversary masquerading as a legitimate node.
In resisting poisoning, some works propose to verify model parameters uploaded by users using a clean data set collected in advance, so as to remove abnormal updates; but such a centralized server-based solution still presents a single point of failure risk.
In order to enable the participating nodes to trust each other and obtain high-quality model parameters, some researchers introduce subjective logic models to perform safe and efficient reputation evaluation on vehicle nodes; however, such schemes lack evaluation of RSU node reputation, and RSUs play an important role in model training process, and are responsible for verifying vehicle node data sharing size, assisting aggregation and decrypting global models, which are all related to accuracy of training models and safety and efficiency of collaborative learning, even normal operation of training process, and meanwhile, there is a situation that vehicle nodes have uncertain interaction events in training process, which will seriously affect validity and accuracy of reputation evaluation for participating nodes.
Disclosure of Invention
In order to solve the problems, the invention provides a safe sharing method and system for data of the Internet of vehicles based on blockchains and dynamic reputation, which avoid the risk of impersonation of legal nodes by external adversaries, solve the problem of single-point failure of a centralized server, improve the validity and accuracy of reputation evaluation, and realize safe sharing application of the data in the Internet of vehicles scene under the condition of protecting local privacy and training model safety.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
in a first aspect, the invention provides a method for safely sharing internet of vehicles data based on blockchain and dynamic reputation, comprising the following steps:
issuing a model training task, and selecting RSU nodes and vehicle nodes which participate in the model training task according to the reputation value;
downloading a global model from the blockchain by the selected RSU node, and issuing the global model to vehicle nodes which are in the coverage range and added with model training tasks;
the vehicle node carries out iterative training of the local model according to the global model and the local data, encrypts the generated local update parameters by adopting a secret sharing algorithm to obtain secret shares, signs the secret shares and uploads the secret shares to the RSU node;
calculating Euclidean distance between secret shares by the RSU node, signing the Euclidean distance and uploading the Euclidean distance to the block chain;
reconstructing Euclidean distance by using the block chain through Lagrange interpolation, selecting legal vehicle nodes, aggregating secret shares uploaded by the legal vehicle nodes in RSU nodes, and reconstructing an aggregation result by using the block chain through Lagrange interpolation to obtain an aggregation updated global model;
and downloading the aggregated and updated global model from the blockchain by the RSU node, and issuing the global model to the corresponding vehicle node so as to enable the vehicle node to perform the next round of model training until the model converges, and storing reputation values subjected to reputation evaluation on the RSU node and the vehicle node in a chain manner in each round of model training process.
As an optional implementation manner, the internet of vehicles data security sharing method further comprises verifying the legitimacy of the vehicle node and the RSU node; the method specifically comprises the following steps:
after receiving the secret share uploaded by the vehicle node, the RSU node verifies whether the identity and the time stamp of the vehicle node are valid or not;
after the block link receives the Euclidean distance and the secret share uploaded by the RSU node, whether the identification mark and the timestamp of the RSU node are valid or not is verified.
As an alternative embodiment, the reputation evaluation of the RSU comprises: the RSU node verifies the size of the local update parameter uploaded by the vehicle node, the RSU node verifies the update of the global model parameter, and the RSU node verifies the secret share of other RSU nodes; if the events are validated as valid and reliable, they are considered positive interaction events.
As an alternative implementation manner, the weight eta is set for the number of positive interaction events, and 0< eta is less than or equal to 1, and the weight of the number of negative interaction events is set to be 1, the reputation value of the RSU node is as follows:
Figure BDA0004026764160000041
wherein ,
Figure BDA0004026764160000042
representing the trust degree, the distrust degree and the uncertainty degree of the task publisher i on the RSU node j respectively.
As an alternative embodiment, the trust level, the untrustworthiness and the uncertainty of the task publisher i on the RSU node j are respectively:
Figure BDA0004026764160000043
wherein r and s are the number of positive interaction events and the number of negative interaction events respectively; c is a constant.
As an alternative embodiment, the reputation value of the vehicle node is:
Figure BDA0004026764160000044
wherein ,
Figure BDA0004026764160000045
for the degree of uncertainty of task publisher i on vehicle node j, s and f are the number of positive interactions and the number of negative interactions, respectively.
As an alternative implementation manner, when the reputation evaluation is carried out on the vehicle node, the probability of positive interaction events of the vehicle node is predicted by adopting Bayesian theory so as to eliminate uncertain interaction events of the vehicle node.
In a second aspect, the present invention provides a system for securely sharing data of a vehicle networking based on blockchain and dynamic reputation, comprising: task publishers, blockchains, RSU nodes, and vehicle nodes;
the task publisher is used for publishing model training tasks, and RSU nodes and vehicle nodes which participate in the model training tasks are selected according to the reputation values;
the selected RSU node downloads the global model from the blockchain and transmits the global model to vehicle nodes which are added with model training tasks in the coverage areas of the nodes;
the vehicle node carries out iterative training of the local model according to the global model and the local data, encrypts the generated local update parameters by adopting a secret sharing algorithm to obtain secret shares, signs the secret shares and uploads the secret shares to the RSU node;
the RSU node calculates Euclidean distance between secret shares, signs the Euclidean distance and then uploads the Euclidean distance to the block chain;
reconstructing Euclidean distance by the block chain through Lagrange interpolation, selecting legal vehicle nodes, aggregating secret shares uploaded by the legal vehicle nodes in RSU nodes, and reconstructing an aggregation result by the block chain through Lagrange interpolation to obtain an aggregation updated global model;
and the RSU node downloads the aggregated and updated global model from the blockchain and transmits the global model to the corresponding vehicle node so that the vehicle node performs the model training of the next round until the model converges, and reputation values of the RSU node and the vehicle node subjected to reputation evaluation are stored in a uplink manner in the process of training each round of model.
In a third aspect, the invention provides an electronic device comprising a memory and a processor and computer instructions stored on the memory and running on the processor, which when executed by the processor, perform the method of the first aspect.
In a fourth aspect, the present invention provides a computer readable storage medium storing computer instructions which, when executed by a processor, perform the method of the first aspect.
Compared with the prior art, the invention has the beneficial effects that:
compared with the prior art, the method and the device protect the model parameters of the vehicle nodes in the whole federal learning training process by using secret sharing and Multi-Krum algorithm, and effectively avoid the inference attack and collusion attack of the unreliable RSU nodes; screening model parameters before aggregation, and further effectively removing toxic update by calculating Euclidean distance between secret shares, so that communication and calculation pressure of vehicle terminals are reduced, effective defense against poisoning attack initiated by malicious vehicle nodes on the premise of not revealing privacy is ensured, and safe and efficient internet of vehicles data sharing is finally realized.
Compared with the prior art without using a blockchain, the invention uses the blockchain to replace a central server to screen and aggregate model parameters, avoids the problems of error results and single-point faults returned by an unreliable central server, verifies the identity legitimacy of a vehicle node and an RSU node when the model parameters are uploaded by the vehicle node and the RSU node, prevents an external adversary from impersonating legal users to upload false data, realizes decentralization and safe federal learning, and finally ensures safe storage on chains of global models and credit values.
Compared with the prior art using blockchains, in the training process of each time, the task publisher respectively carries out effective and accurate reputation evaluation on the RSU and the vehicle node according to the model quality, and the reputation value is safely stored in a uplink manner; in the reputation evaluation process, based on a subjective logic model, the weight is set according to the size of a data set, the reputation evaluation of the RSU node is increased, the uncertain interaction events possibly occurring to the vehicle node in the training process are eliminated by adopting the Bayesian theory, the effective and accurate reputation evaluation of the RSU node and the vehicle node is realized, and the vehicle federal learning with traceability, verifiability and privacy protection is finally realized.
Additional aspects of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention.
FIG. 1 is a model diagram of a safe sharing method of Internet of vehicles data based on blockchain and dynamic reputation, which is provided by the embodiment 1 of the invention;
fig. 2 is a flowchart of privacy protection training and poisoning attack detection provided in embodiment 1 of the present invention.
Detailed Description
The invention is further described below with reference to the drawings and examples.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the invention. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the present invention. As used herein, unless the context clearly indicates otherwise, the singular forms also are intended to include the plural forms, and furthermore, it is to be understood that the terms "comprises" and "comprising" and any variations thereof are intended to cover non-exclusive inclusions, such as, for example, processes, methods, systems, products or devices that comprise a series of steps or units, are not necessarily limited to those steps or units that are expressly listed, but may include other steps or units that are not expressly listed or inherent to such processes, methods, products or devices.
Embodiments of the invention and features of the embodiments may be combined with each other without conflict.
Example 1
The embodiment provides a safe sharing method of internet of vehicles data based on blockchain and dynamic reputation, which comprises the following steps:
issuing a model training task, and selecting RSU nodes and vehicle nodes which participate in the model training task according to the reputation value;
downloading global model parameters from the blockchain by the selected RSU node, and issuing the global model parameters to vehicle nodes which are added with model training tasks in the coverage areas of the nodes;
the vehicle node carries out iterative training of the local model according to the global model parameters and the local data, encrypts the generated local update parameters by adopting a secret sharing algorithm to obtain secret shares, signs the secret shares and uploads the secret shares to the RSU node;
calculating Euclidean distance between secret shares by the RSU node, signing the Euclidean distance and uploading the Euclidean distance to the block chain;
reconstructing Euclidean distance by using the block chain through Lagrange interpolation, selecting legal vehicle nodes, aggregating secret shares uploaded by the legal vehicle nodes in RSU nodes, and reconstructing an aggregation result by using the block chain through Lagrange interpolation to obtain an aggregation updated global model;
and downloading the aggregated and updated global model parameters from the blockchain by the RSU node, and issuing the aggregated and updated global model parameters to the corresponding vehicle nodes so that the vehicle nodes perform the next round of model training until the models converge, and storing reputation values subjected to reputation evaluation on the RSU node and the vehicle nodes in a uplink manner in each round of model training process.
In the embodiment, the method comprises the steps of completing four-way participation of a task publisher, a blockchain module, a roadside unit (RSU) module and a vehicle node module; specifically:
(1) Task publishers: establishing a machine learning model according to own requirements, issuing a federal learning training task through a blockchain, wherein vehicle nodes interested in the federal learning training task can apply to participate in the federal learning training task, and a task issuer can finally obtain an ideal machine learning model as more and more vehicle nodes are added into the federal learning training task and contribute to model training; meanwhile, the task publishers need to evaluate the quality of the local model of the participating nodes, and generate a reputation value which is used as an index for measuring the credibility of the participating nodes in the federal learning process based on the subjective logic model, so that other task publishers can select the participating nodes with better reputation in the federal learning.
(2) A blockchain module: and storing reputation evaluation results of the task publishers on the RSU and the vehicle nodes, and registering the vehicle nodes and the RSU nodes in the system and aggregating the global model. Because of the traceable and tamper-resistant nature of blockchains, when participating nodes send low quality local models, the relevant information in the data block can be used as persistent and transparent evidence. In addition, the task publishers ensure safe sharing of the reputation evaluation results through a predefined access control strategy in the blockchain, and access records of other task publishers on the reputation evaluation results are stored in the blockchain.
(3) Roadside unit RSU module: the RSU node is a wireless device fixed on two sides of a road or placed at a specific position on the roadside, is positioned near the vehicle node, has certain calculation and storage capabilities, can collect, process and forward data uploaded by the vehicle node in the coverage range, and is mainly responsible for distributing training tasks, verifying the data sharing size of the vehicle node, assisting in removing toxic gradient updating of a blockchain and aggregating a global model, so that the data communication range of the Internet of vehicles is enlarged, and the safety in the data sharing process is ensured.
In the model downloading stage, the RSU node downloads a global model from the blockchain and distributes the global model to vehicle nodes participating in training in a covered area; in the model uploading stage, the RSU node is responsible for processing the secret shares uploaded by the vehicle node and uploading the secret shares to the blockchain.
(4) Vehicle node module: the mobile user side collects, stores and preprocesses the data, and the training process participating in federal learning then uploads the secret share of the local model parameters to the adjacent RSU nodes, and then the training process of the model parameters is repeated, and a new round of iteration is performed until the precision of the global model reaches an ideal expected value; the uploading content needs to declare the local data size and append corresponding training time, thereby indicating the data contribution size of the user.
The process flow is described in detail below in conjunction with fig. 1-2.
1. The release task stage: the task publisher establishes a machine learning model according to own requirements, and uploads the initialization model to the blockchain.
2. System node registration phase: registration of all RSU nodes and vehicle nodes in the system is completed by the blockchain, and node information of successful registration is stored on the blockchain.
3. Participating node selection phase: the RSU node and the vehicle node which want to join the federal learning training task send an application to a task publisher, wherein the application content comprises signing abstracts of respective identity identifiers and data set information by using the latest timestamp, and then becoming candidate nodes for model training and aggregation; the task publisher downloads the reputation value of the candidate node for a period of time from the blockchain, and selects a node with a higher reputation value to participate in the task.
4. Model issuing stage: and the RSU nodes which successfully join in the training task download global model parameters from the blockchain, and then the RSU transmits the global model parameters of the current round to the vehicle nodes which are covered by the RSU nodes and successfully join in the training task.
5. Privacy protection training phase:
5.1, local training: the vehicle node updates the local model according to the downloaded global model, then enters into the iterative training of the model, trains the local model by using local data and generates local update;
5.2, generating a secret share: the vehicle node calls a Shmar (k, N) secret sharing algorithm to encrypt the local update parameters to obtain secret shares, and the secret shares are signed by a private key and then uploaded to the RSU node.
Secret sharing is a cryptographic technique that shares information among multiple participants in order to ensure that the information is not corrupted, tampered with, and lost. Secret sharing divides a secret into several shares by a specific operation, distributes to multiple participants, and secret recovery needs to be performed jointly by multiple participants according to a protocol, individual secret shares being of no use. The secret sharing algorithm mainly comprises China remainder theorem, shmair, blakley and the like.
In this embodiment, an shrar algorithm is adopted, where the shrar algorithm divides the secret S into N secret shares and allocates the N secret shares to N participants, and if the original secret S needs to be recovered, at least k participants must be required to perform cooperative decryption, and if fewer than k participants cooperate, the original secret S cannot be reconstructed. The algorithm is realized based on Lagrange interpolation, and comprises two stages of secret distribution and secret reconstruction.
1) The secret distribution phase algorithm is as follows:
for secret s ε Z p The distributor is from Z p Domain randomly selects t 1 coefficients a 1 ,a 2 ,…,a t-1 Constructing a polynomial:
f(x)=a 0 +a 1 x+a 2 x 2 +…+a t-1 x t-1 (mod p)
wherein s=f (0), calculating y i =f(x i ),x i ∈[1,n]Will (x) i ,y i ) Respectively sent to the participators P i ,i∈[1,n]。
2) The secret reconstruction phase algorithm is as follows:
at least t participants reconstruct the secret share into the original secret s by the lagrangian interpolation formula:
Figure BDA0004026764160000111
wherein ,
Figure BDA0004026764160000112
if the number of parties providing shares is less than t, then no information about the secret will be revealed.
6. A poisoning attack detection stage: after the RSU node receives the secret share uploaded by the vehicle node, firstly verifying whether the identity and the time stamp of the vehicle node are valid or not; after verification, considering that malicious vehicle nodes possibly upload toxic updates, the toxic updates need to be removed as much as possible during global aggregation and then the aggregation is performed.
The present embodiment uses a Multi-Krum algorithm to remove toxic updates generated by malicious users, specifically: the RSU node calculates Euclidean distance between the secret shares uploaded by the received vehicle nodes, and then the RSU node signs the Euclidean distance by using a private key of the RSU node and uploads the Euclidean distance to the blockchain.
The Multi-Krum algorithm is a Bayesian fault-tolerant machine learning algorithm based on Euclidean distance, is an algorithm for ensuring that the Bayesian fault-tolerant machine learning algorithm can still converge when the Bayesian fault exists in distributed machine learning, and can remove toxic update generated by malicious users. The algorithm is as follows:
the number of users in a region is m, and assuming z is the number of Bayesian nodes, the euclidean distance of each vehicle node's uploaded gradient to its nearest m-z-2 gradients is added as the quality score for that gradient:
Figure BDA0004026764160000121
wherein i.fwdarw.j represents a gradient
Figure BDA0004026764160000122
Belongs to ideal ladder Tang->
Figure BDA0004026764160000123
M-z-2 gradients of near the canthus.
And finally, selecting m-z gradients with the lowest quality scores as legal updates, and performing aggregation.
7. Model polymerization stage:
after the block link receives the Euclidean distance and the secret share uploaded by the RSU node, firstly verifying whether the identity and the timestamp of the RSU node are valid or not;
after verification, reconstructing Euclidean distance between the gradient of the ith user and the gradient of the jth user through Lagrange interpolation according to model parameters uploaded by the RSU node, and then selecting legal vehicle nodes according to a Multi-Krum algorithm;
the RSU node downloads legal vehicle nodes from the blockchain, sums the secret shares uploaded by the legal vehicle nodes locally and uploads the secret shares to the blockchain;
reconstructing an aggregation result by the block chain through Lagrangian interpolation;
the RSU node downloads the global model parameters after aggregation and update from the blockchain, and transmits the global model parameters to vehicle nodes in the coverage area, and the vehicle nodes use the global model parameters after aggregation and update to train the next round, and repeat the steps until the model converges or the ideal precision is achieved.
8. Reputation evaluation stage:
reputation assessment models based on subjective logic are described using concepts of evidence space and concept spaceThe sum measures the trust relationship of one party to another. Evidence space is composed of historical interaction events, which are divided into positive and negative events. The concept space is composed of a series of probability reputation evaluation opinions, and the subjective reputation opinion of one party i to another party j is composed of triples
Figure BDA0004026764160000131
Express, and satisfy->
Figure BDA0004026764160000132
Figure BDA0004026764160000133
Figure BDA0004026764160000134
wherein ,
Figure BDA0004026764160000135
respectively representing the trust degree, the distrust degree and the uncertainty degree of i to j; r and s are the number of positive interaction events and the number of negative interaction events respectively; c is a constant, and the value of c is related to the influence of the uncertain interaction event number on the reputation.
The interactive event is a process that a vehicle node downloads global model parameters and iteratively trains and uploads primary parameters according to local data; the method comprises the steps that a poisoning attack detection scheme through an RSU node is a positive interaction event, otherwise, the poisoning attack detection scheme is a negative interaction event, and when a vehicle node does not upload any parameter, the uncertain interaction event appears. Historical interactivity events are a set of total number of interactivity events with nodes that are referenced in Δt time: t= { s, f }, where s and f are the number of positive and negative interaction events, respectively.
8.1, reputation evaluation of RSU, comprising three types of events:
1) The RSU node verifies the size of the uploaded data set of the participating vehicle nodes; 2) The RSU node verifies the updating of the global model parameters; 3) The RSU verifies the secret shares of the other RSUs.
If the RSU node verifies that these events are valid and reliable, it will be considered a positive interaction event. The concept space is mainly composed of reputation opinions of task publishers on participating RSU nodes.
Considering that the contribution of different RSU nodes to model training is possibly different, the number of vehicles in the coverage area of the different RSU nodes and the size of the collected data set are different, so that the time for assisting a blockchain to remove a toxic model and aggregate a global model is also different, which means that the model training is differently contributed by the blockchain, therefore, the reputation evaluation scheme sets weight eta for the number of positive interaction events r to reflect the contribution of the RSU nodes; meanwhile, in order to reduce the occurrence of negative interaction events, the weight of s is set to be 1, and 0< eta is less than or equal to 1; the original algorithm is rewritten as:
Figure BDA0004026764160000141
the reputation value of task publisher i for RSU node j is expressed as:
Figure BDA0004026764160000142
8.2, evaluating the credit of the vehicle node;
concepts based on subjective logic models and historical interaction events can be derived:
Figure BDA0004026764160000143
Figure BDA0004026764160000144
wherein ,
Figure BDA0004026764160000145
is the probability of successful parameter transmission and represents the communication quality.
Considering that the situation that the vehicle node j may have an uncertain interaction event may affect the accuracy of reputation evaluation of the vehicle node, the present embodiment predicts the probability of occurrence of a positive interaction event for the vehicle node using a bayesian formula, namely:
Figure BDA0004026764160000151
the historical interaction event t= { s, f } of the vehicle node j is taken as a precondition E, and the behavior of the positive interaction event is taken as an event H.
Assuming that the probability of occurrence of event H under the condition of occurrence of event E is compliant with Beta distribution, the correlation coefficient of uncertain interaction behavior of vehicle node j on reputation influence
Figure BDA0004026764160000152
The mathematical expectation of the Beta distribution is expressed as: />
Figure BDA0004026764160000153
Wherein the correlation coefficient
Figure BDA0004026764160000154
Representing the probability of the vehicle node j exhibiting a positive interaction event upon occurrence of an uncertain interaction.
In combination with the three formulas, in one federal learning task, the task publisher i directly credits the vehicle node j with the reputation value
Figure BDA0004026764160000155
The method comprises the following steps:
Figure BDA0004026764160000156
the embodiment provides a safe sharing method of Internet of vehicles data based on a blockchain and dynamic reputation, wherein training tasks are issued through the blockchain, and model parameters and reputation values of participating nodes are stored in an decentralization mode by using the blockchain to replace a parameter server in traditional federal learning; verifying the legitimacy of the vehicle node and the RSU node; supporting secret sharing of model parameters, removing toxic model parameters by combining a Multi-Krum algorithm, and adding an RSU layer to screen and aggregate model parameters uploaded by vehicle nodes; in the reputation evaluation process, subjective logic models are improved, weights are set for different data sets, the Bayesian theory is adopted to eliminate uncertain interaction events occurring on vehicle nodes in the training process, the RSU nodes and the vehicle nodes are accurately and effectively subjected to reputation evaluation according to historical interaction behaviors of the participating nodes, and finally global model parameters and reputation values of the participating nodes are safely stored on a chain. The risk that an external adversary impersonates a legal node is avoided, the single-point fault problem of the centralized server is solved, the validity and the accuracy of reputation evaluation are improved, and the data security sharing application in the Internet of vehicles scene is realized under the conditions of protecting local privacy and training model security.
Example 2
The embodiment provides a car networking data safety sharing system based on block chain and dynamic reputation, which comprises: task publishers, blockchains, RSU nodes, and vehicle nodes;
the task publisher is used for publishing model training tasks, and RSU nodes and vehicle nodes which participate in the model training tasks are selected according to the reputation values;
the selected RSU node downloads the global model from the blockchain and transmits the global model to vehicle nodes which are added with model training tasks in the coverage areas of the nodes;
the vehicle node carries out iterative training of the local model according to the global model and the local data, encrypts the generated local update parameters by adopting a secret sharing algorithm to obtain secret shares, signs the secret shares and uploads the secret shares to the RSU node;
the RSU node calculates Euclidean distance between secret shares, signs the Euclidean distance and then uploads the Euclidean distance to the block chain;
reconstructing Euclidean distance by the block chain through Lagrange interpolation, selecting legal vehicle nodes, aggregating secret shares uploaded by the legal vehicle nodes in RSU nodes, and reconstructing an aggregation result by the block chain through Lagrange interpolation to obtain an aggregation updated global model;
and the RSU node downloads the aggregated and updated global model from the blockchain and transmits the global model to the corresponding vehicle node so that the vehicle node performs the model training of the next round until the model converges, and reputation values of the RSU node and the vehicle node subjected to reputation evaluation are stored in a uplink manner in the process of training each round of model.
It should be noted that the above modules correspond to the steps described in embodiment 1, and the above modules are the same as examples and application scenarios implemented by the corresponding steps, but are not limited to those disclosed in embodiment 1. It should be noted that the modules described above may be implemented as part of a system in a computer system, such as a set of computer-executable instructions.
In further embodiments, there is also provided:
an electronic device comprising a memory and a processor and computer instructions stored on the memory and running on the processor, which when executed by the processor, perform the method described in embodiment 1. For brevity, the description is omitted here.
It should be understood that in this embodiment, the processor may be a central processing unit CPU, and the processor may also be other general purpose processors, digital signal processors DSP, application specific integrated circuits ASIC, off-the-shelf programmable gate array FPGA or other programmable logic device, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory may include read only memory and random access memory and provide instructions and data to the processor, and a portion of the memory may also include non-volatile random access memory. For example, the memory may also store information of the device type.
A computer readable storage medium storing computer instructions which, when executed by a processor, perform the method described in embodiment 1.
The method in embodiment 1 may be directly embodied as a hardware processor executing or executed with a combination of hardware and software modules in the processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method. To avoid repetition, a detailed description is not provided herein.
Those of ordinary skill in the art will appreciate that the elements of the various examples described in connection with the present embodiments, i.e., the algorithm steps, can be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
While the foregoing description of the embodiments of the present invention has been presented in conjunction with the drawings, it should be understood that it is not intended to limit the scope of the invention, but rather, it is intended to cover all modifications or variations within the scope of the invention as defined by the claims of the present invention.

Claims (10)

1. The safe sharing method of the Internet of vehicles data based on the blockchain and the dynamic reputation is characterized by comprising the following steps:
issuing a model training task, and selecting RSU nodes and vehicle nodes which participate in the model training task according to the reputation value;
downloading a global model from the blockchain by the selected RSU node, and issuing the global model to vehicle nodes which are in the coverage range and added with model training tasks;
the vehicle node carries out iterative training of the local model according to the global model and the local data, encrypts the generated local update parameters by adopting a secret sharing algorithm to obtain secret shares, signs the secret shares and uploads the secret shares to the RSU node;
calculating Euclidean distance between secret shares by the RSU node, signing the Euclidean distance and uploading the Euclidean distance to the block chain;
reconstructing Euclidean distance by using the block chain through Lagrange interpolation, selecting legal vehicle nodes, aggregating secret shares uploaded by the legal vehicle nodes in RSU nodes, and reconstructing an aggregation result by using the block chain through Lagrange interpolation to obtain an aggregation updated global model;
and downloading the aggregated and updated global model from the blockchain by the RSU node, and issuing the global model to the corresponding vehicle node so as to enable the vehicle node to perform the next round of model training until the model converges, and storing reputation values subjected to reputation evaluation on the RSU node and the vehicle node in a chain manner in each round of model training process.
2. The method for securely sharing internet of vehicles based on blockchains and dynamic reputation according to claim 1, further comprising verifying the legitimacy of the vehicle nodes and RSU nodes; the method specifically comprises the following steps:
after receiving the secret share uploaded by the vehicle node, the RSU node verifies whether the identity and the time stamp of the vehicle node are valid or not;
after the block link receives the Euclidean distance and the secret share uploaded by the RSU node, whether the identification mark and the timestamp of the RSU node are valid or not is verified.
3. The blockchain and dynamic reputation-based internet of vehicles data secure sharing method of claim 1, wherein the reputation evaluation of the RSU comprises: the RSU node verifies the size of the local update parameter uploaded by the vehicle node, the RSU node verifies the update of the global model parameter, and the RSU node verifies the secret share of other RSU nodes; if the events are validated as valid and reliable, they are considered positive interaction events.
4. The safe sharing method of internet of vehicles data based on blockchain and dynamic reputation according to claim 3, wherein the weight η is set for the number of positive interaction events, 0< η is less than or equal to 1, and the weight of the number of negative interaction events is set to be 1, the reputation value of the RSU node is:
Figure FDA0004026764150000021
wherein ,
Figure FDA0004026764150000022
representing the trust degree, the distrust degree and the uncertainty degree of the task publisher i on the RSU node j respectively.
5. The method for securely sharing data of a car networking based on blockchain and dynamic reputation according to claim 4, wherein the trust level, the distrust level and the uncertainty level of the task publisher i on the RSU node j are respectively:
Figure FDA0004026764150000023
wherein r and s are the number of positive interaction events and the number of negative interaction events respectively; c is a constant.
6. The blockchain and dynamic reputation-based internet of vehicles data secure sharing method of claim 1, wherein the reputation value of the vehicle node is:
Figure FDA0004026764150000031
wherein ,
Figure FDA0004026764150000032
for the degree of uncertainty of task publisher i on vehicle node j, s and f are the number of positive interactions and the number of negative interactions, respectively.
7. The method for securely sharing data of the internet of vehicles based on blockchains and dynamic reputation according to claim 6, wherein when the reputation of the vehicle node is evaluated, the probability of occurrence of positive interaction events of the vehicle node is predicted by adopting Bayesian theory so as to eliminate uncertain interaction events occurring in the vehicle node.
8. The system for safely sharing the data of the Internet of vehicles based on the blockchain and the dynamic reputation is characterized by comprising the following components: task publishers, blockchains, RSU nodes, and vehicle nodes;
the task publisher is used for publishing model training tasks, and RSU nodes and vehicle nodes which participate in the model training tasks are selected according to the reputation values;
the selected RSU node downloads the global model from the blockchain and transmits the global model to vehicle nodes which are added with model training tasks in the coverage areas of the nodes;
the vehicle node carries out iterative training of the local model according to the global model and the local data, encrypts the generated local update parameters by adopting a secret sharing algorithm to obtain secret shares, signs the secret shares and uploads the secret shares to the RSU node;
the RSU node calculates Euclidean distance between secret shares, signs the Euclidean distance and then uploads the Euclidean distance to the block chain;
reconstructing Euclidean distance by the block chain through Lagrange interpolation, selecting legal vehicle nodes, aggregating secret shares uploaded by the legal vehicle nodes in RSU nodes, and reconstructing an aggregation result by the block chain through Lagrange interpolation to obtain an aggregation updated global model;
and the RSU node downloads the aggregated and updated global model from the blockchain and transmits the global model to the corresponding vehicle node so that the vehicle node performs the model training of the next round until the model converges, and reputation values of the RSU node and the vehicle node subjected to reputation evaluation are stored in a uplink manner in the process of training each round of model.
9. An electronic device comprising a memory and a processor and computer instructions stored on the memory and running on the processor, which when executed by the processor, perform the method of any one of claims 1-7.
10. A computer readable storage medium storing computer instructions which, when executed by a processor, perform the method of any of claims 1-7.
CN202211709057.XA 2022-12-29 2022-12-29 Block chain and dynamic reputation based Internet of vehicles data secure sharing method and system Pending CN116233177A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211709057.XA CN116233177A (en) 2022-12-29 2022-12-29 Block chain and dynamic reputation based Internet of vehicles data secure sharing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211709057.XA CN116233177A (en) 2022-12-29 2022-12-29 Block chain and dynamic reputation based Internet of vehicles data secure sharing method and system

Publications (1)

Publication Number Publication Date
CN116233177A true CN116233177A (en) 2023-06-06

Family

ID=86583455

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211709057.XA Pending CN116233177A (en) 2022-12-29 2022-12-29 Block chain and dynamic reputation based Internet of vehicles data secure sharing method and system

Country Status (1)

Country Link
CN (1) CN116233177A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116862021A (en) * 2023-07-31 2023-10-10 山东省计算中心(国家超级计算济南中心) anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation
CN117150321A (en) * 2023-10-31 2023-12-01 北京邮电大学 Equipment trust evaluation method and device, service equipment and storage medium
CN117371025A (en) * 2023-09-18 2024-01-09 泉城省实验室 Method and system for training decentralised machine learning model
CN117424897A (en) * 2023-09-22 2024-01-19 广州恒运储能科技有限公司 Method and system for remotely monitoring energy storage power station
CN118054953A (en) * 2024-03-06 2024-05-17 湖北工程学院 Block chain-based Internet of things communication method, device, equipment and storage medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116862021A (en) * 2023-07-31 2023-10-10 山东省计算中心(国家超级计算济南中心) anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation
CN116862021B (en) * 2023-07-31 2024-05-03 山东省计算中心(国家超级计算济南中心) Anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation
CN117371025A (en) * 2023-09-18 2024-01-09 泉城省实验室 Method and system for training decentralised machine learning model
CN117371025B (en) * 2023-09-18 2024-04-16 泉城省实验室 Method and system for training decentralised machine learning model
CN117424897A (en) * 2023-09-22 2024-01-19 广州恒运储能科技有限公司 Method and system for remotely monitoring energy storage power station
CN117424897B (en) * 2023-09-22 2024-04-12 广州恒运储能科技有限公司 Method and system for remotely monitoring energy storage power station
CN117150321A (en) * 2023-10-31 2023-12-01 北京邮电大学 Equipment trust evaluation method and device, service equipment and storage medium
CN117150321B (en) * 2023-10-31 2024-01-30 北京邮电大学 Equipment trust evaluation method and device, service equipment and storage medium
CN118054953A (en) * 2024-03-06 2024-05-17 湖北工程学院 Block chain-based Internet of things communication method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN116233177A (en) Block chain and dynamic reputation based Internet of vehicles data secure sharing method and system
Baza et al. Blockchain-based firmware update scheme tailored for autonomous vehicles
Zhang et al. BSFP: blockchain-enabled smart parking with fairness, reliability and privacy protection
CN112861152B (en) Federal learning incentive method and system based on license chain
CN114338045A (en) Information data verifiability safety sharing method and system based on block chain and federal learning
EP2918057B1 (en) Methods and nodes for verification of data
CN112152797B (en) Block chain remote data auditing and monitoring method and system, computer equipment and terminal
Huang et al. Blockchain-assisted personalized car insurance with privacy preservation and fraud resistance
CN115499379B (en) Information interaction method, device, equipment and medium based on block chain
CN104717217B (en) The provable security data property held verification method based on section entitlement in a kind of cloud storage
CN110830244A (en) Anti-quantum computing vehicle networking method and system based on identity secret sharing and alliance chain
CN116405187A (en) Distributed node intrusion situation sensing method based on block chain
CN113268543A (en) Block chain-based security content sharing management method in Internet of vehicles
Palomar et al. Hindering false event dissemination in VANETs with proof-of-work mechanisms
CN115801260A (en) Block chain assisted cooperative attack and defense game method under untrusted network environment
CN115659416A (en) Manufacturing industry private data security protection system and method based on block chain
Shari et al. Blockchain-based decentralized data dissemination scheme in smart transportation
Baza et al. Incentivized and secure blockchain-based firmware update and dissemination for autonomous vehicles
CN111865595B (en) Block chain consensus method and device
CN114362958B (en) Intelligent home data security storage auditing method and system based on blockchain
CN114449000B (en) Internet of vehicles data consensus optimization storage method and storage system
CN112149181A (en) Hybrid cloud data center data transmission method with credit value analysis function
Bolgouras et al. RETINA: Distributed and secure trust management for smart grid applications and energy trading
CN116828453B (en) Unmanned aerial vehicle edge computing privacy protection method based on self-adaptive nonlinear function
CN116489637B (en) Mobile edge computing method oriented to meta universe and based on privacy protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Country or region after: China

Address after: No.19 Keyuan Road, Lixia District, Jinan City, Shandong Province

Applicant after: SHANDONG COMPUTER SCIENCE CENTER(NATIONAL SUPERCOMPUTER CENTER IN JINAN)

Applicant after: Qilu University of Technology (Shandong Academy of Sciences)

Address before: No.19 Keyuan Road, Lixia District, Jinan City, Shandong Province

Applicant before: SHANDONG COMPUTER SCIENCE CENTER(NATIONAL SUPERCOMPUTER CENTER IN JINAN)

Country or region before: China

Applicant before: Qilu University of Technology