Journal of Shandong University(Engineering Science) ›› 2021, Vol. 51 ›› Issue (2): 74-82.doi: 10.6040/j.issn.1672-3961.0.2020.250

Previous Articles    

Application of Gossip authentication algorithm based on punishment in IOV

HUANG Qimeng, LIU Zhaowei*, DU Zhenbin   

  1. School of Computer and Control Engineering, Yantai University, Yantai 264005, Shandong, China
  • Published:2021-04-16

Abstract: Combining blockchain technology and internet of vehicles technology, a Gossip authentication algorithm based on a penalty mechanism was proposed. This method adopted a window protection mechanism to control the number of nodes in the network and avoid the destruction of consensus information due to network channel blockage. The Gossip protocol was used to ensure the efficient dissemination of information, and a penalty mechanism was proposed to reduce the number of malicious nodes in the consensus process. Algorithm analysis and experimental results showed that this method could improve the consensus efficiency of nodes while ensuring communication security, and effectively compensated the defects of identity authentication in the internet of vehicles.

Key words: blockchain, internet of vehicles, gossip protocol, punishment mechanism, identity authentication

CLC Number: 

  • TP311.13
[1] YANG Fangchun, WANG Shangguang, LI Jinglin, et al. An overview of internet of vehicles[J]. China Communications, 2014, 11(10): 1-15.
[2] 汤春明, 张永乐, 宇翔.基于BlockChain的车联网数据交换系统设计[J].天津工业大学学报, 2018,37(2):84-88. TANG Chunming, ZHANG Yongle, YU Xiang. Design of vehicle networking data exchange system based on blockchain[J]. Journal of Tianjin University of Technology, 2018, 37(2): 84-88.
[3] YU Haifeng, GIBBONS P, KAMINSKY M, et al. SybilLimit: a near-optimal social network defense against sybil attacks[J]. IEEE/ACM Transactions on Networking, 2010, 18(3): 885-898.
[4] SONI N, MALEKIAN R, ANDRIUKAITIS D, et al. Internet of vehicles based approach for road safety applications using sensor technologies[J]. Wireless Personal Communications, 2019, 105(4): 1257-1284.
[5] 宋成,张明月,彭维平,等. 车联网匿名认证方案研究[J].小型微型计算机系统,2018,39(5):899-903. SONG Cheng, ZHANG Mingyue, PENG Weiping, et al. Research on anonymous authentication scheme in VANET [J]. Journal of Chinese Mini-Micro Computer Systems, 2018, 39(5): 899-903.
[6] LI Yue, HUANG Junqin, QIN Shengzhi, et al. Big data model of security sharing based on blockchain[C] //International Conference on Big Data Computing and Communications(BIGCOM). Chengdu, China: IEEE, 2017: 117-121.
[7] YUAN Yong, WANG Feiyue. Towards blockchain-based intelligent transportation systems[C] //International Conference on Intelligent Transportation Systems(ITSC). Rio de Janeiro, Brazil: IEEE, 2016: 2663-2668.
[8] DORRI A, STEGER M, KANHERE S, et al. Block-chain: a distributed solution to automotive security and privacy[J]. IEEE Communications Magazine, 2017, 55(12): 119-125.
[9] SHARMA P K, MOON S Y, PARK J H. Block-VN: a distributed blockchain based vehicular network architecture in smart city[J]. Journal of Information Processing Systems, 2017, 13(1): 184-195.
[10] WANG Xiaoliang, ZENG Pengjie, PATTERSON N, et al. An improved authentication scheme for internet of vehicles based on blockchain technology[J]. IEEE Access, 2019, 7: 45061-45072.
[11] NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[CP/OL]. [2019-04-30]. https://bitcoin.org/bitcoin.pdf.
[12] 朱岩,甘国华,邓迪, 等.区块链关键技术中的安全性研究[J].信息安全研究,2016, 2(12): 1090-1097. ZHU Yan, GAN Guohua, DENG Di, et al. Security architecture and key technologies of blockchain[J]. Journal of Information Security Research, 2016, 2(12): 1090-1097.
[13] 袁勇, 王飞跃.区块链技术发展现状与展望[J].自动化学报, 2016, 42(4): 481-494. YUAN Yong, WANG Feiyue. Blockchain: the state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4): 481-494.
[14] 韩璇,袁勇,王飞跃.区块链安全问题:研究现状与展望[J].自动化学报,2019,45(1): 206-225. HAN Xuan, YUAN Yong, WANG Feiyue. Security problems on blockchain: the state of the art and future trends[J]. Acta Automatica Sinica, 2019, 45(1): 206-225.
[15] LI Fei, ZHANG Haoxi, GAO Lulu, et al. A set of experience-based smart synergy security mechanism in internet of vehicles[J]. Cybernetics and Systems, 2019, 50(2): 230-237.
[16] PRIYAN M K, DEVI G U. A survey on internet of vehicles: applications, technologies, challenges and opportunities[J]. International Journal of Advanced Intelligence Paradigms, 2019, 12: 98-119.
[17] COOPER M C, HERZIG A, MAFFRE F, et al. The epistemic gossip problem[J]. Discrete Mathematics, 2019,342(3): 654-663.
[18] ALTOAIMY L, ALROMIH A, AL-MEGREN S, et al. Context-aware gossip-based protocol for internet of things applications[J]. Sensors, 2018, 18(7): 2233-2256.
[19] ALLAVENA A, DEMERS A, HOPCROFT J E. Correctness of a gossip based membership protocol[C] //Proceedings of The Twenty-fourth Annual ACM Symposium on Principles of Distributed Computing. New York, US: Association for Computing Machinery, 2005: 292-301.
[20] GUREVICH M, KEIDAR I. Correctness of gossip-based membership under message loss[J]. SIAM Journal on Computing, 2010, 39(8): 3830-3859.
[21] GANESH A J, KERMARREC A, MASSOULIE L. Peer-to-peer membership management for gossip-based pro-tocols[J]. IEEE Transactions on Computers, 2003, 52(2): 139-149.
[22] HU Wei, HU Yawei, YAO Wenhui, et al. A blockchain-based byzantine consensus algorithm for information authentication of the internet of vehicles[J]. IEEE Access, 2019, 7(99):139703-139711.
[1] Zhongwei ZHANG,Hongyan MEI,Jun ZHOU,Huiping JIA. A rule extraction method based on multi-objective co-evolutionarygenetic algorithm [J]. Journal of Shandong University(Engineering Science), 2019, 49(2): 122-130.
[2] CHEN Hongxing, ZHOU Fengyu, TIAN Tian, JIANG Zhifei, CHEN Zhumin. Design of SOA interface model in service robot cloud computing platform [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(4): 31-39.
[3] ZHOU Fengyu, ZHAO Wenfei, TIAN Tian, CHEN Hongxing, CHEN Zhumin. Design and implementation of cloud storage system for accompany robot [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(5): 1-6.
[4] HUANG Siyong, CHEN Tingting, LU Qing, WU Yingjie, YE Shaozhen. Differentially privacy two-dimensional dataset partitioning publication algorithm based on kd-tree [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(1): 24-29.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!