Paper
11 October 2023 A subjective logic-based reputation management scheme for highway Internet of Vehicles
Tianxiang Zhang, Leixiao Li, Dongjiang Liu, Qin Si
Author Affiliations +
Proceedings Volume 12918, Fourth International Conference on Computer Science and Communication Technology (ICCSCT 2023); 129181K (2023) https://doi.org/10.1117/12.3009257
Event: International Conference on Computer Science and Communication Technology (ICCSCT 2023), 2023, Wuhan, China
Abstract
With the widespread application of blockchain technology on the Internet of Vehicles (IoV), numerous Blockchain-based IoV (BIoV) solutions have emerged. As one of the important application scenarios of IoV, highway needs a highly reliable reputation management scheme to ensure secure data sharing. To solve the problems of privacy leakage and hostile attacks caused by the lack of trust between nodes in the highway BIoV scenario, a reputation management scheme for Highway Internet of Vehicles based on subjective logic (HISL) is proposed. Under the condition of low transmission rate of highway packets, real-time reputation update can effectively prevent malicious nodes. In addition, our system model ensures privacy security and data integrity in the highway IoV environment and effectively improves data sharing efficiency. The performance analysis results show that the HISL solution can detect the disguised malicious nodes in a shorter time, thus effectively solving the security problem in highway and even more IoV scenarios.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Tianxiang Zhang, Leixiao Li, Dongjiang Liu, and Qin Si "A subjective logic-based reputation management scheme for highway Internet of Vehicles", Proc. SPIE 12918, Fourth International Conference on Computer Science and Communication Technology (ICCSCT 2023), 129181K (11 October 2023); https://doi.org/10.1117/12.3009257
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data modeling

Blockchain

Computer security

Systems modeling

Internet

Network security

Logic

Back to Top