基于區(qū)塊鏈的協(xié)作式車聯(lián)網(wǎng)信任管理方案
doi: 10.11999/JEIT240517
-
1.
重慶郵電大學(xué)通信與信息工程學(xué)院 重慶 400065
-
2.
公共大數(shù)據(jù)安全技術(shù)重慶市重點實驗室 重慶 401420
Trust Management Scheme for Collaborative Internet of Vehicles Based on Blockchain
-
1.
School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
-
2.
Chongqing Key Laboratory of Public Big Data Security Technology, Chongqing 401420, China
-
摘要: 針對車聯(lián)網(wǎng)(IoV)中傳統(tǒng)信任管理方案對惡意車輛的識別假陽率高、無法滿足多樣化服務(wù)且傳統(tǒng)共識算法不適用于當(dāng)前車聯(lián)網(wǎng)環(huán)境的問題,該文提出了基于區(qū)塊鏈的協(xié)作式車聯(lián)網(wǎng)信任管理方案。構(gòu)建了基于狄利克雷分布的信任管理模型,將車輛信任和協(xié)作服務(wù)劃分為多個等級,針對不同服務(wù)調(diào)整信任等級閾值。設(shè)計了具有反饋機(jī)制的信任等級評價算法,考慮協(xié)作車輛當(dāng)前狀態(tài)、鄰居推薦、歷史信任信息、服務(wù)質(zhì)量4方面因素,從協(xié)作前、后兩階段對協(xié)作車輛信任等級進(jìn)行評價。改進(jìn)了傳統(tǒng)的工作量證明(PoW)共識算法,動態(tài)調(diào)整礦工節(jié)點出塊難度。仿真結(jié)果表明,相比同類方案,所提方案在保證能夠高效識別惡意節(jié)點的前提下,還能夠進(jìn)一步降低識別假陽率,提高協(xié)作成功率和共識效率。
-
關(guān)鍵詞:
- 車聯(lián)網(wǎng) /
- 信任管理 /
- 區(qū)塊鏈 /
- 車輛協(xié)作 /
- 共識算法
Abstract:Objective The Internet of Vehicles (IoV) plays a pivotal role in the development of modern intelligent transportation systems. It enables seamless communication among vehicles, road infrastructure, and pedestrians, thereby improving traffic management, enhancing driving experiences, and optimizing resource utilization. However, existing IoV systems face a range of complex and urgent challenges. A major issue is the high false positive rate in identifying malicious vehicles. These vehicles, intending to disrupt network operations, may engage in harmful activities such as dropping packets or delaying transmissions. This not only compromises data transmission integrity but also poses a serious threat to the overall security and reliability of the IoV network. Furthermore, inaccurate identification may lead to the wrongful penalization of legitimate vehicles, disrupting their normal operations. Another challenge stems from the diverse and complex service requirements within IoV. These range from entertainment services that enhance user experience, to traffic efficiency services aimed at optimizing traffic flow, and highly sensitive services related to traffic safety and privacy. Unfortunately, existing solutions fail to adequately address these varied needs, leading to suboptimal service delivery and potential security risks. Traditional consensus algorithms also face significant limitations in the dynamic IoV environment. The high resource consumption and low efficiency of these algorithms not only waste valuable computational resources but also hinder timely and accurate information processing, affecting the overall performance of the IoV system. To address these issues, it is critical to develop an innovative solution to enhance the security, reliability, and adaptability of IoV systems. This paper proposes a collaborative trust management scheme based on blockchain technology, which aims to address these challenges and improve the overall performance of IoV. Methods To address the challenges outlined above, a comprehensive set of methods is designed. First, a trust management model based on the Dirichlet distribution is developed. This model classifies vehicle trust and collaborative services into multiple levels, each representing a different degree of trustworthiness and service quality. The trust level thresholds for different service types are finely tuned. For example, traffic safety and privacy-related services, which require high security and reliability, are assigned higher trust level thresholds, ensuring that only vehicles with a sufficient trust level can provide these critical services. Second, a trust level evaluation algorithm integrated with a feedback mechanism is developed. This algorithm considers four key factors: the current state of the collaborating vehicle, neighbor recommendations, historical trust data, and service quality. The evaluation process occurs in two distinct but complementary stages: before and after collaboration.Before collaboration, the vehicle's current state is thoroughly assessed, including its computing power, which determines its capacity to handle complex tasks; propagation delay, which indicates the timeliness of communication; and familiarity with the requesting vehicle, which can influence collaboration reliability. These factors, along with neighbor recommendations and historical trust data, contribute to an initial trustworthiness assessment. After collaboration, a feedback mechanism based on packet delivery ratio and time delay is applied. The packet delivery ratio measures the proportion of successfully delivered packets, while time delay reflects the responsiveness of the vehicle during communication. These metrics are used to adjust the vehicle's trust level, providing a more dynamic and accurate evaluation of its trustworthiness. Third, the traditional Proof of Work (PoW) consensus algorithm is enhanced by introducing a task priority index. This dynamic adjustment of block creation difficulty for miner nodes allows blocks containing critical trust information or high-priority service data to be added to the blockchain more quickly. This enhancement improves blockchain efficiency. Results and Discussions The simulation results provide compelling evidence for the effectiveness of the proposed scheme. In terms of malicious vehicle identification, as shown in ( Fig. 3 ), although the initial identification rate of malicious vehicles is slightly lower than that of some binary-evaluation-based schemes, the proposed scheme demonstrates a significant reduction in the false positive rate. The comparison of false positive rates, presented in (Fig. 4 ), clearly illustrates that the proposed scheme outperforms existing methods. This improvement is attributed to the carefully designed trust level thresholds, which prevent ordinary vehicles with low-quality services from being misclassified as malicious when performing high-level services. Regarding the collaboration success rate, (Fig. 5 ) indicates that the proposed scheme performs better across various service scenarios and different proportions of malicious vehicles. Even when the proportion of malicious vehicles reaches 50%, the collaboration success rate for the three-level services remains above 80%, emphasizing the robustness and reliability of the proposed scheme. In terms of consensus efficiency, as shown in (Fig. 6 ), the improved algorithm outperforms the traditional PoW consensus algorithm. By dynamically adjusting to the actual conditions, the enhanced algorithm allows the Roadside Unit (RSU) responsible for the area to generate blocks more quickly when the task priority index is larger. This leads to faster processing of critical information and better alignment with the dynamic needs of the IoV collaborative scenario.Conclusions The collaborative trust management scheme based on blockchain proposed in this paper effectively addresses critical challenges in IoV systems, including malicious vehicle identification, service adaptability, and the applicability of consensus algorithms. By accurately classifying service types and vehicle trust levels, and by employing a comprehensive trust evaluation algorithm along with an enhanced consensus algorithm, this scheme significantly improves the security and trustworthiness of IoV systems. Furthermore, it provides a scalable solution for future IoV deployments, facilitating the broader adoption of IoV technology. -
Key words:
- Internet of vehicles /
- Trust management /
- Blockchain /
- Vehicle collaboration /
- Consensus algorithm
-
表 1 仿真參數(shù)
參數(shù) 數(shù)值 總車輛數(shù)(輛) 1000 車輛密度(輛/km) 40 車輛速度(km/h) 40~60 車輛最大通信距離${D_{{\text{max}}}}$(m) 200 獎懲調(diào)節(jié)因子$ \lambda $ 0.4,0.6,0.8 當(dāng)前狀態(tài)評估權(quán)重因子$ ({\alpha _1},{\alpha _2},{\alpha _3}) $ (1/3,1/3,1/3) 鄰居推薦權(quán)重調(diào)整因子$r$ 0.2 服務(wù)等級權(quán)重參數(shù)$ ({\omega _1},{\omega _2},{\omega _3}) $ (0.4,0.6,0.8) 信任閾值${\text{Thr}}{{\text{e}}_1}$ 0.4 數(shù)據(jù)包投遞率閾值${\text{Thr}}{{\text{e}}_2}$ 0.8 哈希門限調(diào)控因子$\omega $ 0.02 哈希門限調(diào)控參數(shù)$\theta $ 3 難度調(diào)節(jié)參數(shù)${\text{Dap}}$ 8 下載: 導(dǎo)出CSV
-
[1] 陳山枝, 胡金玲, 時巖, 等. LTE-V2X車聯(lián)網(wǎng)技術(shù)、標(biāo)準(zhǔn)與應(yīng)用[J]. 電信科學(xué), 2018, 34(4): 1–11. doi: 10.11959/j.issn.1000-0801.2018140.CHEN Shanzhi, HU Jinling, SHI Yan, et al. Technologies, standards and applications of LTE-V2X for vehicular networks[J]. Telecommunications Science, 2018, 34(4): 1–11. doi: 10.11959/j.issn.1000-0801.2018140. [2] DUAN Wei, GU Jinyuan, WEN Miaowen, et al. Emerging technologies for 5G-IoV networks: Applications, trends and opportunities[J]. IEEE Network, 2020, 34(5): 283–289. doi: 10.1109/MNET.001.1900659. [3] CONTRERAS-CASTILLO J, ZEADALLY S, and GUERRERO-IBANEZ J A. Internet of vehicles: Architecture, protocols, and security[J]. IEEE Internet of Things Journal, 2018, 5(5): 3701–3709. doi: 10.1109/JIOT.2017.2690902. [4] SHARMA S and KAUSHIK B. A survey on internet of vehicles: Applications, security issues & solutions[J]. Vehicular Communications, 2019, 20: 100182. doi: 10.1016/j.vehcom.2019.100182. [5] 張海霞, 李腆腆, 李東陽, 等. 基于車輛行為分析的智能車聯(lián)網(wǎng)關(guān)鍵技術(shù)研究[J]. 電子與信息學(xué)報, 2020, 42(1): 36–49. doi: 10.11999/JEIT190820.ZHANG Haixia, LI Tiantian, LI Dongyang, et al. Research on vehicle behavior analysis based technologies for intelligent vehicular networks[J]. Journal of Electronics & Information Technology, 2020, 42(1): 36–49. doi: 10.11999/JEIT190820. [6] ENGOULOU R G, BELLA?CHE M, PIERRE S, et al. VANET security surveys[J]. Computer Communications, 2014, 44: 1–13. doi: 10.1016/j.comcom.2014.02.020. [7] HASROUNY H, SAMHAT A E, BASSIL C, et al. VANet security challenges and solutions: A survey[J]. Vehicular Communications, 2017, 7: 7–20. doi: 10.1016/j.vehcom.2017.01.002. [8] HBAIEB A, AYED S, and CHAARI L. A survey of trust management in the internet of vehicles[J]. Computer Networks, 2022, 203: 108558. doi: 10.1016/j.comnet.2021.108558. [9] WEI Lijun, YANG Yuhan, WU Jing, et al. Trust management for internet of things: A comprehensive study[J]. IEEE Internet of Things Journal, 2022, 9(10): 7664–7679. doi: 10.1109/JIOT.2021.3139989. [10] ALLADI T, CHAMOLA V, SAHU N, et al. A comprehensive survey on the applications of blockchain for securing vehicular networks[J]. IEEE Communications Surveys & Tutorials, 2022, 24(2): 1212–1239. doi: 10.1109/COMST.2022.3160925. [11] YANG Zhe, YANG Kan, LEI Lei, et al. Blockchain-based decentralized trust management in vehicular networks[J]. IEEE Internet of Things Journal, 2019, 6(2): 1495–1505. doi: 10.1109/JIOT.2018.2836144. [12] XU Yuwei, YU Enze, SONG Yuxing, et al. R-tracing: Consortium blockchain-based vehicle reputation management for resistance to malicious attacks and selfish behaviors[J]. IEEE Transactions on Vehicular Technology, 2023, 72(6): 7095–7110. doi: 10.1109/TVT.2023.3238507. [13] 玄世昌, 湯浩, 楊武. 基于信譽(yù)積分的路況信息共享中共謀攻擊節(jié)點檢測方法[J]. 通信學(xué)報, 2021, 42(4): 158–168. doi: 10.11959/j.issn.1000-436x.2021051.XUAN Shichang, TANG Hao, and YANG Wu. Method for detecting collusion attack node in road condition information sharing based on reputation point[J]. Journal on Communications, 2021, 42(4): 158–168. doi: 10.11959/j.issn.1000-436x.2021051. [14] GAO Honghao, LIU Can, YIN Yuyu, et al. A hybrid approach to trust node assessment and management for VANETs cooperative data communication: Historical interaction perspective[J]. IEEE Transactions on Intelligent Transportation Systems, 2022, 23(9): 16504–16513. doi: 10.1109/TITS.2021.3129458. [15] QI Zhenle and CHEN Wen. Location privacy protection of IoV based on blockchain and K-anonymity technology[C]. 2023 IEEE 6th International Conference on Electronics Technology (ICET), Chengdu, China, 2023: 15–21. doi: 10.1109/ICET58434.2023.10211967. [16] FAN Qi, XIN Yang, JIA Bin, et al. COBATS: A novel consortium blockchain-based trust model for data sharing in vehicular networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2023, 24(11): 12255–12271. doi: 10.1109/TITS.2023.3286432. [17] YANG Zhigang, WANG Ruyan, WU Dapeng, et al. Blockchain-enabled trust management model for the internet of vehicles[J]. IEEE Internet of Things Journal, 2023, 10(14): 12044–12054. doi: 10.1109/JIOT.2021.3124073. [18] SAQIB N U, MALIK S U R, ANJUM A, et al. Preserving privacy in internet of vehicles (IoV): A novel group-leader-based shadowing scheme using blockchain[J]. IEEE Internet of Things Journal, 2023, 10(24): 21421–21430. doi: 10.1109/JIOT.2023.3294133. [19] YAO Xuanxia, ZHANG Xinlei, NING Huansheng, et al. Using trust model to ensure reliable data acquisition in VANETs[J]. Ad Hoc Networks, 2017, 55: 107–118. doi: 10.1016/j.adhoc.2016.10.011. [20] 齊振樂. 基于區(qū)塊鏈和K-匿名技術(shù)的車輛位置隱私保護(hù)的研究[D]. [碩士論文], 東華大學(xué), 2023. doi: 10.27012/d.cnki.gdhuu.2023.001005.QI Zhenle. Research on vehicle location privacy protection based on blockchain and K-anonymity technology[D]. [Master dissertation], Donghua University, 2023. doi: 10.27012/d.cnki.gdhuu.2023.001005. [21] ZHANG Yanchao and FANG Yuguang. A fine-grained reputation system for reliable service selection in peer-to-peer networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(8): 1134–1145. doi: 10.1109/TPDS.2007.1043. [22] 3GPP. 3GPP TR 36.885 Study on LTE-based V2X Services[S]. 3GPP, 2016. -