当前位置:主页 > 科技论文 > 网络通信论文 >

车联网环境下数据融合信任模型研究

发布时间:2018-05-05 21:45

  本文选题:物联网 + 车联网 ; 参考:《长安大学》2014年硕士论文


【摘要】:随着车联网技术的应用及推广,车联网的安全问题已成为近年来的一个研究热点。而信任机制是解决车联网网络安全问题的一种有效途径,信任模型作为信任机制的核心,通过有效地度量和评估感知信息,能够反映车联网环境的动态性和不稳定性。同时,信任模型在处理信任关系和计算信誉度方面具有相当的灵活性,能够较好地适应复杂多变的车联网环境。 车联网的首要目标是保证用于采集交通信息的传感器节点能够准确、及时提供感知数据;其次,车联网需要采用数据融合技术处理海量数据以提高系统的运行效率。因此,为了保障数据融合结果的真实性与可靠性,本文就车联网数据融合过程中节点数据被伪造或篡改等安全问题进行研究。首先,深入研究了Beth和Josang两种典型的信任模型,,在分析两种模型优缺点的基础上,结合车联网的自身特性,对车联网中的直接信任关系和推荐信任关系进行了描述和度量,提出了一种新的基于节点信誉度评价的安全数据融合模型。其次,采用统计方法与KL距离理论对节点信誉度进行了综合评估,考虑信任的时衰性,在引入时间衰减因子的前提下,给出了信誉度的计算公式和信任关系表的构造方法。针对信任关系的实时变化,提出了信誉度的更新算法。最后,根据节点的信誉度,对节点进行分组融合,并就融合结果进行评估。该模型在数据融合过程中将信誉度较高的节点保留,将信誉度较低的节点摒弃,从而避免恶意节点影响融合结果。 仿真结果表明,该模型切实可行,能够精确地评估节点的信誉度,有效地识别恶意节点和恶意推荐行为,从而提高了数据融合结果的准确性和可靠性。
[Abstract]:With the application and popularization of vehicle networking technology, the safety of vehicle networking has become a research hotspot in recent years. The trust mechanism is an effective way to solve the security problem of the vehicle network. As the core of the trust mechanism, the trust model can reflect the dynamic and instability of the vehicle network environment by effectively measuring and evaluating the perceived information. At the same time, the trust model is flexible in dealing with the trust relationship and calculating the credit degree, and can adapt to the complicated and changeable vehicle networking environment. The primary goal of vehicle networking is to ensure that the sensor nodes used to collect traffic information can accurately and timely provide perceptual data. Secondly, the vehicle networking needs to use data fusion technology to process massive data in order to improve the efficiency of the system. Therefore, in order to ensure the authenticity and reliability of the data fusion results, this paper studies the security problems of node data being forged or tampered in the process of data fusion. Firstly, two typical trust models, Beth and Josang, are studied in depth. Based on the analysis of the advantages and disadvantages of the two models, the direct trust relationship and the recommended trust relationship in the vehicle networking are described and measured in combination with the characteristics of the vehicle networking. A new security data fusion model based on node reputation evaluation is proposed. Secondly, using the statistical method and KL distance theory, the credibility of nodes is evaluated synthetically. Considering the time decay of trust, the calculation formula of reputation and the construction method of trust relation table are given on the premise of introducing time attenuation factor. Aiming at the real-time change of trust relationship, a reputation updating algorithm is proposed. Finally, according to the reputation of the nodes, the nodes are grouped and fused, and the fusion results are evaluated. In the process of data fusion, the nodes with high reputation and those with low reputation are retained in the model, and the malicious nodes are avoided from affecting the fusion results. The simulation results show that the model is feasible, can accurately evaluate the reputation of nodes, and can effectively identify malicious nodes and malicious recommendation behaviors, thus improving the accuracy and reliability of data fusion results.
【学位授予单位】:长安大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP391.44;TN929.5;U495

【参考文献】

相关期刊论文 前4条

1 刘强;崔莉;陈海明;;物联网关键技术与应用[J];计算机科学;2010年06期

2 李小勇;桂小林;;可信网络中基于多维决策属性的信任量化模型[J];计算机学报;2009年03期

3 武传坤;;物联网安全架构初探[J];中国科学院院刊;2010年04期

4 沈苏彬;范曲立;宗平;毛燕琴;黄维;;物联网的体系结构与相关技术研究[J];南京邮电大学学报(自然科学版);2009年06期



本文编号:1849420

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/wltx/1849420.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户da19f***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com