1.Administrative Office, Inner Mongolia University of Technology, Hohhot 010051, China
2.School of Cyberspace Security (School of Cryptology), Hainan University, Haikou 570228, China
Show less
文章历史+
Received
Accepted
Published
2023-10-07
Issue Date
2025-10-27
PDF (4290K)
摘要
安全的车联网访问控制,有助于解决车联网中数据易被篡改、易泄露和访问控制单一化的问题。针对上述问题提出一种车联网访问控制方案。首先,利用全局区块链对数据与访问策略进行有效存储。其次,设计了一个基于区块链的车联网信任评估方案(blockchain based trust evaluation,BBTE),将推荐信任划分为三类,利用Critic得出三种推荐信任的最优权重,并通过本地区块链协助RSU计算最终信任值。再次,利用NS3仿真平台验证方法的安全性和准确性,计算对恶意节点识别的准确度和检出率。最后,构造层级访问控制策略,并通过剪枝技术进一步优化。结果表明,该方案在当下车联网环境中可以应对多种恶意攻击,并且在不同环境下对恶意节点的识别率都有良好的表现,所构建的访问策略能够有效降低车辆的计算和传输开销,同时达到了多角色的访问需求。
Abstract
Secure access control in the internet of vehicles (IoV) can effectively address issues such as data tampering, leakage, and the simplification of access control mechanisms. To tackle these challenges, we propose an IoV access control scheme. Firstly, a global blockchain is utilized to efficiently store data and access policies. Secondly, a blockchain-based trust evaluation (BBTE) scheme for IoV is designed, which categorizes recommended trust into three types. The optimal weights for these three types of recommended trust are derived using the CRITIC method, and the final trust value is computed with the assistance of roadside units (RSU) through local blockchains. Thirdly, the NS3 simulation platform is employed to verify the security and accuracy of the proposed method, calculating the accuracy and detection rate for identifying malicious nodes. Lastly, a hierarchical access control policy is constructed and further optimized through pruning techniques. The results demonstrate that this scheme can withstand various malicious attacks in current IoV environments and exhibits excellent performance in identifying malicious nodes across different settings. The constructed access policy effectively reduces computational and transmission overheads for vehicles while satisfying multi-role access requirements.
车联网(internet of vehicles,IoV)利用无线通信技术在车辆之间共享信息,有助于实现自动驾驶并维护交通安全。通过V2V(vehicle-to-vehicle)与V2I(vehicle-to-infrastructure)等技术,对道路阻塞和移动轨迹等信息进行交互,营造安全的驾驶环境[1]。为防止不法分子窃听和篡改信息,信息交互必须保证数据的完整性与安全性,否则容易受到恶意攻击而导致交通事故,此类恶意攻击包括重播、伪装、消息篡改等[2]。故需实施有效的访问控制来管理车联网中的信息资源。
1 相关研究
1.1 区块链在车联网访问控制中的应用
自20世纪70年代以来,已有许多访问控制方法用于实现访问控制。例如,文献[3]将基于角色的访问控制(role-based access control,RBAC)通过智能合约实现,但RBAC是一个静态模型,这使得它难以适应IoV设备的频繁变化。刘雪娇等[4]提出基于属性的访问控制(attributes based access control,ABAC)管理链上数据,建立了一种多属性层级访问控制策略,通过权重属性基加密方式来简化访问控制策略的繁琐程度,但无法实现对车辆可信度的控制。Nakamura等[5]提出了一种基于权能的访问控制(ca-pability-based access control,CapBAC)方案,该方案使用智能合约来存储和管理能力令牌,即维护用户在特定资源上的允许动作的特殊数据结构,但CapBAC更侧重于解决IoV动态的网络拓扑结构问题。以上文献未考虑恶意节点的识别以及链上数据的可信性,恶意节点可能发送虚假或者错误信息,数据的可靠性与安全性无法得到保证。
1.2 信任计算发展现状
利用信任管理机制,可以有效地识别节点的可信程度,信任值越高,节点发布的消息越可信。Chen等[6]构建了一个由双层区块链构成的数据共享系统,并设计了一个合理的信任评估方案,它通过组合负共享记录和正共享记录来对不同提供商的服务质量进行评分。Kang等[7]提出了一个基于联盟区块链的IoV数据共享系统,采用三权重主观逻辑模型来精细化管理车辆的信誉度,车辆可根据信誉度的高低选择最适合的数据提供商和更可靠的数据源,提高数据可信度。目前,已有大量研究讨论了车联网中节点安全增强的问题,文献[8]利用区块链整合车联网架构,在面对复杂的车辆环境时,考虑到区块链节点的信任属性以及共识节点的数量,采用拜占庭容错(practical Byzantine fault tolerance,PBFT)算法来实现共识,保证节点的安全性。文献[9]提出了一种基于区块链技术的车载网络去中心化信任管理系统,节点在搭建好的区块链系统上部署智能合约并采用工作量证明共识(proof of work,PoW)算法作为基础,在RSU上计算相关车辆的信任值,并协作维护更新信任区块链,实现安全的数据共享。
1.3 属性基加密
属性基加密(ciphertext policy attribute based encryption,CP-ABE)具备细粒度访问控制功能,能够实现对密文的精细策略控制。密文策略的属性基加密可由用户制定访问控制策略,只有属性集合与访问结构相符合,才能成功解密密文得到明文,以此实现IoV数据细粒度的访问控制。因其属性数目越多,复杂度越高,加解密开销随策略复杂度的增加而线性增加,存在计算开销大的缺陷。采用CP-ABE方案和多链平台相结合,以高效、细粒度、透明和可追溯的方式实现轻松安全的访问控制[10]。
夏辉等[11]采用基于熵权的模糊层次分析法来确定三种推荐信任最优权重,但没有考虑数据之间的关系,本文采用Critic权重法来确定三种推荐信任最优权重,Critic权重法是一种比熵权法更好的客观赋权法,主要是利用数据的波动性或者数据之间的关系情况进行权重计算。用表示车辆节点样本个数,表示推荐信任的评价指标个数,本文中推荐信任的评价指标分别为直接、间接、陌生推荐信任,即,生成初始指标指数矩阵 X :
YUB, BAIF. PYRAMID: probabilistic content reconciliation and prioritization for V2V communications[J].IEEE Transactions on Vehicular Technology, 2018, 67(7): 6615-6626.
[2]
SHARMAS, SHARMAA, GOELT, et al. Smart home gardening management system: a cloud-based internet-of-things (IoT) application in VANET[C]//2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT). Kharagpur, India: IEEE, 2020: 1-5.
[3]
XUEY J, XUEK P, GAIN. An attribute-based controlled collaborative access control scheme for public cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(11): 2927-2942.
NAKAMURAY, ZHANGA A, SASABEM, et al. Capability-based access control for the internet of things: an ethereum blockchain-based scheme[C]//2019 IEEE Global Communications Conference (GLOBECOM). Waikoloa, HI, USA: IEEE, 2019: 1-6.
[6]
CHENC, WANGC, QIUT, et al. A secure content sharing scheme based on blockchain in vehicular named data networks[J]. IEEE Transactions on Industrial Informatics, 2020, 16(5): 3278-3289.
[7]
KANGJ W, YUR, HUANGX M, et al. Blockchain for secure and efficient data sharing in vehicular edge computing and networks[J]. IEEE Internet of Things Journal, 2019, 6(3): 4660-4670.
[8]
ZHANGD, YUF R, YANGR. Blockchain-based distributed software-defined vehicular networks: a dueling deep Q-learning approach[J]. IEEE Transactions on Cognitive Communications and Networking, 2019, 5(4): 1086-1100.
[9]
YANGZ, YANGK, LEIL, et al. Blockchain-based decentralized trust management in vehicular networks[J]. IEEE Internet of Things Journal, 2019, 6(2): 1495-1505.
[10]
PORWALS, MITTALS. Design of concurrent ciphertext policy-attribute based encryption library for multilevel access of encrypted data[C]//2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC). Solan, India: IEEE, 2018: 42-47.
LIW J, SONGH B. ART: an attack-resistant trust management scheme for securing vehicular Ad Hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(4): 960-969.
[13]
RAGHU VAMSI KRISHNAT, BARNWALR P, GHOSHS K. CAT: consensus-assisted trust estimation of MDS-equipped collaborators in vehicular Ad-Hoc network[J]. VEHICULAR COMMUNICATIONS, 2015, 2(3): 150-157.
[14]
FANK, PANQ, ZHANGK, et al. A secure and verifiable data sharing scheme based on blockchain in vehicular social networks[J]. IEEE Transactions on Vehicular Technology, 2020, 69(6): 5826-5835.