期刊文献+

面向车联网环境的车辆行为可信决策机制 被引量:4

Trusted behavior-decision scheme of vehicles for vehicular ad-hoc network
下载PDF
导出
摘要 车联网中的车辆节点收到的信息存在虚假和伪造的可能性,极大影响了车辆节点进行正确的行为决策。通过建立一种基于不确定性理论的节点信誉度混合评估模型,对信息源节点的可信程度进行评估,结合信息源节点的信誉度,建立车辆节点行为可信决策机制,该机制采用C-means算法进行信息可信评估,辅助车辆节点根据收到信息的可信与否做出相应的行为决策。仿真结果表明,该方法提高了节点可信判断的准确率,提高了车联网中车辆节点行为决策的准确率。 It is possible that vehicular nodes in vehicular ad-hoc networks receive the false and froged messages which greatly affect the correct behavior-decision.Based on the uncertain theory,an evaluation model of reputation uncertainty theory of mixed assessment based on confidence level of the information of the source node was presented,the source node with information credibility was evaluated,and a vehicle node behavior trust decision-making mechanism was established,in which C-means algorithm was used for information trustworthiness evaluation,the auxiliary vehicle node made corresponding decisions according to the information received.Results of simulation show that the proposed method improves the accuracy of node credible judgment,and also improves the accuracy rate of vehicle node behavior decision making in car networking.
出处 《计算机工程与设计》 北大核心 2018年第1期33-37,43,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(51278058) 交通运输部应用基础研究基金项目(2014319812150) 中国博士后科学基金项目(0306-110389) 陕西省留学人员科技活动择优基金项目(2017023)
关键词 车联网 可信安全 信任评估 C-F模型 行为决策 vehicular ad-hoc networks creditable security evaluation of trustworthy C-F model behavioral decision
  • 相关文献

参考文献1

二级参考文献15

  • 1张道远,潘巨龙,徐展翼.一种改进的传感器网络分簇分层路由协议[J].中国计量学院学报,2010,21(3):241-245. 被引量:2
  • 2Adrian Perrig,Robert Szewczyk,J.D. Tygar,Victor Wen,David E. Culler.SPINS: Security Protocols for Sensor Networks[J]. Wireless Networks . 2002 (5)
  • 3YANG L S,ZHU H,WEI Y,et al.A trust evaluationframework in distributed networks:Vulnerability analysisand defense against attacks. Proceedings of 25th IEEEinternational conference on computer communications . 2007
  • 4CURICA D,BANIAS O,DRANGA O.Malicious node de-tection in wireless sensor networks using an autoregressiontechnique. Third international conference on networ-king and services (ICNS07) . 2008
  • 5ZHANG M W,YANG B,ZHANG W Z,et al.Using trust metric to detect malicious behaviors in WSNs. 8th ACIS international conference on software engineer-ing,artificial intelligence,networking,and parallel dis-tributed computing . 2007
  • 6CURIAC D I,Madalin P,BANIAS O,et al.Software de-velopment for malicious nodes discovery in wireless sensornetwork security. 4th international conference onsensor technologies and applications . 2010
  • 7FANG L,CHENG X Z,CHEN C.Insider attacker detec-tion in wireless sensor networks. 26th internationalconference on computer communications . 2007
  • 8GANERIWAL S,SRIVASTAVA M B.Reputation-basedframework for high integrity sensor networks. Pro-ceedings of the 2nd ACM workshop on Security of ad hocand sensor networks (SASN 04) . 2004
  • 9ATAKLI I M,HUHong-bing,CHEN Yu,et al.Malicious node de-tection in wireless sensor networks using weighted trust evaluation. Proc of Spring Simulation Multi Conference . 2008
  • 10W. R. Pires,T. H. P. Figueiredo,H. C. Wong,A. A. F. Loureiro.Malicious node detection in wireless sensor networks. 18th Int‘l Parallel and Distributed Processing Symp . 2004

共引文献7

同被引文献23

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部