Malicious node detection method based on clustering trust evaluation in internet of vehicles

A technology of malicious nodes and detection methods, applied in wireless communication, network topology, electrical components, etc., can solve the problems of recommended chain length, high control and routing overhead, poor scalability, etc., to simplify the recommended chain, facilitate expansion, reduce The effect of communication overhead

Inactive Publication Date: 2014-07-30
JIANGSU UNIV
View PDF4 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this model method, the trust degree assigned by the source node to the destination node is calculated according to the trust degree of the intermediate node. When there are multiple intermediate nodes, the entire recommendation chain is relatively long and the calculation is more complicated.
In this method, all vehicle nodes are at the same level and lack unified management. When the network scale is large and the number of vehicle nodes is large, the control and routing overhead is large and the scalability is poor, and the relationship of trust over time is not considered. Therefore, it is impossible to detect the situation that the original normal node becomes a malicious node

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious node detection method based on clustering trust evaluation in internet of vehicles
  • Malicious node detection method based on clustering trust evaluation in internet of vehicles
  • Malicious node detection method based on clustering trust evaluation in internet of vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Such as figure 2 As shown, the detection method of the present invention has a total of 5 steps, namely:

[0031] (1) Clustering and cluster head selection: Initialize the network, form a cluster of nodes with less mobility among all nodes in the network, and select the node with the smallest mobility change relative to its neighbors as the cluster head;

[0032] (2) Cluster head node trust evaluation: The cluster head node is managed by the base station, and its comprehensive trust value is evaluated according to the direct trust value of the base station and the recommended trust value of other cluster head nodes; the direct trust value is the result of objective statistics, according to The number of successful and failed interactions between the base station node and the cluster head node is calculated; the recommended trust value is calculated using the packet loss rate;

[0033] (3) Trust evaluation of the member nodes in the cluster: the member nodes in the cluster are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network communication safety of the internet of vehicles, in particular to a malicious node detection method based on clustering trust evaluation in the internet of vehicles. The malicious node detection method comprises the following steps of clustering and cluster head selection; cluster head node trust evaluation; trust evaluation on member nodes in clusters; cluster trust evaluation and node trust update. A network is divided into a plurality of clusters, intra-cluster nodes are communicated, and different clusters are communicated through cluster heads. The method can adapt to a large VANET network and is good in extendibility, and the communication cost of different intra-cluster member nodes is reduced. In addition, a recommendation chain on the aspect of recommendation trust computation is simplified, and the computation is performed by directly using packet loss rate.

Description

Technical field [0001] The invention relates to the field of vehicle-linked network communication security, in particular to a malicious node detection method based on cluster trust evaluation in the vehicle-linked network. Background technique [0002] The Internet of Vehicles is a vehicle-mounted self-organizing network. It is a fast-moving broadband multi-hop wireless network used to achieve communication between vehicles and between vehicles and roadside infrastructure during the movement, so that vehicles within a certain range can communicate with each other. Exchanging each other's status information and road traffic information can not only improve traffic efficiency, but also ensure the safety of drivers. However, the openness, rapid topology change, and high degree of autonomy of the Internet of Vehicles network make it face more severe security challenges than ordinary mobile ad hoc networks, such as malicious vehicles spreading false road information, and selfish vehi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W24/08H04W84/18
Inventor 陈向益邬海琴陈龙王良民贾雪丹熊书明王新胜
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products