首页 | 本学科首页   官方微博 | 高级检索  
     

车联网环境下基于重复博弈的恶意车辆节点检测机制
引用本文:董文远,朱研,王永红,张光华. 车联网环境下基于重复博弈的恶意车辆节点检测机制[J]. 计算机应用研究, 2020, 37(5): 1497-1501
作者姓名:董文远  朱研  王永红  张光华
作者单位:河北科技大学 信息科学与工程学院,石家庄050018;承德石油高等专科学校 计算机与信息工程系,河北 承德067000
基金项目:国家自然科学基金;河北省高等学校科学技术研究项目;国家重点研发计划
摘    要:针对车联网内部存在的虚假信息攻击,以及节点动态变化快及密集程度不同造成的恶意车辆节点检测机制效率低下,提出了一种基于重复博弈的恶意车辆节点检测机制。首先,根据车辆在信息交互中的行为建立重复博弈模型,并利用生成的节点收益计算出信任值与动态阈值,经二者比较,筛选出可疑的恶意车辆节点;其次,通过权值投票算法从可疑的恶意车辆节点中判定出恶意车辆节点;最后,从邻居列表中选取信任值最高的下一跳车辆节点进行合作。仿真和分析表明,与现有的相关机制相比,该机制提高了对虚假信息攻击的检测率,降低了误检率。

关 键 词:重复博弈  虚假信息攻击  投票算法  检测率  误检率
收稿时间:2018-11-18
修稿时间:2020-03-15

Malicious vehicle node detection mechanism based on repeated game in VANET
Dong Wenyuan,Zhu Yan,Wang Yonghong and Zhang Guanghua. Malicious vehicle node detection mechanism based on repeated game in VANET[J]. Application Research of Computers, 2020, 37(5): 1497-1501
Authors:Dong Wenyuan  Zhu Yan  Wang Yonghong  Zhang Guanghua
Affiliation:College of Information Science and Engineering,Hebei University of Science and Technology,,,
Abstract:In view of Internet of vehicles within the false information attack, and inefficiency of malicious vehicle nodes detection mechanism caused by fast node dynamic change and intensive different, this paper proposed a malicious nodes vehicle detection mechanism based on repeated game. Firstly, according to the behaviors of the vehicle in the information interaction it established the repeated game mode, and used the generated node income to calculate the trust value and the dynamic threshold. By comparison, it screened out the suspicious malicious vehicle nodes. Secondly, it identified the malicious nodes vehicles by weights of voting algorithm from suspected malicious nodes vehicles. Finally, it selected the next-hop vehicle node with the highest trust value from the neighbor list to cooperate. Simulation and analysis show that compared with the existing mechanism, this mechanism improves the detection rate of false information attack, reduces the error detection rate.
Keywords:repeated game   false information attack   voting algorithm   detection rate   error detection rate
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号