Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (3): 142-153.doi: 10.11959/j.issn.2096-109x.2021097
• Papers • Previous Articles Next Articles
Baoqin ZHAI1, Jian WANG1, Lei HAN1,2, Jiqiang LIU1, Jiahao HE1, Tianhao LIU1
Revised:
2021-09-03
Online:
2022-06-15
Published:
2022-06-01
Supported by:
CLC Number:
Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU. Hierarchical proxy consensus optimization for IoV based on blockchain and trust value[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153.
[1] | CONTRERAS-CASTILLO J , ZEADALLY S , GUERRERO-IBA?EZ J A , . Internet of vehicles:architecture,protocols,and security[J]. IEEE Internet of Things Journal, 2018,5(5): 3701-3709. |
[2] | YANG F C , WANG S G , LI J L ,et al. An overview of internet of vehicles[J]. China Communications, 2014,11(10): 1-15. |
[3] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[EB]. |
[4] | CHEN J , YAO S X , YUAN Q ,et al. CertChain:public and efficient certificate audit based on blockchain for TLS connections[C]// Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. 2018: 2060-2068. |
[5] | DORRI A , STEGER M , KANHERE S S ,et al. BlockChain:a distributed solution to automotive security and privacy[J]. IEEE Communications Magazine, 2017,55(12): 119-125. |
[6] | CHEN C , WANG C , QIU T ,et al. A secure content sharing scheme based on blockchain in vehicular named data networks[J]. IEEE Transactions on Industrial Informatics, 2020,16(5): 3278-3289. |
[7] | YANG Z , YANG K , LEI L ,et al. Blockchain-based decentralized trust management in vehicular networks[J]. IEEE Internet of Things Journal, 2019,6(2): 1495-1505. |
[8] | WANG S M , YE D D , HUANG X M ,et al. Consortium blockchain for secure resource sharing in vehicular edge computing:a contract-based approach[J]. IEEE Transactions on Network Science and Engineering, 2021,8(2): 1189-1201. |
[9] | XIAO H L , CHEN Y H , ZHANG Q Y ,et al. Joint clustering and power allocation for the cross roads congestion scenarios in cooperative vehicular networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2019,20(6): 2267-2277. |
[10] | ALSARHAN A , KILANI Y , AL-DUBAI A , ,et al. Novel fuzzy and game theory based clustering and decision making for VANETs[J]. IEEE Transactions on Vehicular Technology, 2020,69(2): 1568-1581. |
[11] | FAN K , PAN Q , ZHANG K ,et al. A secure and verifiable data sharing scheme based on blockchain in vehicular social networks[J]. IEEE Transactions on Vehicular Technology, 2020,69(6): 5826-5835. |
[12] | SINGH A K , . A multi-layered network model for blockchain based security surveillance system[C]// Proceedings of 2020 IEEE International Conference for Innovation in Technology. Piscataway:IEEE Press, 2020: 1-5. |
[13] | RASHID M A , PAJOOH H H . A security framework for IoT authentication and authorization based on blockchain technology[C]// Proceedings of 2019 18th IEEE International Conference on Trust,Security and Privacy In Computing and Communications. 2019: 264-271. |
[14] | HOU Y C , LIU W X , LIN H ,et al. Multi-layer access control mechanism based on blockchain for mobile edge computing[J]. 2020 IEEE Intl Conf on Parallel & Distributed Processing With Applications,Big Data & Cloud Computing,Sustainable Computing &Communications,Social Computing & Networking, 2020: 285-291. |
[15] | AUJLA G S , SINGH A , SINGH M ,et al. BloCkEd:blockchain-based secure data processing framework in edge envisioned V2X environment[J]. IEEE Transactions on Vehicular Technology, 2020,69(6): 5850-5863. |
[16] | 丁庆洋, 朱建明, 张瑾 ,等. 基于双层架构的溯源许可链共识机制[J]. 网络与信息安全学报, 2019,5(2): 1-12. |
DING Q Y , ZHU J M , ZHANG J ,et al. Traceability permissioned chain consensus mechanism based on double-layer architecture[J]. Chinese Journal of Network and Information Security, 2019,5(2): 1-12. | |
[17] | DRIJVERS M , 0001 S G , NEVEN G ,et al. Pixel:multi-signatures for consensus[J]. IACR Cryptology EPrint Archive,2019, 2019:514. |
[18] | 陈子豪, 李强 . 基于K-medoids的改进PBFT共识机制[J]. 计算机科学, 2019,46(12): 101-107. |
CHEN Z H , LI Q . Improved PBFT consensus mechanism based on K-medoids[J]. Computer Science, 2019,46(12): 101-107. | |
[19] | LI W Y , FENG C L , ZHANG L ,et al. A scalable multi-layer PBFT consensus for blockchain[J]. IEEE Transactions on Parallel and Distributed Systems, 2020,32(5): 1146-1160. |
[20] | DUAN S S , REITER M K , ZHANG H B . BEAT:asynchronous BFT made practical[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York,NY,USA:ACM, 2018: 2028-2041. |
[21] | LUU L , NARAYANAN V , ZHENG C D ,et al. A secure sharding protocol for open blockchains[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016: 17-30. |
[22] | 包振山, 王凯旋, 张文博 . 基于树形拓扑网络的实用拜占庭容错共识算法[J]. 应用科学学报, 2020,38(1): 34-50. |
BAO Z S , WANG K X , ZHANG W B . A practical Byzantine fault tolerance consensus algorithm based on tree topological network[J]. Journal of Applied Sciences, 2020,38(1): 34-50. |
[1] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[2] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[3] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[4] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[5] | Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG. Bytecode-based approach for Ethereum smart contract classification [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120. |
[6] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[7] | Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG. State-of-the-art survey of smart contract verification based on formal methods [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28. |
[8] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[9] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[10] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[11] | Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG. Blockchain covert communication scheme based on the cover of normal transactions [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86. |
[12] | Jie YI, Tengfei CAO, Shuai GAO, Jianqiang HUANG. Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 157-167. |
[13] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
[14] | Jiaren YU, Youliang TIAN, Hui LIN. Design of miner type identification mechanism based on reputation management model [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 128-138. |
[15] | Zhensheng GAO, Lifeng CAO, Xuehui DU. Research progress of access control based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|