Volume 22 Issue 4
Aug.  2022
Turn off MathJax
Article Contents
SHANGGUAN Wei, ZHA Yuan-yuan, FU Yao, ZHENG Si-fa, CHAI Lin-guo. Vehicle-infrastructure cooperative credible interaction method based on traffic business characteristics understanding[J]. Journal of Traffic and Transportation Engineering, 2022, 22(4): 348-360. doi: 10.19818/j.cnki.1671-1637.2022.04.027
Citation: SHANGGUAN Wei, ZHA Yuan-yuan, FU Yao, ZHENG Si-fa, CHAI Lin-guo. Vehicle-infrastructure cooperative credible interaction method based on traffic business characteristics understanding[J]. Journal of Traffic and Transportation Engineering, 2022, 22(4): 348-360. doi: 10.19818/j.cnki.1671-1637.2022.04.027

Vehicle-infrastructure cooperative credible interaction method based on traffic business characteristics understanding

doi: 10.19818/j.cnki.1671-1637.2022.04.027
Funds:

National Key Research and Development Program of China 2018YFB1600600

Science and Technology Research and Development Program of China Railway N2021G045

More Information
  • Author Bio:

    SHANGGUAN Wei(1979-), male, professor, PhD, wshg@bjtu.edu.cn

  • Received Date: 2021-12-12
    Available Online: 2022-10-08
  • Publish Date: 2022-08-25
  • For the credible information interaction in vehicle-infrastructure cooperative environments, the processes of vehicle-vehicle and vehicle-infrastructure cooperative information interaction and the interaction requirements of different modes were analyzed, and a vehicle-infrastructure cooperative credible interaction framework was designed. A model of vehicle behavior state deduction and one of path perturbation factor quantification were constructed. A credibility calculation method for the vehicle object and level evaluation rules were designed. The credible authentication of vehicle object behavior was thereby achieved. A quantification model for the message urgency was built by understanding the effective traffic business characteristics. The low-resolution filtering strategy was used to preliminarily filter the message, and the message content was deeply understood on the basis of the support vector machine (SVM), thereby obtaining a multi-resolution interactive content cognition method. The Veins with OMNeT++ and SUMO simulators was used to build a simulation test environment. Simulation tests were carried out in open roads and intersection scenarios with different penetration rates of connected and automated vehicles (CAVs). The proposed vehicle-infrastructure cooperative credible interaction method was tested and verified. Research results show that the credibility identification for the vehicle-infrastructure cooperative information interaction can be effectively improved by understanding the traffic business characteristics. The average cognitive accuracy for the beacon location message achieved by the proposed method is 90.91%. It is 8.68% higher than that of the credible interaction method based on the timeliness detection. In the credible interaction verification experiment on the safety efficiency message, as the proportion of malicious vehicles increases, the traditional vehicle-infrastructure cooperative credible interaction method based on the voting mechanism is gradually held invalid. In contrast, an average accuracy of 94.96% is achieved by the proposed method under the condition that the single authentication delay is less than 13 ms. It is 3.05% higher than that of the traditional method based on the back propagation (BP) neural network. Moreover, a higher accuracy rate and a lower false negative rate of the credible interaction detection results can be obtained with a higher CAV penetration rate. Therefore, the needs of vehicle-infrastructure cooperative credible interaction can be met by the proposed method.

     

  • loading
  • [1]
    CHEN Wei, GUO Fang-zhou, WANG Fei-yue. A survey of traffic data visualization[J]. IEEE Transactions on Intelligent Transportation Systems, 2015, 16(6): 2970-2984. doi: 10.1109/TITS.2015.2436897
    [2]
    YAO De-zhong, YU Chen, YANG L T, et al. Using crowdsourcing to provide QoS for mobile cloud computing[J]. IEEE Transactions on Cloud Computing, 2019, 7(2): 344-356. doi: 10.1109/TCC.2015.2513390
    [3]
    MA Yong-jie, CHENG Shi-sheng, MA Yun-ting, et al. Review of convolutional neural network and its application in intelligent transportation system[J]. Journal of Traffic and Transportation Engineering, 2021, 21(4): 48-71. (in Chinese) doi: 10.19818/j.cnki.1671-1637.2021.04.003
    [4]
    LI Wen-jia, SONG Hou-bing. ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(4): 960-969. doi: 10.1109/TITS.2015.2494017
    [5]
    LU Zhao-jun, QU Gang, LIU Zheng-lin. A survey on recent advances in vehicular network security, trust, and privacy[J]. IEEE Transactions on Intelligent Transportation Systems, 2019, 20(2): 760-776. doi: 10.1109/TITS.2018.2818888
    [6]
    ZHANG Yi, YAO Dan-ya, LI Li, et al. Technologies and applications for intelligent vehicle-infrastructure cooperation systems[J]. Journal of Transportation Systems Engineering and Information Technology, 2021, 21(5): 40-51. (in Chinese) doi: 10.16097/j.cnki.1009-6744.2021.05.005
    [7]
    DENG Ruo-qi, DI Bo-ya, SONG Ling-yang. Cooperative collision avoidance for overtaking maneuvers in cellular V2X-based autonomous driving[J]. IEEE Transactions on Vehicular Technology, 2019, 68(5): 4434-4446. doi: 10.1109/TVT.2019.2906509
    [8]
    ZHAO Xiang-mo, HUI Fei, SHI Xin, et al. Concept, architecture and challenging technologies of ubiquitous traffic information service system[J]. Journal of Traffic and Transportation Engineering, 2014, 14(4): 105-115. (in Chinese) http://transport.chd.edu.cn/article/id/201404013
    [9]
    CHETLUR V V, DHILLON H S. Coverage and rate analysis of downlink cellular vehicle-to-everything (C-V2X) communication[J]. IEEE Transactions on Wireless Communications, 2020, 19(3): 1738-1753. doi: 10.1109/TWC.2019.2957222
    [10]
    ALNASSER A, SUN Hong-jian, JIANG Jing. Cyber security challenges and solutions for V2X communications: a survey[J]. Computer Networks, 2019, 151: 52-67. doi: 10.1016/j.comnet.2018.12.018
    [11]
    AL-SULTAN S, Al-DOORI M M, AL-BAYATTI A H, et al. A comprehensive survey on vehicular ad hoc network[J]. Journal of Network and Computer Applications, 2014, 37: 380-392. doi: 10.1016/j.jnca.2013.02.036
    [12]
    SHANGGUAN Wei, SHI Bin, CAI Bai-gen, et al. Optimization of channel access protocols and performance evaluation in cooperative vehicle infrastructure environment[J]. Journal of Transportation Systems Engineering and Information Technology, 2016, 16(6): 47-53. (in Chinese) doi: 10.3969/j.issn.1009-6744.2016.06.008
    [13]
    GHOSAL A, CONTI M. Security issues and challenges in V2X: a survey[J]. Computer Networks, 2020, 169: 107093. doi: 10.1016/j.comnet.2019.107093
    [14]
    CAI Bai-gen, WANG Cong-cong, SHANGGUAN Wei, et al. Simulation method of information interaction in CVIS[J]. Journal of Traffic and Transportation Engineering, 2014, 14(3): 111-119. (in Chinese) doi: 10.3969/j.issn.1671-1637.2014.03.020
    [15]
    LI Teng-long, HUI Fei, ZHAO Xiang-mo, et al. Modelling heterogeneous traffic dynamics by considering the influence of V2V safety messages[J]. IET Intelligent Transport Systems, 2020, 14(4): 220-227. doi: 10.1049/iet-its.2019.0361
    [16]
    RAWAT D B, POPESCU D C, YAN Gong-jun, et al. Enhancing VANET performance by joint adaptation of transmission power and contention window size[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(9): 1528-1535. doi: 10.1109/TPDS.2011.41
    [17]
    LIU Yun-lu, PU Ju-hua, FANG Wei-wei, et al. A MAC layer optimization algorithm in wireless sensor networks[J]. Chinese Journal of Computers, 2012, 35(3): 529-539. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-JSJX201203012.htm
    [18]
    TAN Shuai-shuai, LI Xiao-ping, DONG Qing-kuai. Trust based routing mechanism for securing OSLR-based MANET[J]. Ad Hoc Networks, 2015, 30: 84-98. doi: 10.1016/j.adhoc.2015.03.004
    [19]
    VIJAYAKUMAR P, AZEES M, KANNAN A, et al. Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(4): 1015-1028. doi: 10.1109/TITS.2015.2492981
    [20]
    VIJAYAKUMAR P, AZEES M, CHANG V, et al. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks[J]. Cluster Computing, 2017, 20(3): 2439-2450. doi: 10.1007/s10586-017-0848-x
    [21]
    AZEES M, VIJAYAKUMAR P, DEBOARH L J. EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2017, 18(9): 2467-2476. doi: 10.1109/TITS.2016.2634623
    [22]
    JI Yi-mu, LU Yi-cheng, LIU Shang-dong, et al. HIBE-MPJ: cross-domain communication mechanism based on HIBE in Internet of things environment[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2020, 40(4): 1-10. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-NJYD202004001.htm
    [23]
    ZHENG Ming-hui, DUAN Yang-yang, LYU Han-xiao. Research on identity authentication protocol group signature-based in Internet of vehicles[J]. Advanced Engineering Sciences, 2018, 50(4): 130-134. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-SCLH201804017.htm
    [24]
    YANG Xue-ting, LI Zhong. Identity authentication scheme based on vehicle behavior prediction for IoV[J]. Computer Engineering, 2021, 47(1): 129-138. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-JSJC202101018.htm
    [25]
    VUKADINOVIC V, BAKOWSKI K, MARSCH P, et al. 3GPP C-V2X and IEEE 802.11p for vehicle-to-vehicle communications in highway platooning scenarios[J]. Ad Hoc Networks, 2018, 74: 17-29.
    [26]
    SHAIKH R A, ALZAHRANI A S. Intrusion-aware trust model for vehicular ad hoc networks[J]. Security and Communication Networks, 2014, 7(11): 1652-1669.
    [27]
    ARSHAD M, ULLAH Z, AHMAD N, et al. A survey of local/cooperative-based malicious information detection techniques in VANETs[J]. EURASIP Journal on Wireless Communications and Networking, 2018, 2018: 62.
    [28]
    KIM T H J, STUDER A, DUBEY R, et al. VANET alert endorsement using multi-source filters[C]//ACM. Proceedings of the Seventh ACM International Workshop on Vehicular Internetworking. New York: ACM, 2010: 51-60.
    [29]
    YAO Xuan-xia, ZHANG Xin-lei, NING Huan-sheng, et al. Using trust model to ensure reliable data acquisition in VANETs[J]. Ad Hoc Networks, 2017, 55: 107-118.
    [30]
    LIU Ji-zhao, DONG Yue-jun. False messages detection method based on spatial inference in Internet of vehicles[J]. Computer Engineering and Design, 2020, 41(12): 35-39. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-SJSJ202012005.htm
    [31]
    MUHAMMAD M, SAFDAR G A. Survey on existing authentication issues for cellular-assisted V2X communication[J]. Vehicular Communications, 2018, 12: 50-65.

Catalog

    Article Metrics

    Article views (915) PDF downloads(109) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return