A Consensus Method for Internet of Vehicles Node Consensus Based on Malicious Node Attack Detection

A malicious node and car networking technology, applied in the blockchain field, can solve the problems of high communication delay of asynchronous network nodes, no consideration of network dynamic changes, malicious node detection, etc., to improve transaction throughput, efficient detection and defense, The effect of improving consensus efficiency

Active Publication Date: 2022-06-03
ZHEJIANG SHUREN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above researchers only studied static nodes, and did not consider the dynamic changes of the network caused by the movement of nodes in the Internet of Vehicles. It is difficult to detect malicious nodes efficiently and quickly, and cannot be directly applied to the malicious node detection of the RPCA method.
[0005] To sum up, due to the large scale of IoV data, the existing consensus methods such as DPOS, PBFT, and CDBFT in the blockchain IOV system do not take into account the dynamic and heterogeneous IOV environment, and the consensus efficiency is low and there are asynchronous The problem of high communication delay of network nodes makes it difficult for these consensus methods to be well applied in the Internet of Vehicles network
The RPCA consensus method can be efficiently applied to the nodes used every few seconds, but it is vulnerable to malicious node consensus attacks, and there are problems such as difficult identification and removal of malicious nodes, and low consensus efficiency, which makes it difficult for the existing consensus methods to safely and efficiently realize the Internet of Vehicles data consensus

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Consensus Method for Internet of Vehicles Node Consensus Based on Malicious Node Attack Detection
  • A Consensus Method for Internet of Vehicles Node Consensus Based on Malicious Node Attack Detection
  • A Consensus Method for Internet of Vehicles Node Consensus Based on Malicious Node Attack Detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] As shown in Figure 1, the present invention provides a consensus consensus method based on malicious node attack detection of IoV nodes

[0070] Step 4: Determine single-area and multi-area verification nodes through node voting; wherein,

[0076] Step 5: Verify that the node collects the credit value evaluation elements of each node in the area, and determines a trusted list; wherein,

[0077] The method for determining the trusted list specifically includes:

[0079] sc

[0085] Step 7: The verification node conducts voting consensus on the transaction in the network, and determines the transaction set; wherein,

[0086] The method for determining the transaction set specifically includes:

[0087] S7.1, each verification node continuously receives the transaction sent from the network, by verifying with the local ledger data

[0088] S7.2, after the verification node receives the transaction proposal approved by other verification nodes, it enters into the transaction can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vehicle network node consistency consensus method based on malicious node attack detection, comprising: dividing the vehicle network network into cellular single areas of the same size, and if the current consensus is the first block consensus, the nodes in the network Independently vote to select the verification node; if the current consensus is not the first block consensus, the verification node collects the credit value evaluation elements of each node in the area, determines the trustworthy list, and the verification node votes on the transaction consensus in the network to determine the transaction set; when the block consensus round reaches the threshold, a verification node with the largest computing power is selected as a multi-region detection node to conduct the first round of malicious detection; the adjacent nodes marked as candidate malicious nodes and the verification nodes in the area where they are located execute For the second round of malicious detection of malicious nodes in a single area, the previous round of verification nodes will perform authorization and suspension operations on the current round of verification nodes; the invention can effectively improve the enthusiasm of nodes to participate in block consensus.

Description

A Consensus Consensus Method for Internet of Vehicles Nodes Based on Malicious Node Attack Detection technical field The present invention relates to the technical field of block chain, be specifically related to a kind of car networking node based on malicious node attack detection Consistent consensus method. Background technique [0002] With the characteristics of decentralization and anonymity, blockchain is gradually becoming the future automation driving industry and car connection It is an integral part of the development of the Internet of vehicles industry. Among them, the consensus consensus method is block The core elements of chain technology can directly determine its transaction throughput, transaction delay and other characteristics in the application field. Internet of Vehicles Each individual vehicle can act as a node, generate a large amount of data of different types, and broadcast related data. and sharing, so as to improve the service quality ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/12
CPCH04L63/1416H04L63/145H04L67/12Y02D30/70
Inventor 陈友荣章阳任条娟陈浩刘半藤张旭东王章权
Owner ZHEJIANG SHUREN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products