Font Size: a A A

Research On Secure Communication Technology In Internet Of Vehicles

Posted on:2020-10-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2392330602950335Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As an emerging Internet of Things technology,Internet of Vehicles relies on sensing technology,wireless communication technology and mobile internet technology to provide intelligent transportation system services for terminal users.Automotive manufacturers and the telecommunications industry work together to equip their vehicles with wireless technology,which not only brings a variety of information services to the vehicle,but also improves road safety and traffic efficiency.However,since the performance of Internet of Vehicles application service depends on the availability of the communication network and the reliability of the received message,any malicious network attack will be extremely damaging to the service.Therefore,it is of great significance to provide a reliable solution for secure communication of the Internet of Vehicles.In this paper,the DoS attack in the C-V2 X network and the replacement of the unmanned vehicle platoon head in the typical environment will be deeply studied.The research findings and contributions as follows:Benefiting from the infrastructure deployment,mature quality of service support,and efficient congestion control technology of LTE system,C-V2 X can better serve vehicle-intensive urban scenarios and provide low-latency and reliable V2 X message transmission.For the periodic transmission of V2 X messages and the different delay requirements of services,the C-V2 X network proposes to use the base station for SPS scheduling and support multi-priority service transmission.Considering the unique resource scheduling method of C-V2 X,a new DoS attack is proposed.Malicious nodes frequently request wireless communication resources from the base station to transmit high-priority services.The simulation proves that the attack can quickly exhaust the communication resources in the network,making the base station unable to provides services for other honest nodes.Secondly,this paper proposed a new malicious detection mechanism based on MEC.Considering that there are many applications in the MEC server and the computing resources are valuable,in order to improve the utilization of computing resources,the base station is used to estimate the malicious probability of the node,and by minimizing the comprehensive cost of the communication resources and computing resources,the nodes with greater malicious probability are sent to the MEC server to detect,so as to avoid feedback of the communication status of each node to the server,thus saving computing resources.It can be seen from the simulation results that the mechanism can not only detect malicious nodes efficiently and reliably,but also greatly reduce the consumption of computing resources.In a typical application environment,the use of unmanned vehicular platooning system to complete missions can improve efficiency and reduce fuel consumption,but once the head vehicle is malicious controlled,the safety of the entire platoon and even other related units will be threatened.Therefore,a distributed vehicle reputation management mechanism is proposed.Based on the comprehensive analysis of sensing data,communication data and other vehicle reference data,each vehicle obtains the reputation evaluation values of other vehicles.According to the results of reputation evaluation,a platoon head selection mechanism based on the consortium blockchain is proposed to ensure the timely and reasonable replacement of the head vehicle,thus ensuring the safety of the platoon.The head of the platoon acts the butler to initiate a voting request and the other members respond and broadcast their respective reputation lists.After the comprehensive statistics,the butler obtained the next platoon head and packaged the relevant information into block.If more than half of the members passed the verification,the butler added the block to the consortium blockchain and completed the platoon head replacement process.The simulation verifies the reliability and stability of the proposed reputation management mechanism and the platoon head replacement mechanism under malicious attacks.
Keywords/Search Tags:V2X, DoS Attack Detection, Reputation Management, Consortium Blockchain, Platoon Head Replacement
PDF Full Text Request
Related items