计算机科学 ›› 2015, Vol. 42 ›› Issue (8): 157-160.

• 信息安全 • 上一篇    下一篇

基于信任距离的车联网恶意节点检测方法

邬海琴,王良民   

  1. 江苏大学计算机科学与通信工程学院 镇江212013,江苏大学计算机科学与通信工程学院 镇江212013
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(61272074),江苏省自然科学基金(BK2011464),镇江市工业支撑计划项目(GY2013030)资助

Trust Distance Based Malicious Nodes Detection Method in Vehicular Ad Hoc Network

WU Hai-qin and WANG Liang-min   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对车联网网络拓扑结构变化快且相比传统移动自组网络更易受到恶意车辆发起的内部攻击等问题,在当前贝叶斯假设的信任理论研究的基础上,结合车联网高速移动中快速检测恶意节点的要求,加大否定事件的影响力度,提出了用于评估车辆节点行为的信任模型;在综合推荐信任值时,引入了“推荐信任距离”作为推荐信任的信任度量,预先排除恶意推荐意见,并有效防止车辆的串通攻击。与现有的基于信任的检测方法相比,该方法加快了检测速度,并简化了推荐传递。仿真实验表明,该方法有较快的检测速度,从网络丢包率和恶意节点检测率可以看出此信任模型对检测恶意节点具有较好的性能。

关键词: 车联网,信任模型,贝叶斯假设,推荐信任距离,网络丢包率,检测率

Abstract: With the requirement of rapid detection of malicious nodes in high-speed VANET,a trust model was proposed on the basis of bayes hypothesis,aiming at solving the issues that the topology of VANET changes quickly and is more vulnerable to malicious internal attack than traditional mobile ad-hoc network.The model intensifies the influence of negative events,to eliminate the malicious recommendations in advance and avoid collusion attack.The concept of “recommendation trust distance” is introduced as trust metric of recommendation trust when integrating recommendation trust.Compared with the current detection method based on trust,this model speeds up the detection speed and simplifies the recommend delivery.The simulation experiment shows that this trust model has rapid detection speed and good performance in detecting malicious nodes from the network packet loss rate and the detection rate of malicious nodes.

Key words: VANET,Trust model,Bayes hypothesis,Recommendation trust distance,Network packet loss rate,Detection rate

[1] Fazio P,De Rango F,Lupia A.A new application for enhancing VANET services in emergency situations using the WAVE/802.11p standard[C]∥Wireless Days(WD),2013 IFIP.IEEE,2013:1-3
[2] 乔震,刘光杰,李季,等.移动自组织网络安全接入技术研究综述[J].计算机科学,2013,0(12):1-8,0 Qiao Zhen,Liu Guang-jie,Li Ji,et al.Survey on Secure Access Technology in Mobile Ad-hoc Network[J].Computer Science,2013,0(12):1-8,0
[3] Sharma S,Mishra R,Kaur I.New trust based security approach for ad-hoc networks[C]∥2010 3rd IEEE International Con-ference on Computer Science and Information Technology(ICCSIT).Chengdu,2010,9:428-431
[4] Xia H,Jia Z,Sha E H M.Research of trust model based on fuzzy theory in mobile ad hoc networks[J].IET Information Security,2013,8(2):88-103
[5] 陈深龙,张玉清.增强ad hoc网络可生存性的健壮多维信任模型[J].通信学报,2010(5):1-9 Chen Shen-long,Zhang Yu-qing.Robust multi-dimensional trust model for improving the survivability of ad hoc networks[J].Journal on Communications,2010(5):1-9
[6] Amaresh M,Usha G.Efficient malicious detection for AODV in mobile ad-hoc network[C]∥IEEE International Conference on Recent Trends in Information Technology(ICRTIT).Chennai,2013:263-269
[7] Bhoi S K,Nayak R P,Dash D,et al.RRP:A robust routing protocol for Vehicular Ad Hoc Network against hole generation attack[C]∥IEEE International Conference on Communications and Signal Processing(ICCSP).Melmaruvathur,2013:1175-1179
[8] Bao F,Chen R,Chang M J,et al.Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection[J].IEEE Transactions on Network and Service Management,2012,9(2):169-183
[9] Josang A,Knapskog S J.A metric for trusted systems[C]∥Proceeedings of the 21st National Security Conference.1998:16-29
[10] 胡玲珑,潘巨龙,崔慧.无线传感器网络中基于信誉的恶意节点检测方法[J].中国计量学院学报,2012,3(1):41-47 Hu Ling-long,Pan Ju-long,Cui Hui.A reputation-based method for detecting malicious nodes in WSNs[J].Journal of China Ji-liang University,2012,3(1):41-47
[11] Theodorakopoulos G,Baras J S.On trust models and trust eva-luation metrics for ad hoc networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):318-328
[12] Jiang T,Baras J S.Trust Evaluation in Anarchy:A Case Study on Autonomous Networks[C]∥INFOCOM.Barcelona,Spain,2006
[13] Ding Q,Li X,Jiang M,et al.Reputation-based trust model in vehicular ad hoc networks[C]∥IEEE International Conference on Wireless Communications and Signal Processing(WCSP).Suzhou,2010:1-6
[14] Saraswat D,Chaurasia B K.AHP Based Trust Model in VANETs[C]∥2013 5th International Conference on Computational Intelligence and Communication Networks(CICN).Mathura,2013:391-393
[15] 田俊峰,鲁玉臻,李宁.基于推荐的信任链管理模型[J].通信学报,2011,2(10):1-9 Tian Jun-feng,Lu Yu-zhen,Li Ning.Trust chain management model based on recommendation[J].Journal on Communications,2011,2(10):1-9
[16] Mui L.Computational models of trust and reputation:Agents,evolutionary games,and social networks[D].Cambridge:Massachusetts Institute of Technology,2002
[17] Dellarocas C.Reputation mechanism design in online trading environments with pure moral hazard[J].Information Systems Research,2005,16(2):209-230
[18] 王良民,郭渊博,詹永照.容忍入侵的无线传感器网络模糊信任评估模型[J].通信学报,2010,31(12):37-44 Wang Liang-min,Guo Yuan-bo,Zhan Yong-zhao.Fuzzy trust model for wireless sensor networks with intrusion tolerance[J].Journal on Communications,2010,31(12):37-44

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!