计算机科学 ›› 2014, Vol. 41 ›› Issue (6): 89-93.doi: 10.11896/j.issn.1002-137X.2014.06.018

• 信息安全 • 上一篇    下一篇

一种车载自组织网络路况信息的数据信任模型

王光浩,吴越   

  1. 上海交通大学信息安全工程学院 上海200240;上海交通大学信息安全工程学院 上海200240
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金项目(60932003,0,61211130104)资助

Data Trust Model for Road Information in Vehicular Ad hoc Networks

WANG Guang-hao and WU Yue   

  • Online:2018-11-14 Published:2018-11-14

摘要: 动态寻路是解决城市交通拥堵的重要手段。在动态寻路中,一些车辆产生和转发路况信息,使其他车辆能够避开拥堵路段。但一般车载自组织网络寻路算法缺乏验证路况信息的真实性的措施,导致恶意车辆能轻易篡改路况信息,误导其他车辆选择错误路线。提出了一种路况信息鉴别模型,该模型将基于数据的信任模型应用到路况信息真伪的鉴别中,并在一般投票算法的基础上利用D-S理论增加不确定情况下的鲁棒性。仿真实验表明,该算法在不增加额外信息交互的前提下,有效规避了恶意伪造信息,改进了车辆的行程时间。

关键词: 动态寻路,基于数据的信任模型,Dempster-Shafer理论 中图法分类号TP309.2文献标识码A

Abstract: Dynamic routing is one of the solutions to urban traffic congestion problem.In dynamic routing plan,some vehicles are willing to produce and forward road information,so that other vehicles will analyze received information to avoid congested roads.Because of the lack of validation towards road information,malicious vehicles can tamper the road information in order to mislead other vehicles to choose the wrong route.A new trust model to verify road information was proposed.Validation towards the road information is based on data trust rather than entity trust.Dempster-Shafer theory is applied to voting algorithm to increase robustness in cases with uncertain.Simulation shows that with no additional data exchange,the model effectively detects and avoids malicious data.When looking for the right route according to route information from database,vehicles will not consider the malicious route information so that this model will help improve the vehicles’ travel time.

Key words: Dynamic routing,Data trust,Dempster-Shafer theory

[1] Nzouonta J,Rajgure N,Wang G,et al.VANET routing on city roads using real-time vehicular traffic information[J].IEEE Transactions on Vehicular Technology,2009,58(7):3609-3626
[2] Raya M,Papadimitratos P,Gligor V D,et al.On data-centrictrust establishment in ephemeral ad hoc networks[C]∥Proceedings of INFOCOM 2008.The 27th Conference on Computer Communications.Phoenix,USA,2008:1238-1246
[3] Shafer G.A mathematical theory of evidence[M].Princeton:Princeton University Press,1976
[4] Eschenauer L,Gligor V D,Baras J.On trust establishment inmobile ad-hoc networks[C]∥Proceedings of Security Protocols.Berlin,Germany,2004:47-66
[5] Sun Y L,Yu W,Han Z,et al.Information theoretic framework of trust modeling and evaluation for ad hoc networks[J].Selec-ted Areas in Communications,2006,24(2):305-317
[6] Theodorakopoulos G,Baras J S.On trust models and trust eva-luation metrics for ad hoc networks[J].Selected Areas in Communications,IEEE Journal,2006,24(2):318-328
[7] Buchegger S,Le Boudec J Y.A robust reputation system forpeer-to-peer and mobile ad-hoc networks[C]∥Proceedings of P2PEcon.Cambridge MA,USA,2004
[8] Ganeriwal S,Balzano L K,Srivastava M B.Reputation-basedframework for high integrity sensor networks[J].ACM Tran-sactions on Sensor Networks (TOSN),2008,4(3):15
[9] Mundinger J,Le Boudec J Y.Reputation in self-organized communication systems and beyond[C]∥Proceedings of the 2006workshop on Interdisciplinary systems approach in performance evaluation and design of computer & communications systems.Pisa,Italy,2006:3
[10] Zouridaki C,Mark B L,Hejmo M,et al.Robust cooperativetrust establishment for MANETs[C]∥Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks.Alexandria,VA,USA,2006:23-34
[11] Mejia M,Pea N,Muoz J L,et al.A game theoretic trust model for on-line distributed evolution of cooperation in MANETs[J].Journal of Network and Computer Applications,2011,34(1):39-51
[12] Wu A,Ma J,Zhang S.RATE:A RSU-Aided Scheme for Data-Centric Trust Establishment in VANETs[C]∥Proceedings of Wireless Communications,Networking and Mobile Computing (WiCOM).Wuhan,China,2011:1-6
[13] Gómez Mármol F,Martínez Pérez G.TRIP,a trust and reputation infrastructure-based proposal for vehicular ad hoc networks[J].Journal of Network and Computer Applications,2012,35(3):934-941
[14] Jsang A.An Algebra for Assessing Trust in CertificationChains[C]∥Proceedings of NDSS.San Diego,California,USA,1999,99:6
[15] Chen T M,Venkataramanan V.Dempster-shafer theory for intrusion detection in ad hoc networks[J].Internet Computing,IEEE,2005,9(6):35-41
[16] Siaterlis C,Maglaris B.Towards multisensor data fusion for DoS detection[C]∥Proceedings of the 2004ACM symposium on Applied computing.Nicosia,Cyprus,2004:439-446
[17] Jiang T,Baras J S.Trust Evaluation in Anarchy:A Case Study on Autonomous Networks[C]∥Proceedings of INFOCOM.Barcelona,Catalunya,Spain,2006
[18] Ostermaier B,Dotzer F,Strassberger M.Enhancing the security of local dangerwarnings in vanets-a simulative analysis of voting schemes[C]∥Proceedings of Availability,Reliability and Security.Prague,Czech,2007:422-431
[19] Sumra I A,Ahmad I,Hasbullah H,et al.Classes of Attacks in VANET[C]∥Proceedings of Electronics,Communications and Photonics Conference (SIECPC).Riyadh,Saudi Arabia,2011:1-5
[20] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceedings of Advances in Cryptology.Springer Berlin Heidelberg,1985:47-53
[21] Wegener A,Piórkowski M,Raya M,et al.TraCI:an interface for coupling road traffic and network simulators[C]∥Proceedings of 11th communications and networking simulation symposium.New York,USA,2008:155-163
[22] Behrisch M,Bieker L,Erdmann J,et al.SUMO-Simulation ofUrban MObility-an Overview[C]∥Proceedings of The Third International Conference on Advances in System Simulation(SIMUL 2011).Barcelona,Spain,2011:55-60
[23] Haklay M,Weber P.OpenStreetMap:User-Generated StreetMaps[J].IEEE Pervasive Computing,2008,7(4):12-18

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!