CN115348280A - Vehicle networking data sharing method based on trusted block chain - Google Patents

Vehicle networking data sharing method based on trusted block chain Download PDF

Info

Publication number
CN115348280A
CN115348280A CN202210737274.3A CN202210737274A CN115348280A CN 115348280 A CN115348280 A CN 115348280A CN 202210737274 A CN202210737274 A CN 202210737274A CN 115348280 A CN115348280 A CN 115348280A
Authority
CN
China
Prior art keywords
data
vehicle
block chain
cluster
noise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210737274.3A
Other languages
Chinese (zh)
Inventor
沈韬
何苗
于卓
柏粉花
张弛
刘英莉
曾凯
张巧莲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kunming University of Science and Technology
Original Assignee
Kunming University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kunming University of Science and Technology filed Critical Kunming University of Science and Technology
Priority to CN202210737274.3A priority Critical patent/CN115348280A/en
Publication of CN115348280A publication Critical patent/CN115348280A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Traffic Control Systems (AREA)

Abstract

The invention relates to a vehicle networking data sharing method based on a trusted block chain, and belongs to the technical field of vehicle networking data safety sharing. On one hand, the Laplace algorithm is reconstructed by a random response mechanism to meet the requirement of the localized differential privacy, the position data of the vehicle is disturbed by adopting the reconstructed localized differential privacy technology, and the original position data of each vehicle user is disturbed from the vehicle client; and on the other hand, the data transmitted to the data acquisition center is clustered by using a K-means clustering algorithm, so that the position information of the vehicle user is protected from being leaked while the safe and credible sharing of the data is realized. The invention has the advantages of high safety, high reliability and high efficiency.

Description

Vehicle networking data sharing method based on trusted block chain
Technical Field
The invention relates to a vehicle networking data sharing method based on a trusted block chain, and belongs to the technical field of vehicle networking data safety sharing.
Background
With the popularization of automobiles and the rapid development of the internet of things, the concept of internet of vehicles has become one of the most popular subjects today. The vehicle networking is a distributed network for realizing data sharing interaction between vehicle-vehicle, vehicle-road-information and vehicle-network platforms according to a unified communication protocol and a data interaction standard. A large number of vehicle-mounted sensors are mounted on vehicles in the Internet of vehicles, information such as various roads, traffic, weather and the like in the driving process of the vehicles can be collected in real time, and the vehicle processor shares information with other vehicles in a wireless communication mode after screening the data.
However, while the internet of vehicles is rapidly developed, a series of problems such as data leakage, data tampering, data credibility and the like are brought. The reasons for such problems in the internet of vehicles are mainly three: 1) The vehicle terminal is maliciously attacked in the data acquisition process to cause data leakage; 2) Trust issues in the vehicle data sharing process; 3) False information may be uploaded in the internet of vehicles because the user identity is not public.
At present, researchers at home and abroad have various models and methods for protecting the safety of the data of the Internet of vehicles, wherein the problems of data privacy, data credibility and the like in the Internet of vehicles are solved by utilizing the characteristics of a block chain technology, and the defects still exist.
Disclosure of Invention
The invention aims to provide a vehicle networking data sharing method based on a trusted block chain, which is used for solving the safety problem in the vehicle networking data sharing process.
The technical scheme of the invention is as follows: a vehicle networking data sharing method based on a trusted block chain comprises the following specific steps:
step1: the vehicle sensors collect weather, road, traffic condition information of the current position of the vehicle.
Step2: and the vehicle client operates a random response algorithm to generate privacy parameters of the Laplace algorithm.
Step3: and the vehicle client operates a Laplace algorithm, calls the privacy parameters generated by the random response algorithm, calculates noise, and then adds the noise to the position data to generate disturbed non-original data.
Step4: and the vehicle client sends the disturbed non-original data to a data acquisition center, and the data acquisition center executes a K-means clustering algorithm to cluster all data in the area according to the position data.
Step5: the data acquisition center transmits the center point of each cluster and all the data in the cluster to the blockchain SDK.
Step6: and the block chain SDK calls an intelligent contract to be stored in a block in the block chain network after the data in each cluster is subjected to noise reduction.
In Step2, the privacy parameter is calculated by the following formula:
Figure BDA0003716117640000021
where Δ f is a privacy parameter and p is a perturbation probability.
In Step3, the noise is calculated by the following formula:
Figure BDA0003716117640000022
wherein f (X) is original position data,
Figure BDA0003716117640000023
for added Laplace noise, ε isA privacy budget.
Noise is added into the position data of the vehicle user, so that the attack difficulty of a malicious attacker can be increased, and the position safety of the user is protected while the position privacy of the vehicle is protected.
Step4 comprises the following specific steps:
step4.1: initializing cluster number k, iteration number N, and using position data sent by a user as a data set X = { X = (X) } 1 ,x 2 ,...,x n }。
Step4.2: calculating k initialization center points mu j ,j=1,2,...,k。
Step4.3: calculating the distance D of each point in the data set D from the center point ij =||x ij || 2 ,i=1,2,...,n。
Step4.4: for distance d ij And sorting and carrying out primary clustering.
Step4.5: and re-counting new clustering centers, and circularly executing step4.2 to step4.4 until the clustering result is the same as the last clustering result.
Step4.6: finally, the cluster classification C = { C is obtained 1 ,C 2 ,...,C k }。
The invention has the beneficial effects that:
1. disturbance noise is added into the vehicle position data by using a localized differential privacy technology, so that the difficulty of attack of a malicious attacker is increased, the vehicle position privacy is protected, and the position safety of a user is protected;
2. and the data are clustered and uploaded to the block chain network by using a K-means clustering algorithm, so that the data query rate of a data consumer can be improved.
Drawings
FIG. 1 is a flow chart of the steps of the present invention;
FIG. 2 is a diagram of an architecture for trusted shared secure transmission of Internet of vehicles data in an embodiment of the present invention;
FIG. 3 is an error diagram of the centroid for the method of the present invention at different privacy budgets.
Detailed Description
The invention is further described with reference to the following drawings and detailed description.
Example 1: as shown in fig. 2, the invention provides a vehicle networking data sharing method based on a trusted block chain, which comprises three layers of structures, namely a vehicle intelligent terminal, a data acquisition center and a block chain network, wherein trusted data is transmitted in 3 layers of an intelligent vehicle networking system, and each layer of data is operated to realize different functions. The vehicle intelligent terminal collects data in the real world through a vehicle sensor, then encrypts the collected data (except position data), adds noise to the position data by using a localized differential privacy technology to disturb the original data into non-original data, then sends the disturbed non-original data to a data acquisition center, the data acquisition center clusters the collected data and then sends the clustered data to a block chain network, and a data consumer can inquire all information of the current position on the block chain network.
The block chain has the technical characteristics of data traceability, difficult tampering, openness and transparency, automatic execution of intelligent contracts and the like, and is a profit for solving the problems of multi-party collaboration and multi-party trust. A trust foundation is established between the participation prevention through a consensus mechanism, and point-to-point value transfer is realized. And the authenticity verification and audit of the data on the chain are realized through an intelligent contract. And through the setting and consensus of a cooperation mechanism and an incentive mechanism, the data open sharing and value cooperation are promoted.
Differential privacy is achieved by adding specifically distributed noise to source data or computer data to ensure that each participant cannot analyze that the data set contains a specific entity through the obtained data.
As shown in fig. 1, the specific steps are as follows:
step1: the vehicle sensors collect weather, road, traffic condition information of the current position of the vehicle.
Step2: and the vehicle client operates a random response algorithm to generate privacy parameters of the Laplace algorithm.
Step3: and the vehicle client operates a Laplace algorithm, calls the privacy parameters generated by the random response algorithm, calculates noise, and then adds the noise to the position data to generate disturbed non-original data.
Step4: and the vehicle client sends the disturbed non-original data to a data acquisition center, and the data acquisition center executes a K-means clustering algorithm to cluster all data in the area according to the position data.
Step5: the data acquisition center transmits the center point of each cluster and all the data in the cluster to the blockchain SDK.
Step6: and the block chain SDK calls an intelligent contract to be stored in a block in the block chain network after the data in each cluster is subjected to noise reduction.
In Step2, the privacy parameter is calculated by the following formula:
Figure BDA0003716117640000031
where Δ f is a privacy parameter and p is a perturbation probability.
In Step3, the noise is calculated by the following equation:
Figure BDA0003716117640000032
wherein f (X) is original position data,
Figure BDA0003716117640000033
for added Laplace noise, ε is the privacy budget.
Step4 comprises the following specific steps:
step4.1: initializing cluster number k, iteration number N, and using position data sent by a user as a data set X = { X = (X) } 1 ,x 2 ,...,x n }。
Step4.2: calculating k initialization center points mu j ,j=1,2,...,k。
Step4.3: calculating the distance D of each point in the data set D from the center point ij =||x ij || 2 ,i=1,2,...,n。
Step4.4: for distance d ij And sorting and carrying out primary clustering.
Step4.5: and re-counting new clustering centers, and circularly executing step4.2 to step4.4 until the clustering result is the same as the last clustering result.
Step4.6, finally obtaining cluster classification C = { C = { C 1 ,C 2 ,...,C k }。
Fig. 3 shows an error diagram of the centroid of the method according to the invention at different privacy budgets.
And measuring the error of the experimental result by adopting the K-means clustering centroid distance Dis before and after the experiment. The smaller the centroid change before and after the experiment, the smaller the difference between the ranges of the data set division before and after the position protection is proved to be, the closer the real result is. Before the LDP algorithm provided by the invention is used, K-means clustering is carried out on initial real data, and the clustered centroid uses C k And (4) showing. After the LDP algorithm is used, the noise-added data are subjected to K-means clustering, and the clustered centroids are C' k And (4) showing. And calculating the Euclidean distance Dis of the successive centroids under different privacy parameters epsilon, wherein the smaller the distance is, the smaller the data error is, and the higher the similarity is.
While the present invention has been described in detail with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, and various changes can be made without departing from the spirit and scope of the present invention.

Claims (4)

1. A vehicle networking data sharing method based on a trusted block chain is characterized in that:
step1: collecting weather, road and traffic condition information of the current position of a vehicle by a vehicle sensor;
step2: the vehicle client operates a random response algorithm to generate privacy parameters of a Laplace algorithm;
step3: the vehicle client operates a Laplace algorithm, calls a privacy parameter generated by a random response algorithm, calculates noise, and then adds the noise to the position data to generate disturbed non-original data;
step4: the vehicle client sends the disturbed non-original data to a data acquisition center, and the data acquisition center executes a K-means clustering algorithm to cluster all data in the area according to the position data;
step5: the data acquisition center transmits the central point of each cluster and all data in the cluster to the block chain SDK;
step6: and the block chain SDK calls an intelligent contract to be stored in a block in the block chain network after the data in each cluster is subjected to noise reduction.
2. The method for sharing data in the internet of vehicles based on the trusted block chain as claimed in claim 1, wherein in Step2, the privacy parameter is calculated by the following formula:
Figure FDA0003716117630000011
where Δ f is a privacy parameter and p is a perturbation probability.
3. The method for sharing data in the internet of vehicles based on the trusted block chain as claimed in claim 1, wherein in Step3, the noise is calculated by the following formula:
Figure FDA0003716117630000012
wherein f (X) is original position data,
Figure FDA0003716117630000013
for added Laplace noise, ε is the privacy budget.
4. The method for sharing data in the internet of vehicles based on the trusted block chain as claimed in claim 1, wherein Step4 comprises the following specific steps:
step4.1: initializing cluster number k, iteration number N, and using position data sent by a user as a data set X = { X = (X) } 1 ,x 2 ,...,x n };
Step4.2: calculating k initialization center points mu j ,j=1,2,...,k;
Step4.3: calculating the distance D of each point in the data set D from the center point ij =||x ij || 2 ,i=1,2,...,n;
Step4.4: for distance d ij Sorting and carrying out primary clustering;
step4.5: re-calculating new clustering centers, and circularly executing step4.2 to step4.4 until the clustering result is the same as the last clustering result;
step4.6: finally, the cluster classification C = { C is obtained 1 ,C 2 ,...,C k }。
CN202210737274.3A 2022-06-27 2022-06-27 Vehicle networking data sharing method based on trusted block chain Pending CN115348280A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210737274.3A CN115348280A (en) 2022-06-27 2022-06-27 Vehicle networking data sharing method based on trusted block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210737274.3A CN115348280A (en) 2022-06-27 2022-06-27 Vehicle networking data sharing method based on trusted block chain

Publications (1)

Publication Number Publication Date
CN115348280A true CN115348280A (en) 2022-11-15

Family

ID=83947882

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210737274.3A Pending CN115348280A (en) 2022-06-27 2022-06-27 Vehicle networking data sharing method based on trusted block chain

Country Status (1)

Country Link
CN (1) CN115348280A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911670A (en) * 2017-01-13 2017-06-30 重庆邮电大学 Intimacy protection system and method in a kind of car networking
CN112559593A (en) * 2020-12-14 2021-03-26 长安大学 Localized differential privacy protection method based on label clustering
CN112767693A (en) * 2020-12-31 2021-05-07 北京明朝万达科技股份有限公司 Vehicle driving data processing method and device
CN113537308A (en) * 2021-06-29 2021-10-22 中国海洋大学 Two-stage k-means clustering processing system and method based on localized differential privacy
CN113609523A (en) * 2021-07-29 2021-11-05 南京邮电大学 Vehicle networking private data protection method based on block chain and differential privacy

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911670A (en) * 2017-01-13 2017-06-30 重庆邮电大学 Intimacy protection system and method in a kind of car networking
CN112559593A (en) * 2020-12-14 2021-03-26 长安大学 Localized differential privacy protection method based on label clustering
CN112767693A (en) * 2020-12-31 2021-05-07 北京明朝万达科技股份有限公司 Vehicle driving data processing method and device
CN113537308A (en) * 2021-06-29 2021-10-22 中国海洋大学 Two-stage k-means clustering processing system and method based on localized differential privacy
CN113609523A (en) * 2021-07-29 2021-11-05 南京邮电大学 Vehicle networking private data protection method based on block chain and differential privacy

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘佳媛;邢朦;邵立琴;: "一种改进的聚类目标融合算法", 雷达与对抗, no. 04, pages 2 *

Similar Documents

Publication Publication Date Title
Levi et al. Advanced analytics for connected car cybersecurity
Dibaei et al. Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey
WO2020258060A2 (en) Blockchain-based privacy protection trust model for internet of vehicles
Limbasiya et al. A systematic survey of attack detection and prevention in connected and autonomous vehicles
Qin et al. Application of controller area network (CAN) bus anomaly detection based on time series prediction
Alharthi et al. A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET
Wang et al. TrafficChain: A blockchain-based secure and privacy-preserving traffic map
CN111988381A (en) HashGraph-based vehicle networking distributed trust system and trust value calculation method
US20220398149A1 (en) Minimizing transport fuzzing reactions
Jain et al. Improved recurrent neural network schema for validating digital signatures in VANET
Hassan Review vehicular ad hoc networks security challenges and future technology
Ahmad et al. Machine learning and blockchain technologies for cybersecurity in connected vehicles
Cheng et al. DESC-IDS: Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering
Swessi et al. A comparative review of security threats datasets for vehicular networks
Alalwany et al. Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions
US20220270411A1 (en) Device modification from transport operation
Zhou et al. A model-based method for enabling source mapping and intrusion detection on proprietary can bus
Zhou et al. CANGuard: Practical intrusion detection for in-vehicle network via unsupervised learning
Magsi et al. A machine learning-based attack detection and prevention system in vehicular named data networking
WO2024049612A1 (en) Internal certificate authority for electronic control unit
CN115348280A (en) Vehicle networking data sharing method based on trusted block chain
US20230241999A1 (en) Transport recharge level determination
Dwivedi Anomaly detection in intra-vehicle networks
Salek et al. A Hybrid Approach for Intrusion Detection in an In-vehicle Controller Area Network using Classical Convolutional Neural Network and Quantum Restricted Boltzmann Machine
Sheik et al. Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination