Font Size: a A A

Research On Data Security Consensus In Internet Of Vehicles

Posted on:2023-10-31Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y WangFull Text:PDF
GTID:2532306911481924Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
The Internet of Vehicles(i.e.,Io V)is an important part of intelligent transportation system.On the one hand,it is widely used in traffic management,safe driving and network services.It plays an important role in providing a safe traffic environment.It can realize data cooperation,consensus and information exchange between vehicle to vehicle and vehicle to infrastructure,so as to facilitate travel and improve traffic efficiency.On the other hand,Io V has the characteristics of rapid network topology changes and poor communication stability.If there are malicious vehicle nodes when sharing traffic data and information,they will face problems such as privacy disclosure and dissemination of false information,which will also increase the potential safety hazards of intelligent transportation.In view of the above problems,the data security consensus in Io V is studied.The specific contents are as follows:In the process of data information transmission between vehicle nodes,honest vehicles are vulnerable to false data injection attacks from malicious vehicles,resulting in the dissemination of false information.A security consensus protocol based on signature authentication is proposed,which can filter false data.Firstly,the consensus agreement of the design is described in detail.When honest vehicles account for the majority,the vehicle generates and broadcasts the event report.When a witness vehicle collects the event report that reaches the threshold number,the final effective event report is generated and broadcast,so that all vehicles in the vehicle network can achieve consensus on the traffic events,so as to filter the false data.Meanwhile,the signature authentication scheme based on elliptic curve cryptosystem is adopted in the consensus protocol.The scheme supports batch verification of signatures and enables the receiving vehicle to verify multiple messages at the same time.Through performance analysis,it is found that compared with the existing schemes,the signature authentication scheme can not only meet the security requirements of Io V,but also improve the communication efficiency between vehicles.Finally,the simulation shows that in the process of consensus,the coding method of growth code can improve the collection efficiency of event reports,and verify the effectiveness of the consensus protocol.In order to improve the consensus efficiency under the road congestion scenario in Io V,probabilistic counting is applied to the safety consensus protocol.Firstly,a threshold verification scheme based on probabilistic counting is designed,so that the witness vehicle does not need to collect all the event reports with signatures.Using probabilistic counting,it can be roughly estimated that the number of event reports has reached the threshold,so as to generate the final event report.Secondly,the definition of event report format is further improved to prevent the attacker from misjudging the number of event reports by the threshold verification scheme through a small number of changed messages,so as to resist the decision change attack.In addition,a message update scheme is designed to avoid redundant message replay between vehicles.Finally,in the simulation of the consensus protocol,by comparing different threshold verification schemes,it shows that the threshold verification scheme based on probabilistic counting can make correct decisions according to the inaccurate estimated output,make a good trade-off between accuracy and security,and significantly save communication overhead.At the same time,the message update scheme combined with the design can improve the consensus efficiency and provide guarantee for the collaborative consensus between vehicles in Io V.
Keywords/Search Tags:Io V, Consensus Protocol, False Data Filtering, Elliptic Curve Cryptosystem, Probabilistic Counting
PDF Full Text Request
Related items