Font Size: a A A

Rule Extraction Under The Framework Of 4A In Vehicular Network Of Trusted Network Access

Posted on:2012-01-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ZhangFull Text:PDF
GTID:2178330332999869Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the combination of wireless network technology and vehicle electronics, vehicle network and information system become the important part of the modern intelligent vehicle. Vehicle is no longer simply a means of transport for people, many people are committing to the automatic control, automotive electronics, multimedia. Internet, wireless communications and other technologies into vehicle network. As the vehicle system matures, the advent of kinds of services (such as vehicle electronic navigation, traffic optimization, wireless internet access, payment services)and so on, has brought a great convenience to the life of people. However, the application of these services also inevitably involves the user's personal data and privacy issues, therefore the safety of vehicle networks become the focus. With the rapid economic development of our country, the owners of car have more than ten million in domestic and the number is continually rising. Major automobile manufacturers have committed to the safety of vehicle networks in order to obtain the greatest benefit in the competition, it is expected that the vehicle networks will achieve a more mature and trusted wireless communication system.The birth of trusted computing injected new vitality to the development of vehicle network. The main purpose of trusted computing is to ensure the security of the entire network through the safety of the terminal, because the terminal is a major source which can generate data of network, and it is an important part of communicating with the server or the other node in the network. Ensuring the credibility of the terminal is particularly important. The TNC architecture proposed by the TCG's group ensures the credibility of the terminal to a certain extent. In the architecture of TNC, both the authentication and the detection of integrity of information make certain malicious invasion node (posing as the user) be shielded without the permission of accessing to the network.This article describes the background of vehicle self-organizing network and its features, and the description of the architecture of TNC and the communication theory in detail. As well as research in the existing trusted network is proposed based on trusted network connected technology based on the mechanism of communication. At the same time, a rule extraction model is proposed in the part of audit under the framework of 4A, which is applied in the safety audit, that is the decision tree model which is described in detail.In this paper, the decision tree is used to mine data of network, generate on-board network attack data for statistical records, extract feature of these acts through the establishment of decision tree model.The control of architecture of TNC is reflected in two aspects to the terminal, one is to control access of network for users, the other is the audit of user's behavior online. As the end-users of vehicles changing and time passing, audit data is increasing ultimately and finally a large data platform is formed which is using the trusted platform system providing users with security services.Safety audit is recording and monitoring the behavior of the users who are already admitted to access to the network, therefore it's an important part of network security system, and it also makes up for lacking of firewall and intrusion detection to some extent. In this paper, a new decision tree model is proposed for the security audit, it is combined with the characteristics of data of network, and it is modified on base of the traditional decision tree. After many experiments, the results show that the decision tree classification model can adapt to the characteristic of data of vehicle network and it also can prevent malicious attacks effectively. With the changes in the data of network, decision tree model will also be changed with it, so the rules extracted from the database will be put into a dynamic database, users can update the rule base from time to time to ensure the validity of data in a timely manner.
Keywords/Search Tags:Vehicle self-organizing networks, Trusted Network, Trusted Network Access, Security audit, Decision tree algorithm
PDF Full Text Request
Related items