Font Size: a A A

Research On Privacy Protection Protocol Of Internet Of Vehicles Based On Blockchain

Posted on:2023-12-17Degree:MasterType:Thesis
Country:ChinaCandidate:N HanFull Text:PDF
GTID:2542307088473794Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of Internet of things and communication technology,many new application services of Internet of vehicles,such as real-time navigation,driverless,road condition analysis and so on,are developing rapidly.However,the frequent information exchange between vehicles has also brought about an increasingly serious problem of privacy data disclosure.Due to the randomness,high delay and high mobility of the vehicle networking system,the traditional privacy protection technology can not meet the real-time requirements of the vehicle networking system,and the data storage of the vehicle networking system may also be attacked.Combining edge computing and blockchain technology,using edge computing technology to calculate from the edge side to solve the problems of high delay and real-time of the Internet of vehicles system,and using blockchain technology to solve the problems of data tampering and disclosure in the Internet of vehicles system is the main idea and research direction of this thesis to solve the problems of privacy disclosure in the Internet of vehicles system.Aiming at the problem of privacy data protection in the current Internet of vehicles system,this paper carries out research.The research contents are as follows:(1)Aiming at the problems of high delay,data leakage and data tampering in the current Internet of vehicles system,a data sharing and storage scheme of Internet of vehicles based on blockchain and "cloud edge collaboration" is proposed.Firstly,edge computing is introduced to migrate some tasks to roadside units,and edge nodes with strong computing and storage capacity are configured in roadside units to reduce system delay;Secondly,a data sharing scheme is proposed,and a hybrid storage structure based on blockchain and "cloud edge collaboration" is designed to ensure the reliability,integrity and non tamperability of data sharing and storage;Finally,a practical Byzantine fault-tolerant algorithm(b-pbft)based on Bloom filter is proposed.The correctness analysis shows that the scheme ensures the security and integrity of data sharing;The analysis of communication overhead shows that the scheme simplifies the consensus process between edge nodes;Simulation results show that the proposed algorithm has certain advantages over traditional algorithms in terms of storage,consensus delay and throughput.(2)Aiming at the problems of privacy disclosure in identity authentication of vehicle networking system in edge computing environment,a new identity authentication scheme is proposed.According to Tyson polygon,divide the road network data,and determine the generated meta coordinate set in each polygon area in Tyson polygon;Determine the area to which the vehicle belongs according to the real-time driving position of the vehicle,and obtain the generator coordinates in the area;According to the physical distance between the generator and the edge node coordinates and the current real-time load of the edge node,the vehicle selects the edge node with less overhead to send the identity authentication request.When the vehicle is not within the coverage of edge nodes,the vehicle sends an identity authentication request to the cloud computing center based on the "cloud edge collaboration" technology.The scheme selects the certificateless authentication mode to realize the two-way anonymous identity authentication and the generation of shared key.During identity authentication,if any node finds abnormal authentication data information,it can send the abnormal data information to the cloud computing center,which can quickly trace and revoke the malicious node.Security analysis shows that the scheme not only has the security characteristics of concealment,unforgeability and traceability,but also can resist internal attack,man in the middle attack and collusion attack.Experiments show that the scheme has been effectively improved compared with other schemes in terms of computational cost,communication overhead,signal cost and arrival rate.There are 18 figures,7 tables and 68 references.
Keywords/Search Tags:Blockchain, Edge Computing, Internet of Vehicles, Privacy protection, Data leakage
PDF Full Text Request
Related items