当前位置: X-MOL 学术IEEE Internet Things J. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Proof of Travel for Trust-Based Data Validation in V2I Communication
IEEE Internet of Things Journal ( IF 8.2 ) Pub Date : 1-16-2023 , DOI: 10.1109/jiot.2023.3236623
Dajiang Suo 1 , Baichuan Mo 2 , Jinhua Zhao 3 , Sanjay E. Sarma 1
Affiliation  

Previous work on misbehavior detection and trust management for vehicle-to-everything (V2X) communication security is effective in identifying falsified and malicious V2X data. Each vehicle in a given region can be a witness to report on the misbehavior of other nearby vehicles, which will then be added to a “blacklist.” However, there may not exist enough witness vehicles that are willing to opt-in in the early stage of connected-vehicle deployment. In this article, we propose a “whitelisting” approach to V2X security, titled proof-of-travel (POT), which leverages the support of roadside infrastructure. Our goal is to transform the power of cryptography techniques embedded within vehicle-to-infrastructure (V2I) protocols into game-theoretic mechanisms to incentivize connected-vehicle data sharing and validate data trustworthiness simultaneously. The key idea is to determine the reputation and the contribution made by a vehicle based on its distance traveled and the information it shared through V2I channels. In particular, the total vehicle miles traveled for a vehicle must be testified by digital signatures signed by each infrastructure component along the path of its movement. While building a chain of proofs of spatial movement creates burdens for malicious vehicles, acquiring proofs does not result in extra costs for normal vehicles, which naturally want to move from the origin to the destination. The POT protocol is used to enhance the security of previous voting-based data validation algorithms for V2I crowdsensing applications. For the POT-enhanced voting, we prove that all vehicles choosing to cheat are not a pure Nash equilibrium using game-theoretic analysis. Simulation results suggest that the POT-enhanced voting is more robust to malicious data.

中文翻译:


V2I 通信中基于信任的数据验证的旅行证明



先前针对车对万物 (V2X) 通信安全的不当行为检测和信任​​管理的工作可有效识别伪造和恶意的 V2X 数据。特定区域内的每辆车都可以作为见证人报告附近其他车辆的不当行为,然后将其添加到“黑名单”中。然而,在联网车辆部署的早期阶段,可能没有足够的见证车辆愿意选择加入。在本文中,我们提出了一种名为“旅行证明”(POT) 的 V2X 安全“白名单”方法,该方法利用路边基础设施的支持。我们的目标是将车辆到基础设施 (V2I) 协议中嵌入的加密技术的力量转化为博弈论机制,以激励联网车辆数据共享并同时验证数据的可信度。关键思想是根据车辆的行驶距离和通过 V2I 渠道共享的信息来确定车辆的声誉和贡献。特别是,车辆行驶的总里程必须通过其移动路径上每个基础设施组件签署的数字签名来证明。虽然建立空间移动证明链会给恶意车辆带来负担,但获取证明不会给普通车辆带来额外成本,因为普通车辆自然希望从出发地移动到目的地。 POT 协议用于增强之前用于 V2I 众感知应用的基于投票的数据验证算法的安全性。对于 POT 增强投票,我们使用博弈论分析证明所有选择作弊的车辆都不是纯粹的纳什均衡。仿真结果表明,POT 增强投票对恶意数据具有更强的鲁棒性。
更新日期:2024-08-22
down
wechat
bug