计算机与现代化 ›› 2023, Vol. 0 ›› Issue (02): 96-103.

• 信息安全 • 上一篇    下一篇

基于信任计算的车载命名数据网络安全机制

  

  1. (长安大学信息工程学院,陕西 西安 710064)
  • 出版日期:2023-04-10 发布日期:2023-04-10
  • 作者简介:樊娜(1978—),女,陕西渭南人,副教授,博士,研究方向:车联网安全技术,E-mail: fnsea@chd.edu.cn; 邹小敏(1997—),女,硕士研究生,研究方向:命名数据网络安全,E-mail: 2020124138@chd.edu.cn; 李思瑞 (1998—),女,硕士研究生,研究方向:命名数据网络安全,E-mail: 2020124137@chd.edu.cn; 杨晓朵(1999—),女,硕士研究生,研究方向:命名数据网络安全,E-mail: 2021224103@chd.edu.cn。
  • 基金资助:
    陕西省重点研发计划项目(2022GY-039)

A Trusted Computing Based Secure Scheme in Vehicular Named Data Networking

  1. (School of Information Engineering, Chang’an University, Xi’an 710064, China)
  • Online:2023-04-10 Published:2023-04-10

摘要: 命名数据网络是一种以内容为中心的网络,将命名数据网络应用于车联网形成车载命名数据网络能够有效解决车联网中传统TCP/IP通信带来的局限性。然而车载命名数据网络同样面临安全风险,尤其是兴趣包洪泛攻击和开关攻击严重影响了车载命名数据网络的信息共享和安全通信。本文针对上述攻击提出一种基于信任计算的车载命名数据网络安全机制(TSSRA),首先通过分析攻击行为对网络的影响,提取识别恶意行为的特征值,然后基于特征值设计一种信任计算方法,通过评估节点的信任值区分恶意行为和合法行为。仿真实验表明,本文提出的安全机制有效抑制能恶意节点的恶意行为,增强网络的安全性,确保网络安全高效的运行。

关键词: 车载命名数据网络, 安全机制, 兴趣包洪泛攻击, 开关攻击, 信任计算

Abstract: Named data networking is a content-centered network. Applying named data networking to the Internet of vehicles to form a vehicular named data networking can effectively solve the limitations brought by traditional TCP/IP communication in the Internet of vehicles. However, vehicular named data network also faces security risks, especially interest flooding attack and on-off attack, which seriously affect the information sharing and secure communication of vehicular named data networking. Aiming at the above attacks, this paper proposed a trusted computing based secure scheme in vehicular named data networking called TSSRA. Firstly, by analyzing the impact of attack behavior on the network, the characteristic values identifying malicious behavior are extracted, and then a trusted computing method based on characteristic values is designed to separate malicious behavior from legitimate behavior by evaluating the trust value of nodes. Simulation results show that the secure mechanism proposed in this paper can effectively suppress the malicious behavior of malicious nodes, enhance the security of the network and ensure the safe and efficient operation of the network.

Key words: vehicular named data networking, secure mechanism, interest flooding attack, on-off attack, trusted computing