The sixth-generation(6G)wireless communication system is envisioned be cable of providing highly dependable services by integrating with native reliable and trustworthy functionalities.Zero-trust vehicular networks is...The sixth-generation(6G)wireless communication system is envisioned be cable of providing highly dependable services by integrating with native reliable and trustworthy functionalities.Zero-trust vehicular networks is one of the typical scenarios for 6G dependable services.Under the technical framework of vehicle-and-roadside collaboration,more and more on-board devices and roadside infrastructures will communicate for information exchange.The reliability and security of the vehicle-and-roadside collaboration will directly affect the transportation safety.Considering a zero-trust vehicular environment,to prevent malicious vehicles from uploading false or invalid information,we propose a malicious vehicle identity disclosure approach based on the Shamir secret sharing scheme.Meanwhile,a two-layer consortium blockchain architecture and smart contracts are designed to protect the identity and privacy of benign vehicles as well as the security of their private data.After that,in order to improve the efficiency of vehicle identity disclosure,we present an inspection policy based on zero-sum game theory and a roadside unit incentive mechanism jointly using contract theory and subjective logic model.We verify the performance of the entire zero-trust solution through extensive simulation experiments.On the premise of protecting the vehicle privacy,our solution is demonstrated to significantly improve the reliability and security of 6G vehicular networks.展开更多
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ...The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.展开更多
The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life.The never-ending dependency on the network for communication is attracting advers...The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life.The never-ending dependency on the network for communication is attracting adversaries to exploit the vulnerabilities of IoT.Therefore,this technology is facing some serious issues and challenges concerning security and privacy.These issues and challenges are the real motivation behind considering this study.Hence,this survey includes a discussion about security and privacy challenges as well as available solutions for IoT based wireless sensor networks.This systematic literature review(SLR)focuses particularly on a popular and applicable security approach known as Trust Management System(TMS).Firstly,all aspects of trust management,including trust indicators,trust properties,trust evaluation,trust building,trust models and the importance of those models for security and privacy,trust prediction methodologies,and ultimately trust-based attacks,are covered in this literature.Secondly,trust management schemes are classified into four groups based on the methodology used for trust-based security solutions in the IoT:cryptography-based,computational and probabilistic-based,information theory-based,and others.Then,an understanding of the problems and difficulties with current methodologies is given,along with suggestions for further research.Finally,the SLR is concluded by formulating the desirable characteristics of a trust management system in the IoT and proposing a trust model suitable for IoT networks.展开更多
基金supported in part by the National Key R&D Program of China (No.2020YFB1807802)the National Natural Science Foundation of China (Grant Nos.61971148,U22A2054).
文摘The sixth-generation(6G)wireless communication system is envisioned be cable of providing highly dependable services by integrating with native reliable and trustworthy functionalities.Zero-trust vehicular networks is one of the typical scenarios for 6G dependable services.Under the technical framework of vehicle-and-roadside collaboration,more and more on-board devices and roadside infrastructures will communicate for information exchange.The reliability and security of the vehicle-and-roadside collaboration will directly affect the transportation safety.Considering a zero-trust vehicular environment,to prevent malicious vehicles from uploading false or invalid information,we propose a malicious vehicle identity disclosure approach based on the Shamir secret sharing scheme.Meanwhile,a two-layer consortium blockchain architecture and smart contracts are designed to protect the identity and privacy of benign vehicles as well as the security of their private data.After that,in order to improve the efficiency of vehicle identity disclosure,we present an inspection policy based on zero-sum game theory and a roadside unit incentive mechanism jointly using contract theory and subjective logic model.We verify the performance of the entire zero-trust solution through extensive simulation experiments.On the premise of protecting the vehicle privacy,our solution is demonstrated to significantly improve the reliability and security of 6G vehicular networks.
基金This work was supported by National Natural Science Foundation of China(U2133208,U20A20161).
文摘The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.
文摘The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life.The never-ending dependency on the network for communication is attracting adversaries to exploit the vulnerabilities of IoT.Therefore,this technology is facing some serious issues and challenges concerning security and privacy.These issues and challenges are the real motivation behind considering this study.Hence,this survey includes a discussion about security and privacy challenges as well as available solutions for IoT based wireless sensor networks.This systematic literature review(SLR)focuses particularly on a popular and applicable security approach known as Trust Management System(TMS).Firstly,all aspects of trust management,including trust indicators,trust properties,trust evaluation,trust building,trust models and the importance of those models for security and privacy,trust prediction methodologies,and ultimately trust-based attacks,are covered in this literature.Secondly,trust management schemes are classified into four groups based on the methodology used for trust-based security solutions in the IoT:cryptography-based,computational and probabilistic-based,information theory-based,and others.Then,an understanding of the problems and difficulties with current methodologies is given,along with suggestions for further research.Finally,the SLR is concluded by formulating the desirable characteristics of a trust management system in the IoT and proposing a trust model suitable for IoT networks.