Journal of Xidian University ›› 2022, Vol. 49 ›› Issue (4): 49-59.doi: 10.19665/j.issn1001-2400.2022.04.007
• Information and Communications Engineering • Previous Articles Next Articles
ZHANG Haibo1,2(),BIAN Xia1,2(),XU Yongjun1(),XIANG Shengting1(),HE Xiaofan3()
Received:
2021-05-21
Online:
2022-08-20
Published:
2022-08-15
Contact:
Xia BIAN
E-mail:zhanghb@cqupt.edu.cn;634635540@qq.com;xuyj@cqupt.edu.cn;1213159840@qq.com;xiaofanhe@whu.edu.cn
CLC Number:
ZHANG Haibo,BIAN Xia,XU Yongjun,XIANG Shengting,HE Xiaofan. Blockchain-assisted vehicle reputation management method for VANET[J].Journal of Xidian University, 2022, 49(4): 49-59.
[1] |
YANG J, RAWAT D B. Vehicle-To-Vehicle Connectivity Analysis for Vehicular Ad-Hoc Networks[J]. Ad Hoc Networks, 2017, 58:25-35.
doi: 10.1016/j.adhoc.2016.11.017 |
[2] |
LEE M, ATKISON T. VANET Applications:Past,Present,and Future[J]. Vehicular Communications, 2021, 28:100310.
doi: 10.1016/j.vehcom.2020.100310 |
[3] | MOSTAFA A. VANET Blockchain:A General Framework for Detecting Malicious Vehicles[J]. J.Communications, 2019, 14(5):356-362. |
[4] |
DAEINABI A, RAHBAR A G. Detection of Malicious Vehicles (DMV) through Monitoring in Vehicular Ad-Hoc Networks[J]. Multimedia Tools and Applications, 2013, 66(2):325-338.
doi: 10.1007/s11042-011-0789-y |
[5] | 杨哲. 面向车联网的安全机制与关键技术研究[D]. 北京: 北京邮电大学, 2019. |
[6] |
HUSSAIN R, LEE J, ZEADALLY S. Trust in VANET:A Survey of Current Solutions and Future Research Opportunities[J]. IEEE Transactions on Intelligent Transportation Systems, 2020, 22(5):2553-2571.
doi: 10.1109/TITS.2020.2973715 |
[7] |
TANGADE S, MANVI S S, LORENZ P. Decentralized and Scalable Privacy Preserving Authentication Scheme in VANETs[J]. IEEE Transactions on Vehicular Technology, 2018, 67(9):8647-8655.
doi: 10.1109/TVT.2018.2839979 |
[8] |
LAMSSAGGAD A, BENAMAR N, HAFID A S, et al. A Survey on The Current Security Landscape of Intelligent Transportation Systems[J]. IEEE Access, 2021, 9:9180-9208.
doi: 10.1109/ACCESS.2021.3050038 |
[9] | SU S, TIAN Z, LIANG S, et al. A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks[J]. IEEE Wireless Communications, 2020, 27(3):46-52. |
[10] | RAYA M, PAPADIMITRATOS P, GLIGOR V D, et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks[C]// IEEE INFOCOM 2008-The 27th Conference on Computer Communications.Piscataway:IEEE, 2008:1238-1246. |
[11] | DEBRUHL B, WEERAKKODY S, SINOPOLI B, et al. Is Your Commute Driving You Crazy? A Study of Misbehavior in Vehicular Platoons[C]// Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: ACM, 2015:1-11. |
[12] | MOREIRA E. An Evaluation of Reputation with Regard to the Opportunistic Forwarding of Messages in VANETs[J]. EURASIP Journal on Wireless Communications and Networking, 2019, 1:1-14. |
[13] |
XIAO Y G, LIU Y B. Bayes Trust and Vehicle Rank:Constructing An Implicit Web of Trust in VANET[J]. IEEE Transactions on Vehicular Technology, 2019, 68(3):2850-2864.
doi: 10.1109/TVT.2019.2894056 |
[14] |
AHMAD F, KURUGOLLU F, ADNANE A, et al. MARINE:Man-in-The-Middle Attack Resistant Trust Model in Connected Vehicles[J]. IEEE Internet of Things Journal, 2020, 7(4):3310-3322.
doi: 10.1109/JIOT.2020.2967568 |
[15] | SHRESTHA R, BAJRACHARYA R, NAM S Y. Centralized Approach for Trustworthy Message Dissemination in VANET[C]// NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium.Piscataway:IEEE, 2018:1-5. |
[16] | 杨颜博, 张嘉伟, 马建峰. 一种使用区块链保护车联网数据隐私的方法[J]. 西安电子科技大学学报, 2021, 48(3):21-30. |
YANG Yanbo, ZHANG Jiawei, MA Jianfeng. Method Forcusing the Blockchain to Protect Data Privacy of IoV[J]. Journal of Xidian University, 2021, 48(3):21-30. | |
[17] |
BELLINI E, IRAQI Y, DAMIANI E. Blockchain-Based Distributed Trust and Reputation Management Systems:A Survey[J]. IEEE Access, 2020, 8:21127-21151.
doi: 10.1109/ACCESS.2020.2969820 |
[18] | LU Z J, WANG Q, QU G, et al. Bars:A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs[C]// 2018 17th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering.Piscataway:IEEE, 2018:98-103. |
[19] |
YANG Z, YANG K, LEI L, et al. Blockchain-Based Decentralized Trust Management in Vehicular Networks[J]. IEEE Internet of Things Journal, 2018, 6(2):1495-1505.
doi: 10.1109/JIOT.2018.2836144 |
[20] | JOSANG A, HAYWARD R, POPE S. Trust Network Analysis with Subjective Logic[C]// Conference Proceedings of the Twenty-Ninth Australasian Computer Science Conference.Australian Computer Society.Piscataway:IEEE, 2006:85-94. |
[21] |
LIU G, YANG Q, WANG H, et al. Trust Assessment in Online Social Networks[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 18(2):994-1007.
doi: 10.1109/TDSC.2019.2916366 |
[22] |
KANG J W, YU R, HUANG X M, et al. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks[J]. IEEE Internet of Things Journal, 2018, 6(3):4660-4670.
doi: 10.1109/JIOT.2018.2875542 |
[23] | LIU G C, YANG Q, WANG H G, et al. Assessment of Multi-Hop Interpersonal Trust in Social Networks by Three-Valued Subjective Logic[C]// IEEE INFOCOM 2014-IEEE Conference on Computer Communications.Piscataway:IEEE, 2014:1698-1706. |
[24] | 谭帅帅. 信任管理研究及其在保护移动自组织网安全中的应用[D]. 西安: 西安电子科技大学, 2016. |
[25] | LIU G C, CHEN Q, YANG Q, et al. Opinionwalk:An Efficient Solution to Massive Trust Assessment in Online Social Networks[C]// IEEE INFOCOM 2017-IEEE Conference on Computer Communications.Piscataway:IEEE, 2017:1-9. |
[26] | BAI J B, LI H B, CHEN J P. Multiple Star Node Discovery Algorithm in Social Network Based on Six Degrees of Separation and Greedy Strategy[J]. Recent Trends in Intelligent Computing,Communication and Devices, 2020:623-632. |
[27] |
SOMMER C, GERMAN R, DRESSLER F. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis[J]. IEEE Transactions on Mobile Computing, 2010, 10(1):3-15.
doi: 10.1109/TMC.2010.133 |
[28] |
CHENG T, LIU G C, YANG Q, et al. Trust Assessment in Vehicular Social Network Based on Three-Valued Subjective Logic[J]. IEEE Transactions on Multimedia, 2019, 21(3):652-663.
doi: 10.1109/TMM.2019.2891417 |
[1] | ZENG Huixiang,XI Ning,XIE Qingqing,LV Jing,CUI Zhihao,MA Jianfeng. Decentralized ciphertext sharing based on blockchain [J]. Journal of Xidian University, 2022, 49(2): 135-145. |
[2] | PAN Senshan,XU Lamei. DorChain:Utilization of dormant coins to improve the transaction verification efficiency [J]. Journal of Xidian University, 2022, 49(2): 182-189. |
[3] | LI Xuelian,ZHANG Xiachuan,GAO Juntao,XIANG Dengmei. Blockchain data sharing scheme supporting attribute and proxy re-encryption [J]. Journal of Xidian University, 2022, 49(1): 1-16. |
[4] | DU Ruizhong,WANG Yi,TIAN Junfeng. Support dynamic and verifiable scheme for ciphertext retrieval [J]. Journal of Xidian University, 2022, 49(1): 35-46. |
[5] | YANG Yanbo,ZHANG Jiawei,MA Jianfeng. Method for using the blockchain to protect data privacy of IoV [J]. Journal of Xidian University, 2021, 48(3): 21-30. |
[6] | CHAI Yanna,LI Kunlun,SONG Huansheng. On the security of the intrusion detection system in smart vehicles [J]. Journal of Xidian University, 2021, 48(3): 31-39. |
[7] | LI Jinze,WANG Zhonghao,LI Mengheng,QIN Tuanfa. Spectrum sharing management method for the small-area-blockchain based on district partition [J]. Journal of Xidian University, 2020, 47(6): 122-130. |
[8] | SI Chengxiang,GAO Feng,ZHU Liehuang,GONG Guopeng,ZHANG Can,CHEN Zhuo,LI Ruiguang. Covert data transmission mechanism based on dynamic label in blockchain [J]. Journal of Xidian University, 2020, 47(5): 94-102. |
[9] | CHEN Siji,ZHAI Sheping,WANG Yijing. Blockchain privacy protection algorithm based on ring signature [J]. Journal of Xidian University, 2020, 47(5): 86-93. |
[10] | XIE Yixi,JI Lixin. Blockchain-based bio-inspired distributed detection approach [J]. Journal of Xidian University, 2020, 47(5): 70-76. |
[11] | MA Shiyang,DONG Xuewen,QUAN Yining,TONG Wei,YANG Lingxiao. Method for evaluation of web services compatibility based on the blockchain’s consensus algorithm [J]. Journal of Xidian University, 2020, 47(5): 63-69. |
[12] | LIU Naian,CHEN Zhihao,LIU Guokun,LI Yang. Mechanism for proof-of-reputation consensus for blockchain validator nodes [J]. Journal of Xidian University, 2020, 47(5): 57-62. |
[13] | LI Han,ZHANG Chen,HUANG Hejiao,GUO Yu. Algorithm for encrypted search with forward secure updates and verification [J]. Journal of Xidian University, 2020, 47(5): 48-56. |
[14] | WANG Jiaheng,LE Yuwei,ZHANG Bowen,GUO Ruiwei,GAO Zheng,WANG Ziyue,LING Xintong. Blockchain radio access network:a new architecture for future mobile communications [J]. Journal of Xidian University, 2020, 47(5): 3-10. |
[15] | WANG Hui,WANG Licheng,BAI Xue,LIU Qinghua,SHEN Xiaoying. Research on key technology of blockchain privacy protection and scalability [J]. Journal of Xidian University, 2020, 47(5): 28-39. |
|