| With the rapid development of China’s economy and society,the contradiction between the increasing number of motor vehicles and the current capacity of roads has become more and more severe.In order to alleviate this contradiction,Vehicle Infrastructure Cooperative System(VICS)has become a strategic area.Taking advantage of autonomous driving and intelligent network technology,information interaction in VICS is rapidly developing into a key technology.For information interaction technology,how to ensure a credible environment has always been the focus and difficulty.At present,the credibility of information interaction is mainly based on vehicle identity authentication,which is limited by the trustworthiness of vehicles and uncertainty of Vehicle-to-Everything(V2X)interaction environment.Besides,some V2 X credibility guarantee methods are limited by the ideal traffic environment.This paper takes vehicles with V2 X communication ability in VICS as the research object,and proposes a credible interaction method based on the understanding of traffic business characteristics.The specific research content includes the following four aspects:(1)Aiming at the issue of credible guarantee for V2 X information interaction,this paper investigates the relevant academic achievements,pointing out the existing problems in the current methods.For VICS interaction system supported by the new generation mobile communication technology,this paper analyzes the message framework and interaction requirements,designs a credible interaction method,and expounds its process.(2)This paper analyzes the influencing factors of vehicle credibility in VICS,and proposes a vehicle credibility authentication method.Based on real-time traffic situation and vehicle operation rules,the vehicle behavior state deduction method has been proposed.In this paper,the quantitative model of the credibility of vehicle behavior state and path selection interference between adjacent roadside nodes is constructed,and the credibility calculation method and credibility level evaluation rule of vehicle subject have been designed.(3)Analyzing the effective characteristics of various traffic business messages in VICS,this paper studies a V2 X content cognition method.For beacon messages,a low-resolution message screening strategy has been designed.For warning messages,a high-resolution content recognition method has been designed.(4)Setting the proportion of malicious vehicles with different levels to conduct comparative experiments in different interactive scenarios,the paper uses SUMO to build a simulation test environment,and verifies the proposed credible authentication method and content recognition method.The verification is conducted in both freeway and signalized intersection environment.The results show that,compared with other traditional methods,the proposed credible interaction method achieves good performance in both freeway environment and signalized intersection environment,with the corresponding cognitive efficiency of90.91% and 94.76% respectively.In addition,under different penetration conditions,this method can make vehicles interact with heterogeneous traffic environment more smoothly,and has higher cognitive stability in heterogeneous environment... |