| With the rapid development of 5G,Bluetooth and other technologies,the Internet of Things(IoT)technology has broader application prospects.As the core application of IoT,the Internet of Vehicles(IoV)is considered to be an important way to solve current traffic congestion and improve driving safety.Although the Internet of Vehicles facilitates people’s lives,the private information in the Internet of Vehicles is extremely vulnerable to multiple attacks by malicious attackers and faces serious security risks.Authentication is an important way to maintain the security of the Internet of Vehicles,and the existing centralized authentication system faces many security problems such as the failure of the central server,the difficulty of monitoring the central cryptographic data,low authentication efficiency,poor anonymity,and malicious internal vehicles.it is difficult to ensure safe communication between vehicles.In view of the defects of the existing authentication system in the Internet of Vehicles,this paper proposes a trusted identity authentication method for IoV nodes.This method designs an anonymous authentication scheme between vehicles and roadside units,and establishes a complete trust evaluation system based on the interaction between vehicle nodes.The anonymous authentication scheme can determine the identity of each participant in the Internet of Vehicles before communication,and ensure that each participant obtains legal key information before communication.The trust evaluation system evaluates the trust value of the vehicle through the vehicle interaction behavior,preventing the anonymously authenticated vehicle from publishing malicious information and jeopardizing the system security.The method realizes the credible identity verification between nodes,reduces the harm of malicious nodes,and ensures the secure communication between nodes in the Internet of Vehicles system.The main work is as follows:(1)This paper proposes an anonymous authentication method based on blockchain.Authentication process between vehicles and roadside units are realized through blockchain,elliptic curve encryption algorithm and signature technology.This schema also solves the problems of storage of cryptographic information and anonymous authentication between nodes.Finally,security analysis proves that this schema can effectively resist eavesdropping attacks,witch attacks,Dos attacks,etc.The security comparison results with other schemas show that this schema has a more comprehensive security performance.(2)This paper proposes a malicious node detection schema based on trust evaluation.This schema aims at the problem of malicious internal vehicles after anonymous authentication.It evaluates the comprehensive trust value based on the direct trust value,PageRank recommendation trust value and RSU trust value to evaluate the comprehensive trust value,and the seed vehicle speeds up the speed of RSU judging messages.defines a variety of customized factors such as time penalty factor,forgetting factor and malicious penalty coefficient to jointly ensure the "bad news has wings" criterion,rapidly reduces the trust value of malicious vehicles and enhances the speed of finding malicious vehicles in the scheme.The security analysis results show that our scheme has great performance in dealing with malicious vehicles and malicious RSU attacks.(3)This paper design an experimental simulation platform for the Internet of Vehicles through Veins,SUMO and OMNeT,and conducts an experimental analysis on the anonymous authentication scheme and the malicious node detection scheme.The experiment of the anonymous authentication scheme shows that this scheme can complete the anonymous two-way authentication between vehicles and RSU and between vehicles and vehicles.After analyzing the experimental results,it can be concluded that this scheme reduces the communication delay and communication within a reasonable storage cost.In terms of communication cost,this scheme improves 20.8%compared with PKI scheme,and the cost of secondary authentication is optimized 47.2%compared with PKI scheme.In terms of authentication delay,the optimization of this scheme is 68.7%compared with PKI scheme and 15.3%compared with the scheme in reference 17.The experimental results of malicious node detection method based on trust evaluation show that this scheme can identify malicious vehicles with various attacks,and the identification probability of malicious vehicles is more than 86%under different malicious message sending probabilities,and the highest false alarm rate of multiple experimental vehicles did not exceed 0.06.The experiment tests the RSU recognition accuracy under different proportions of malicious messages,and the experimental results show that this scheme has a message verification accuracy of more than 91%under the experimental conditions of 10%and 30%of malicious messages,which is significantly improved compared with the Bayesian recognition scheme.The experiment also compares the communication delay of experimental network vehicle under the probability of 10%and 30%malicious vehicle.The results show that the communication delay of this scheme is reduced by 9.7%and 11.4%respectively compared with the scheme in reference 17.(4)This paper designs a IoV authentication system based on the blockchain to implement authentication and trust evaluation methods.The IoV authentication system includes a blockchain management system and a IoVsecurity management system.The Internet of Vehicles authentication system is based on the Fabric blockchain,and realizes various functions such as block management,vehicle and RSU information management,log recording,server status monitoring,which ensures that managers can monitor the overall operating status of the blockchain and the Internet of Vehicles system in real time to ensure secure communication between vehicles. |