Authentication Mechanism and Trust Model for Internet of Vehicles Paradigm

被引:0
|
作者
Liu Y.-B. [1 ]
Song X.-L. [1 ]
Xiao Y.-G. [1 ]
机构
[1] Chongqing Key Laoratory of Network Information Security Technology, Chongqing University of Posts and Telecommunications, Chongqing
来源
| 1600年 / Beijing University of Posts and Telecommunications卷 / 40期
关键词
Authentication mechanism; Internet of vehicles; Multi-communication scenarios; Trust model;
D O I
10.13190/j.jbupt.2017.03.001
中图分类号
学科分类号
摘要
The internet of vehicles paradigm aims to achieve efficient management, decision-making and control of intelligent transportation through real-time perception among humans, vehicles, roadside units and trusted center. Currently, the authentication mechanism and trust model have become one of the research focus difficulties of internet of vehicles security. The main problem is that the authentication mechanism and trust model only consider one single aspect of security performance, which cannot satisfy the diversified security demands of multi-communication scenarios. In order to address this problem, the article proposes an authentication methodology and a trust model oriented to internet of vehicles multi-communication scenarios. The basic idea of research work involves three aspects. Firstly, the research status and achievements of the methodology and trust model under multi-communication scenarios was summarized. Secondly, the outline of new research directions was drawn, the intrinsic characters of authentication was studied, the authentication mechanism as well as the theoretical framework based on gradient security demands was constructed, and the related protocols to achieve diversified authentication services for different scenarios from the view of security, timeliness and privacy was designed. Thirdly, message-based and behavior-based dynamic trust model was given to provide strong real-time and high accurate trust evaluation, which can offer technical support for malicious nodes detecting, Finally, the internet of vehicles paradigm is likely to run in the quantum communication environment in the future, the threshold quantum anonymous authentication and the research direction of quantum trust evolution decision mechanism. The authors also evaluate the security for related research techniques and look ahead the future development. © 2017, Editorial Department of Journal of Beijing University of Posts and Telecommunications. All right reserved.
引用
收藏
页码:1 / 18
页数:17
相关论文
共 50 条
  • [41] Chen L., Ng S.L., Wang G., Threshold anonymous announcement in VANETs, IEEE Journal on Selected Areas in Communications, 29, 3, pp. 605-615, (2011)
  • [42] Calandriello G., Papadimitratos P., Hubaux J.P., Et al., On the performance of secure vehicular communication systems, IEEE Transactions on Dependable & Secure Computing, 8, 6, pp. 898-912, (2012)
  • [43] Li Q., Chen M., Perc M., Et al., Effects of adaptive degrees of trust on coevolution of quantum strategies on scale-free networks, Scientific Reports, 3, 42, pp. 2949-2956, (2013)
  • [44] Yukalov V.I., Sornette D., Quantum decision theory as quantum theory of measurement, Physics Letters A, 372, 46, pp. 6867-6871, (2009)
  • [45] Ashtiani M., Azgomi M.A., A formulation of computational trust based on quantum decision theory, Information Systems Frontiers, 18, 4, pp. 735-764, (2016)
  • [46] Chen F., Gui X., Research on dynamic trust-level evaluation mechanism based on machine learning, Journal of Computer Research and Development, 44, 2, pp. 223-229, (2007)
  • [47] Lin C., Wang Y., Yang Y., Qu Y., Research on network dependability analysis methods based on stochastic petri net, Acta Electronica sinica, 34, 2, pp. 322-332, (2006)
  • [48] Li X., Gui X., Trust quantitative model with multiple decision factors in trusted network, Chinese Journal of Computers, 32, 3, pp. 405-416, (2009)
  • [49] Shen S., Ma X., Jiang H., Li W., Cao Q., Evolutionary game theory based trust strategy model and dynamics analysis in wireless sensor networks, Control and Decision, 27, 8, pp. 1133-1138, (2012)
  • [50] Wei Z., Zhou W., Ren X., Et al., A strategy-proof trust based decision mechanism for pervasive computing environments, Chinese Journal of Computers, 35, 5, pp. 871-882, (2012)