期刊
IEEE TRANSACTIONS ON SERVICES COMPUTING
卷 15, 期 2, 页码 806-818出版社
IEEE COMPUTER SOC
DOI: 10.1109/TSC.2019.2961992
关键词
Privacy; Cryptography; Vehicular ad hoc networks; Authentication; Trajectory; Reliability; Vehicle platoon; trust; privacy-preserving; recommendation
资金
- National Natural Science Foundation of China [61972037, 61402037, 61272512, 61702105, 61872041, U1836212, U1804263]
- Graduate Technological Innovation Project of Beijing Institute of Technology [2019CX10014]
This article presents a trust-based and privacy-preserving platoon recommendation scheme called TPPR, which enables potential user vehicles to avoid selecting malicious head vehicles and protects vehicle privacy. By utilizing truth discovery and authentication protocols, the security of the vehicle platoon system is improved.
Vehicle platoon, a novel vehicle driving paradigm that organizes a group of vehicles in the nose-to-tail structure, has been considered as a potential solution to reduce traffic congestion and increase travel comfort. In such a platoon system, head vehicles' performances are usually evaluated by user vehicles' feedbacks. Selection of an appropriate and reliable head vehicle while not disclosing user vehicles' privacy has become an interesting problem. In this article, we present a trust-based and privacy-preserving platoon recommendation scheme, called TPPR, to enable potential user vehicles to avoid selecting the malicious head vehicles. The basic concept of TPPR is that each user vehicle holds a trust value, and the reputation score of the head vehicle is calculated via a truth discovery process. To preserve vehicles' privacy, pseudonyms and Paillier cryptosystem are applied. In addition, novel authentication protocols are designed to ensure that only the valid vehicles (i.e., the vehicles holding the truthful trust values and joining the vehicle platoon) can pass the authentication. A comprehensive security analysis is conducted to prove that the proposed TPPR scheme is secure against several sophisticated attacks in vehicular ad hoc networks. Moreover, extensive simulations are conducted to demonstrate the correctness and effectiveness of the proposed scheme.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据