期刊文献+

基于伪名的VANET恶意节点检测研究

Research on Pseudonym-based Malicious Node Detection in VANET
下载PDF
导出
摘要 针对车载自组网(VANET)节点通信时间短、实时性要求高的特点,设计一种压缩型Bloom Filter机制,并将其应用于基于伪名的VANET恶意节点检测中。该Bloom Filter机制能减少伪名恶意节点集合的数据存储量,以及节点数据更新时的信息交换量,同时获得更高的恶意节点检测率和更低的假阳性率。分析结果表明,该方法可降低VANET节点间实际传输的数据量和通信开销,提高通信实时性。 To meet the requirement of short communication time and real-time in Vehicular Ad Hoc Network(VANET), this paper designs a mechanism using compressed Bloom Filter mechanism, and realizes pseudonym-based malicious node detection in VANET. The mechanism can effectively reduce the data size of pseudonym set of malicious nodes and the exchanging information content in data updating process with lower false positive. Analysis results show that this method can reduce data transmission and correspondence expenses, and improve real-time of communication.
出处 《计算机工程》 CAS CSCD 2012年第3期130-133,136,共5页 Computer Engineering
基金 国家自然科学基金资助项目"车用AdHoc网络的隐私与安全技术研究"(60803117)
关键词 车载自组网 安全性 恶意节点检测 伪名 BLOOM Filter机制 Vehicular Ad Hoc Network(VANET) security malicious node detection pseudonym Bloom Filter mechanism
  • 相关文献

参考文献10

  • 1常促宇,向勇,史美林.车载自组网的现状与发展[J].通信学报,2007,28(11):116-126. 被引量:191
  • 2Raya M, Hubaux J P. The Security of Vehicular Ad Hoc Networks[C] //Proc. of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks. Alexandria, USA: ACM Press, 2005.
  • 3Gerlach M. VaneSe——An Approach to VANET Security[C] //Proc. of V2VCOM’05. San Diego, USA: IEEE Press, 2005.
  • 4Armknecht F, Festag A, Westhoff D, et al. Cross-layer Privacy Enhancement and Non-repudiation in Vehicular Communi- cation[C] //Proc. of WMAN’07. Bern, Switzerland: [s. n.] , 2007.
  • 5Yan Gongjun, Choudhary G, Michele C, et al. Providing VANET Security Through Active Position Detection[J]. Computer Communications, 2008, 31(2): 2883-2897.
  • 6Lysyannskaya A, Rivest R L. Pseudonym Systems[C] //Proc. of the 6th Annual International Workshop on Selected Areas in Cryptography. London, UK: Springer-Verlag, 2000: 184-199.
  • 7Byers J. Informed Content Delivery Across Adaptive Overlay Networks[J]. IEEE/ACM Transactions on Networking, 2004, 12(5): 19-23.
  • 8Ledlie J, Taylor J M, Serban L. Self-organizationin Peer-to-Peer Systems[C] //Proc. of the 10th Workshop on ACM SIGOPS European. Bordeaux, France: ACM Press, 2002.
  • 9Mitzenmacher M. Compressed Bloom Filters[J]. IEEE/ACM Transactions on Networking, 2002, 10(5): 604-612.
  • 10Witten I H, Moffat A, Bell T, et al. Managing Gigabytes[M]. 2nd ed. San Francisco, USA: Morgan Kaufmann, 1999.

二级参考文献57

共引文献190

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部