Font Size: a A A

Research And Implementation Of Security Verification Method For Communication Protocol Interaction Logic Of Internet Of Vehicles

Posted on:2023-07-03Degree:MasterType:Thesis
Country:ChinaCandidate:X WangFull Text:PDF
GTID:2542306842460634Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Vehicular ad-hoc network combines wireless communication technology with modern automobile technology to realize real-time communication between vehicles and between vehicles and road infrastructure,which can effectively improve road traffic safety and transportation efficiency,and provide drivers with better driving experience.However,the openness of wireless communication cause vehicles to face various threats from the outside,and the resulting security problems have seriously affected the implementation of Internet of Vehicles applications.Security protocols are an effective way to solve the above problems.However,a large number of security protocols that already exist have been confirmed to have various security loopholes,and some security protocols may introduce some new problems during the implementation process.Therefore,how to check the security of protocol program execution logic has gradually become one of the focuses of people’s attention.This paper studies the security of the interaction logic of typical internet of vehicles communication protocol.The main research results are as follows:First of all,the building of interactive environment for typical internet of vehicles communication protocol.The interaction process of the typical internet of vehicles communication protocol is simulated by using the mainstream large-scale network simulation software platform in the industry,and then a program interaction scheme oriented to the communication protocol of the internet of vehicles is designed,which can use the interaction of each protocol end in the Internet of Vehicles communication protocol.The message data is used to construct a new data packet,which effectively reduces the complexity of constructing the data packet at the learning end.Then,research on multi-end-oriented state machine learning and optimization algorithms.Firstly,There are often multiple communication entities in the internet of vehicles communication protocol,and the traditional state machine learning algorithm can only be oriented to single-end targets.Aiming at this problem,a multi-end-oriented state machine learning method is proposed,which can simultaneously study the state machines of multiple protocol ends.Secondly,in order to solve the problem that the traditional consistency test algorithm needs a lot of interaction with the target protocol end,a test sequence optimization algorithm based on the shortest path is proposed,and on this basis,the greedy strategy algorithm is used for further optimization.The experimental results show that the proposed method reduces the number of resets by 30% and the number of interactions by 24% on average compared to traditional consistency testing algorithms in the process of learning the target protocol.Furthermore,research on automatic security verification method oriented to protocol state machine.A series of conversion rules are formulated for the learned state machine model,which realizes the automatic conversion from the state machine model to the formal description language,and uses the formal verification tool to verify the security of the converted protocol process.Finally,based on the research results of this paper,a security verification system oriented to the interaction logic of the internet of vehicles communication protocol is designed and implemented.After the functional tests of the system’s program interaction module,model learning module and security verification module,the results show that the system can effectively verify the security of the interaction logic of the target internet of vehicles communication protocol.
Keywords/Search Tags:Internet of Vehicles, Security Protocol, Model Learning, Formal Verification
PDF Full Text Request
Related items