Font Size: a A A

Research On Trust Management And Privacy Protection Of Internet Of Vehicles Based On Blockchain

Posted on:2022-05-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y L YaoFull Text:PDF
GTID:2492306737459504Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The Internet of Vehicles(Io V),as the core component of the future intelligent transportation system,plays an increasingly important role in road safety,traffic control,and information services.Along with the continuous innovation of information technology and the continuous advancement of automobile intelligence,information interaction has become increasingly frequent,which makes people put forward higher requirements for the reliability of vehicle nodes and the messages they release.The Io V trust management system can effectively restrict the behavior of vehicle nodes in the network and improve the credibility of nodes,but it is difficult to guarantee the reliability of messages during transmission.Moreover,the open Io V environment and frequent trust assessments also exposed other privacy issues:such as data privacy issues and identity privacy issues.How to solve the privacy problems that may arise while ensuring the smooth progress of trust management has become a difficult point in current research.In response to the above problems,this thesis,based on an in-depth analysis and summary of existing trust management and privacy protection schemes,first combines blockchain technology to design an effective and reliable Io V trust management framework;then,the corresponding privacy protection schemes are deployed based on it.Specifically,the main research work of this thesis can be summarized as follows:(1)Considering the mobility and variability of Io V,in order to prevent malicious nodes and malicious behaviors from harming the system,a trust management framework based on the consortium blockchain is designed.The proposed trust management framework is a two-layer structure,including consensus layer and vehicle layer,which can provide a decentralized,more secure and reliable environment for trust computing while restricting node behavior.The framework describes in detail the components involved in each layer and the functions that are mainly responsible,and clearly points out the internal connections between the components.Finally,the corresponding network model and comparative analysis are given.(2)Considering that the transmission environment of Io V is not credible and the message may face the threat of data tampering during the transmission process,a data privacy protection scheme based on homomorphic encryption is proposed.First,the vehicle node adds a digital signature when sending a message to ensure the accuracy of the message;then,homomorphic encryption algorithm is introduced in the process of trust calculation,and Paillier algorithm is used to realize ciphertext operation,which ensures the integrity and confidentiality of evaluation message while ensuring the smooth calculation of the trust value.In addition,the scheme combined with the designed trust management framework implements fabric-based trust updates to ensure secure trust storage.Finally,the security analysis of the proposed scheme was carried out,and the Performance Evaluation Process Algebra(PEPA)method was used to complete scheme modeling and performance evaluation and analysis,verifying the efficiency of the proposed scheme.(3)Considering that the nodes in Io V are not trusted,and the interaction information generally carries the personal identification of the node,the vehicle nodes may face the threat of identity privacy disclosure in the process of trust assessment,an identity privacy protection scheme based on pseudonym technology is proposed.First of all,the scheme designs a hybrid time-based and traffic-based pseudonym update trigger mechanism.Then,using the RSU and the vehicle node to cooperate with each other,the new pseudonym is automatically generated on the vehicle node.Next,combined with the designed trust management framework,realize the pseudonym update based on Fabric.Finally,security analysis,PEPA modeling and corresponding performance analysis of the proposed scheme are carried out to verify its effectiveness.
Keywords/Search Tags:Blockchain, Trust Management, Privacy Protection, Homomorphic Encryption, Pseudonym Technology, PEPA
PDF Full Text Request
Related items