Method for detecting malicious nodes of vehicle-mounted network based on assistance of an unmanned aerial vehicle

A malicious node and unmanned aerial vehicle technology, applied in specific environment-based services, vehicle wireless communication services, network topology, etc., can solve problems such as malicious attacks and rapid changes in network topology, to ensure the level of security and reduce messages energy saving effect

Pending Publication Date: 2022-01-04
GUILIN UNIVERSITY OF TECHNOLOGY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Vehicle Ad hoc Network (VANET), as a subclass of mobile ad hoc network, is widely used in intelligent transportation systems. In order to ensure the communication between vehicles, the Road Side Unit (RSU) acts as a gateway , the vehicle is equipped with an On Board Unit (OBU). The OBU is composed of sensors, processing units and communication systems, and communicates with surrounding vehicles through the IEEE 802.11 protocol. VANET can realize vehicle-to-vehicle, vehicle-to-infrastructure communication Cooperative communication helps to promote traffic safety, improve traffic efficiency, and optimize traffic management. However, due to the large number of nodes in VANET and the rapid change of network topology, VANET network is vulnerable to malicious attacks from the outside. In recent years, vehicle network security issues are increasingly becoming a hot topic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting malicious nodes of vehicle-mounted network based on assistance of an unmanned aerial vehicle
  • Method for detecting malicious nodes of vehicle-mounted network based on assistance of an unmanned aerial vehicle
  • Method for detecting malicious nodes of vehicle-mounted network based on assistance of an unmanned aerial vehicle

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the objects, technical solutions and advantages of the present invention, the present invention will be described in further detail below with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are intended to explain the present invention and is not intended to limit the invention.

[0049] refer to Figure 1 to 9A method of detecting malicious node based on drone network in the in-vehicle network, including:

[0050] Step 1: Node registration certification;

[0051] Step 2: Node communication;

[0052] Step 3: Detection of malicious nodes.

[0053] The present invention is calculated as simple, and the storage cost is relatively reliable.

[0054] The method of the present invention solves the problem of black hole attacks that cannot be effectively solved between nodes in the vehicle network communication technology, and improve the security of node communication.

[0055] The step 1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting malicious nodes of a vehicle-mounted network based on assistance of an unmanned aerial vehicle, and relates to a communication security technology of a vehicle-mounted ad hoc network. A trust model between vehicle nodes is established through direct trust and indirect trust, and then an adaptive threshold detection mechanism between the nodes is added, vehicle-level aggregation and RSU-level aggregation is performed by selecting a corresponding cluster head under the assistance of an unmanned aerial vehicle, and finally a global blacklist (GBL, Gobal black list) is generated, so that the privacy of the vehicle is protected, and malicious nodes are detected. The solution is not to evaluate the trust value of the vehicle in different time periods and then measure the variability of the evaluation, but to evaluate the trust value of the vehicle during the whole experiment, which provides greater flexibility and accuracy compared with the previously existing solution. In addition, the cluster technology based on the unmanned aerial vehicle can reduce the amount of messages exchanged between the vehicles, so that the vehicle communication in the vehicle-mounted network is more efficient.

Description

Technical field [0001] The present invention relates to an in-vehicle self-assembled communication security technology, and more particularly to a method of detecting a malicious node based on an automatic auxiliary in the in-vehicle network. Background technique [0002] Vehicle Ad Hoc Network, VaNet as a subclass of mobile self-networking, widely used in intelligent transportation systems, in which roadside units (RSU) act as a gateway in order to ensure communication between vehicles The vehicle is equipped with the on board unit, OBU, OBU consists of sensors, processing units, and communication systems, and communicates with surrounding vehicles through the IEEE 802.11 protocol. Vanet can realize vehicle and vehicle, vehicle and infrastructure. Collaboration communication, thereby helping to promote traffic safety, improve transportation efficiency and optimization traffic management, but due to the large variation of Vanet, VaNet network is vulnerable to malicious attacks fr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W12/122H04W40/32H04W4/40H04W84/18
CPCH04W12/08H04W12/122H04W40/32H04W4/40H04W84/18
Inventor 神显豪臧一豪谢晓兰秦运枝李家豪
Owner GUILIN UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products