A Trusted and Privacy-Preserving Carpooling Matching Scheme in Vehicular Networks ()
1. Introduction
Vehicular Networks [1] is an important part of the intelligent transportation system. In the vehicular networks, vehicles can use wireless communication technology to communicate with nearby vehicles or infrastructure in a Vehicle-To-Vehicle (V2V) or Vehicle-To-Infrastructure (V2I) manner. With the development of vehicular networks, dynamic carpooling with the help of vehicular networks has become an important travel manner [2]. The dynamic carpooling service matches multiple passengers which have similar itineraries with the target vehicle based on the travel information provided by the passengers and the vehicle. Carpooling can improve the traffic environment [3], and reduce the number of vehicles on the road by increasing the utilization rate of vehicle seats to alleviate traffic congestion and improving road mobility. In addition, carpooling reduces fuel consumption and carbon emissions, thereby improving environmental pollution [4].
Privacy protection is an important concern in carpooling [5] since attackers usually launch attacks to eavesdrop on the private information of carpooling users, which will cause privacy leakage and reduce users’ willingness to participate in carpooling. Moreover, the private information of carpooling users usually includes sensitive information such as location and address [6]. Attackers can guess the user’s home address and other information by observing multiple carpooling information of users, which raises a major threat to the safety of carpooling users [7]. In recent years, many privacy-preserving schemes have been proposed to protect the anonymity and traceability of carpooling users [8]. These schemes may use encryption to protect the privacy of carpooling data [9] [10] or use anonymous identities to protect the privacy of carpooling users [11]. But anonymity and data encryption may cause difficulty in carpooling matching [12]. Some carpooling matching schemes have been proposed to solve the problem of difficulty in carpooling matching [13]. However, these schemes don’t consider the individual needs of passengers. For example, there may be non-smokers who do not want to travel with smoking drivers, and female passengers don’t want to travel with the smoking driver at night. If the individual needs of the passengers are ignored, it may cause a mismatch between the vehicle and the passengers. Therefore, the existing solutions can’t achieve a balance between precise carpooling matching and privacy protection [14].
Trust management is another problem in carpooling since it enables users to judge the trustworthiness of the information before accepting it [15]. In recent years, a large number of trust management schemes have been proposed for Vehicular Networks [16]. Some schemes assign reputation certificates to vehicles, and the vehicles verify the reputation certificate to determine whether the information comes from a legitimate vehicle to ensure the legitimacy of the received information [17] [18]. There are also some schemes using reputation score trust management methods. The vehicle judges whether to trust a vehicle by comparing the reputation score of the vehicle sending message with the threshold set by itself, and then accepts the corresponding message [19]. However, a single reputation score makes it impossible for passengers to evaluate the trustworthiness of the vehicle from multi-faceted.
To solve the aforementioned problems, this paper proposes a trusted and privacy-preserving carpooling matching (TPCM) scheme in vehicular networks. The main contributions are as follows:
1) TPCM scheme adopts the privacy set intersection based on Bloom filter, and judges whether the vehicle fulfills the individual needs of the passengers according to the travel preferences selected by the passengers and the preference attribute set of the vehicle. The privacy of carpooling users will not be leaked in this process. It can also fulfill the individual needs of passengers. TPCM scheme overcomes the problem of mismatch between vehicles and passengers, which achieves a balance between precise carpooling matching and privacy protection.
2) This paper proposes a multi-faceted trust management model based on travel preferences to solve the trust lack between passengers and vehicles during carpooling matching. This model uses a reputation set based on travel preferences instead of a single reputation score. Each trust value in the reputation set represents the trustworthiness of a certain type of travel preference of the vehicle, which realizes the multi-faceted accurate trust evaluation of the vehicle and effectively depicts trust between passengers and vehicles.
The remainder of this paper is structured as follows. Section 2 introduces some related work on carpooling and its limitations. Section 3 revisits the preliminaries. Section 4 introduces the system model, threat model and travel preferences classification. Section 5 details the proposed TPCM scheme. Section 6 and Section 7 detail the security analysis and performance evaluation, followed by the conclusion in Section 8.
2. Related Work
In terms of privacy protection for carpooling matching, Yu et al. [7] proposed a privacy-preserving carpooling matching scheme which used encryption aggregation to calculate distance and protected the location privacy of vehicles and passengers by using homomorphic encryption. Hallgren et al. [20] proposed the scheme through the similarity between the starting point and the end point and trajectory matching to achieve carpooling matching, which adopted additional homomorphic encryption and threshold private set intersection protocol to protect user’s privacy. Li et al. [13] presented the way to achieve one-to-many proximity matching by using privacy proximity test during carpooling matching, which protected the privacy of vehicles and passengers simultaneously. However, these schemes don’t consider passenger’s travel preferences in carpooling matching [21], which cannot achieve a balance between precise matching of passengers and vehicles and privacy-preserving and may cause a mismatch between passengers and vehicles. Passengers may give negative feedback to the vehicle after the carpooling journey ends. And it affects the user experience and reduces the effectiveness of carpooling.
In terms of trust management, Caballero-Gil et al. [22] proposed the reputation update algorithm which considered the relationship chain between users, and calculated the trust rating through friendliness and user ratings to generate a trust rating between 0 and 1. Baza et al. [23] proposed a decentralized reputation system that generated two values based on whether the vehicle arrived at the agreed pick-up location and whether the carpooling journey was completed, and then used the two values to calculate the vehicle’s reputation score. Sánchez et al. [24] presented a reputation management protocol which first aggregated the ratings of passengers, and then used negative truncation to normalize the reputation value of the vehicle. However, the aforementioned schemes only use a single reputation score to evaluate the trustworthiness of the vehicles, which not only causes reputation link attacks [25] but also cannot evaluate the trustworthiness of the vehicle from multi-faceted, such as the driver’s driving skills and the degree of cleanliness.
3. Preliminaries
3.1. Bilinear Pairing
Let
and
be an addition cyclic group and a multiplication with the same prime order q. Let g be the generator of group
. Let
denote a bilinear map which has following properties [26].
Bilinear: For all
,
.
Non-degeneracy:
.
Computability: For all
, there is an effective algorithm for calculation
.
3.2. ELGAMAL Encryption
The ElGamal encryption algorithm is a multiplicative homomorphic encryption algorithm. The process of the ElGamal encryption algorithm is as follows [27].
Key generation: Randomly select a large prime number q and a random number
. And calculate
. Then the public key is
and private key is s.
Encryption: Select a random number r that is relatively prime with
. And calculate the ciphertext of message M as
(1)
Decryption: Decrypt the ciphertext C as
(2)
3.3. BF-PSI
Bloom filter (BF) [28] is a probabilistic data structure that checks set membership and effectively saves space. The false negative rate of the Bloom filter is 0, but the Bloom filter has a certain false positive rate due to the collision rate of the hash function, the false positive rate p is calculated as [28]
(3)
where m, k and n are the size of the bloom filter vector, the number of hash functions and the number of elements stored in the Bloom filter, respectively.
Privacy Set Intersection (PSI) [29] can judge whether there is an intersection between the input sets of the two parties without leaking privacy. The execution process of BF-PSI is: two parties A and B whose secret sets are
and
, respectively. A and B choose random value
and
, and then use k independent hash functions with the number bits s to represent the set as
and
. Next, A and B exchange random values and BF. Finally, it determines the intersection of two parties A and B. For example, if A executes
, who uses
to judge whether
appears in
. If it returns a positive result, then
, and vice versa. In this way, A and B can learn
without leaking the privacy of the two parties.
4. Problem Statement
4.1. System Model
The system model of the TPCM scheme proposed in this paper is shown in Figure 1, which includes four entities: Trusted Authority (TA), RSU, vehicle and passenger.
When the TPCM scheme is deployed in the carpooling system, TA assigns public key, private key and reputation certificates to registered entities. Only TA can reveal the true identities of malicious users and punish them when users have malicious behaviors. TA also is responsible for collecting trust feedback and updating the user’s trust information. RSU is responsible for verifying the certificates and information signatures of vehicles and passengers and matching vehicles and passengers in carpooling. Passengers are responsible for sending
Figure 1. System model of carpooling matching scheme.
encrypted carpooling requests within the communication range of a certain RSU. The vehicles send an encrypted carpooling response after receiving the encrypted carpooling requests.
4.2. Threat Model
We assume that the TA is completely trusted, whereas RSU is honest and curious in the threat model of this paper. That is, the RSU honestly performs the steps in carpooling, but it is curious about the carpooling information broadcasted in the carpooling system and the user’s private information. Specifically, RSU may launch passive attacks such as message eavesdropping attacks or privacy digging. Although it does not modify the information, it tries to obtain more private information from carpooling users. Vehicles and passengers may be malicious. They may launch passive attacks to eavesdrop on the private information in carpooling or launch active attacks to disrupt the carpooling network. For example, vehicles or passengers may launch message cheating attacks, and use a false identity to deceive other carpooling entities. And they may launch message modification attacks to modify the carpooling information.
4.3. Travel Preferences Classification
The classification and attributes of travel preferences for the TPCM scheme in this paper are shown in Table 1. Travel preferences are divided into 7 categories, where
represents the trust value corresponding to travel preferences. The trust value of travel preference
is
. The vehicle reputation set is composed of trust value, which is used to evaluate the trustworthiness of the vehicle from multi-faceted. Each travel preference has two attributes,
represents the 14 attributes corresponding to the 7 travel preferences. The attributes of
is based on the range of trust values. That is, the attributes of preference
are converted from continuous variables to characters, where the range of trust values [
, 0.5] is Good and the range (0.5, 1] is Very Good,
is the score threshold. The attributes of
is constantly updated with the changes of the trust value. The attributes of
is unchanged based on the real information when vehicle registration, and the trust
Table 1. Travel preferences classification and attributes.
value reflects the trustworthiness of the corresponding travel preference. One of the attributes of each travel preference constitutes the preference attributes set
of the vehicle
, which is used to meet the individual needs of passengers.
5. Proposed Scheme
5.1. System Initialization
Given the security parameters
, TA generates the bilinear parameters
, where
,
is the cyclic group with prime order q,
,
is the generator of
and
, respectively. And the bilinear map
. Then TA calculates
. Next, TA generates the master key
and calculates
to be its public key, where
. TA selects two hash function:
,
, and selects the filter function f, length l, and hash function set
for the Bloom filter. TA sets the distance threshold
and
, time threshold
and score threshold
. Finally, TA publishes the system parameters
.
In order to prevent the vehicle from forging its travel preference attributes, TA will create preference attributes secret value as shown in Table 2, where
is the secret value corresponding to the preference attribute
,
is the time when TA generates all preference attributes secret value. The calculation method of
is
, where
is the hash function for calculating the secret value and
is a random number. Due to the collision rate of the hash function, if the secret value of two different preference attributes is the same, TA recalculates the secret value for all preference attributes until the secret value of all preference attributes is different. In addition, TA regularly updates the preference attributes secret value.
5.2. Entity Registration
When a passenger
with the identity
registers with the carpooling system, TA generates the privacy key
and calculates the public key
for passenger
, where p is a random number and
. TA generates the reputation certificate
, where
,
is the validity period of the reputation certificate. The anonymous identity of passenger
is
.
When vehicle
with the identity
registers with the carpooling system, TA generates the privacy key
and calculates the public key
Table 2. Preference attributes secret value.
for vehicle
, where v is a random number and
. TA generates the reputation certificate
, where
.The anonymous identity of vehicle
is
. The reputation set of the vehicle
is
, where
represents the trust value of the 7 travel preference types of
, and the reputation set is used to evaluate the trustworthiness of
from multi-faceted. Since the travel preference
’s trust value is initialized to 0.5 and the corresponding attributes are
, so the initial vehicle preference attribute set is
, where
,
and
are the real information registered by the vehicle
.
is used to meet the individual travel preferences needs of passengers. TA retrieves the secret value corresponding to the preference attribute from Table 2, and then sends the preference attribute secret value set
to the vehicle
, where
.
When RSU registers with the carpooling system, TA generates the privacy key
and calculates the public key
for
, where r is a random number and
.
5.3. Carpooling Requesting
When a passenger
wants to carpool, who first chooses individual travel preferences, and then selects preference attributes from the attributes corresponding to the selected travel preferences. It is noted that passengers can only choose one of the two attributes corresponding to each travel preference. We assume that the preference attributes selected by the passenger are
,
are the corresponding travel preferences. Next, the passenger
requests the secret value corresponding to the selected preference attributes from TA, and TA returns the corresponding secret value
to the passenger
. We assume
, then the passenger
selects a random number
and injects
into Bloom filter by using
. The passenger sets a preference score threshold
. Finally, passenger
selects the starting position and destination to form a carpooling request
(4)
where
denotes the timestamp when the carpooling request is generated. And then passenger calculates the signature
. When the passenger is within the communication range of a certain RSU, who uses ElGamal encryption and parameter
to encrypt
to form a ciphertext
(5)
Eventually passenger
sends
to
. After the
receives the information
, which uses the decryption algorithm and the private key to decrypt ciphertext
to obtain the passenger’s carpooling request information,
. Then
obtains the current timestamp from the clock and verifies the freshness of the message by
. If it holds, then
verifies the validity of the passenger’s reputation certificate and information signature by (6) and (7).
(6)
(7)
when all verifications are passed,
will broadcast
to the nearby vehicles, where
is the timestamp when
is generated.
(8)
5.4. Carpooling Responding
When the vehicle
is within the communication range of
, who first obtains the current timestamp from the clock after receiving the information
, and then checks the freshness of the message by
. If it holds, we assume the preference attribute secret value set of the vehicle
is
. In order to ensure the time consistency of the preference attribute secret value of the vehicle
and the passenger
, the vehicle first checks whether
is equal to
that in
. If it holds, the vehicle selects a random number
and inserts
into the Bloom filter by using
; Otherwise, the vehicle requests to update secret value in
from TA, and then injects the updated
into the Bloom filter. Finally, vehicle sets the maximum number of carpooling to form a carpooling response
(9)
where
,
denotes the starting point and destination of vehicle, respectively, and
denotes the timestamps when the carpooling responding is generated. The vehicle calculates the signature
. Then vehicle
adopts ElGamal encryption and uses the parameter
to encrypt the carpooling response of the vehicle to form ciphertext
(10)
Eventually vehicle
sends
to
.
5.5. Carpooling Matching
After receiving the information
,
first uses the decryption algorithm and private key to decrypt the vehicle’s carpooling response ciphertext
to obtain
. Then it checks the freshness of carpooling response information by
. If it holds,
verifies the validity of
’s reputation certificate and information signature by (11) and (12).
(11)
(12)
After above verifications are passed,
verifies (13) to match the starting position and destination of the vehicle and passengers. Then it checks whether all the
in
is greater than
. In other words, it is to check whether the trust value corresponding to
’s travel preference categories selected by the passenger meets the passenger’s multi-faceted trust needs.
(13)
Finally,
uses BF-PSI to determine whether there is an intersection
between
’s preference attribute secret value set
and the set
selected by
. If
and
are the same,
fulfills all individual carpooling needs of passenger
. Then the vehicle and passengers are successfully matched and the message
is sent to the vehicle and passengers.
(14)
where
is the communication key between the vehicle and the passenger, and
is the timestamp of the successful carpooling matching. In order to understand the process of carpooling matching in our TPCM scheme, Algorithm 1 describes the carpooling matching scheme based on BF-PSI in Table 3.
5.6. Trust Feedback and Reputation Updating
When the passenger
arrives at the destination, who will calculate the feedback score
for the selected preference attribute (
) corresponds to the travel preferences (
) based on the actual experience in the carpooling journal. For
, the corresponding feedback score is
, where 1 represents positive feedback and 0 represents negative feedback. Passenger
calculates feedback scores for all selected travel preferences by using above method and generates a travel preference feedback set
, which forms the passenger
’s trust feedback tuple
for the vehicle
.
Since there is more than one carpooling passenger, multiple trust feedback tuples about the vehicle
will be generated. These trust feedback tuples are aggregated by the RSU and sent to the TA in a safe manner. After the TA receives them, who first classifies and integrates this information into multiple preference feedback information sets about the vehicle based on the type of travel preference, for example
(15)
Table 3. Carpooling matching scheme based on BF-PSI.
TA updates the trust value of the travel preferences type selected by passengers
in the reputation set
of vehicle
based on
, the updating method is as follows:
(16)
where
is the reputation score of passengers
,
is a decay factor. If a vehicle does not carpool for a long time, the trust value corresponding to its travel preference will decay over time.
Then TA updates the attributes of the first four items in the vehicle
’s preference attribute set based on the updated trust value. Finally, TA sends the updated
and
to the vehicle. In order to evaluate the overall trustworthiness of the vehicle, we use the weighted average method to calculate the average reputation score of the vehicle, the calculation method is as follows:
(17)
where
is the travel preferences of vehicle
corresponding to the preference attributes selected by passenger
, the number is M, corresponding to the updated trust value is
, and the total weight is
;
is the travel preferences of vehicle
not selected by the passenger,
the number is N, corresponding to the historical trust value is
, the total weight is
, where
.
6. Security Analysis
6.1. Conditional Privacy Preservation
For the TPCM scheme, the TA assigns a pseudonym
to the vehicle when the vehicle is registered, and the vehicle uses the pseudonym identity to broadcast the carpooling information. Since the number v in
is a random number, which is kept secretly by the TA. Therefore, the adversary cannot reveal the identity of the vehicle from the pseudonym
to obtain private data. Only the TA can reveal the identity of the vehicle by using
and punish the malicious vehicle. Therefore, the TPCM scheme not only protects the user’s identity privacy, but also tracks the real identity of malicious users and realizes the conditional privacy protection of users’ identities.
6.2. Carpooling Data Privacy Preservation
When the carpooling information is generated, this paper uses ElGamal encryption algorithm to encrypt it. That is, the vehicles or passengers use the public key of the RSU to encrypt the carpooling information, and the RSU decrypts the encrypted carpooling information by using its private key to verify the identity of the vehicles or passengers. Since a random number needs to be selected when the ElGamal encryption algorithm is used to encrypt a carpooling message and the private key of the RSU is used to decrypt the message. The private key of the RSU is a random number and is kept secretly by the RSU. The adversary cannot initiate an attack to get the plaintext information after the carpooling information is encrypted. Therefore, the TPCM scheme protects the privacy of carpooling data. In addition, the encrypted ciphertext of the same carpooling message is also different within the communication range of different RSUs by using the ElGamal encryption algorithm. Moreover, the carpooling matching method in this paper introduces travel preferences, which uses BF-PSI technology to match passengers and vehicles to meet the individual needs of passengers. The carpooling matching method by using the BF-PSI not only protects the preference privacy of vehicles and passengers, but also prevents mismatch between vehicles and passengers caused by ignoring the passenger’s individual needs.
6.3. Resistance to Message Modification Attacks
The attackers may modify the carpooling message by launching a message modification attack to disrupt the carpooling network. However, for the TPCM scheme in this paper, the passenger
will calculate a signature
for the carpooling request
when he issues it. After the RSU within the communication range of
receives
, which uses Equation (7) to verify the validity of the passenger’s carpooling request signature. If it holds, then the carpooling request
has not been modified. Otherwise, the carpooling message will be discarded. Therefore, the TPCM scheme can resist the message modification attack.
6.4. Resistance to Message Cheating Attacks
Passengers or vehicles may initiate message cheating attacks and use false certificates to deceive each other. However, for the TPCM scheme in this paper, the reputation certificate of carpooling users has a validity period. When the reputation certificate expires, the TA will issue a new reputation certificate to the user. Although the internal attacker has a reputation certificate issued by the TA, the malicious user cannot repeatedly initiate a reputation certificate request to cover up his malicious behavior before the certificate expires. TA can reveal the identity of the internal attacker, who will reduce the trust value of a certain travel preference when the vehicle has malicious behavior. And TA will revoke the malicious vehicle when a certain trust value is lower than the score threshold. If an external attacker uses a fake reputation certificate to broadcast carpooling messages, who cannot pass the reputation certificate verification from RSU. Therefore, for the TPCM scheme in this paper, the reputation certificate with validity period can not only resist message cheating attacks and ensure the legitimacy of the carpooling user identity, but also avoid the communication delay of requesting the certificate every time for carpooling.
7. Performance Evaluation
7.1. Computation Cost
The computational cost of TPCM scheme mainly comes from ElGamal encryption and signature verification. We let
be the time to perform the maptopoint function operation,
be the time to perform the exponentiation operation,
be the time to perform bilinear pairing, and
be the time to perform multiplication. In the Intel i3-4170 3.7 GHz processor, 8 GB RAM and Windows 10 platform, the times of these operations are:
,
,
,
[30].
In order to compare the TPCM scheme with the FICA scheme [13] and SRSCB scheme [31], this paper considers the computation overhead of three stages of passenger carpooling request, information verification and vehicle carpooling response in Table 4. We let PCRG be the carpooling request generation stage,
Table 4. Computation cost of different carpooling schemes.
RMV be the information verification stage, and VCRG be the carpooling response generation stage.
The computation cost comparison of different carpooling schemes is shown in Table 4. In the FICA scheme, the time consumption of passenger carpooling request generation, RSU information verification, and carpooling response is 55.1 ms, 66.8 ms, and 55.1 ms, respectively. In the SRSCB scheme (assuming the number of attributes is 1), the time consumption for the passenger generates an encrypted carpooling request, RSU information verification, and driver generates a carpooling response is 59.5 ms, 34.2 ms, and 20.3 ms, respectively. For the TPCM scheme, the time consumption of carpooling request generation, RSU information verification and carpooling response is 16 ms, 29.9 ms, and 16 ms, respectively.
Figure 2 and Figure 3 show the computation cost of different carpooling schemes as the number of passengers and vehicles changes. We can see that the computation cost gradually increases as the number of passengers and vehicles increases, but the computation cost of our TPCM scheme increases more slowly compared with other schemes and is lower than the computation cost of other schemes.
7.2. Communication Overhead
We assume the pseudonym and key length are 16 bytes, the hash value length is 4 bytes, and the signature and homomorphic ciphertext length are 67 bytes and 512 bytes, respectively [30]. For our TPCM scheme, the length of passenger’s carpooling information ciphertext is 595 bytes totally. The message length in the carpooling response and RSU verification phases is 595 bytes and 16 bytes, respectively. Comparing the communication overhead of our TPCM scheme with the FICA scheme [13] and PRIS scheme [32], Figure 4 and Figure 5 show the communication overhead of different carpooling schemes as the number of passengers and vehicles change. We can see that when the number of changes of passengers and vehicles from 100 to 1000, the communication overhead of our TPCM scheme is lower than other schemes regardless of whether the number of changes of passengers or vehicles. And it has a smaller growth rate compared with other schemes.
7.3. Probability of Successful Carpooling Matching
We propose a carpooling matching method that introduces travel preferences,
Figure 2. Time cost in passenger’s carpooling requesting.
Figure 3. Time cost in vehicle’s carpooling responding.
Figure 4. Communication overhead of passenger’s carpooling requesting.
Figure 5. Communication overhead of vehicle’s carpooling responding.
which uses the BF-PSI technology to match the vehicle’s preference attribute secret value set with the preference secret value set selected by the passenger. Figure 6 shows the change process of the probability that the carpooling is successfully matched n times with the size of the Bloom filter. We can see that with the increase of the size of the Bloom filter, the single matching success rate of our TPCM scheme is close to 100%, and the probability of multiple matching is almost 0. Therefore, the proposed carpooling matching scheme based on BF-PSI not only has high matching accuracy, but also has fast matching speed.
7.4. Evaluation of Trust Management Model
1) Simulation settings
In this section, we evaluate the robustness of the proposed trust management model. We mainly evaluate the robustness of the proposed model based on the changes in the average reputation scores of different carpooling vehicles. The factors that affect the average reputation score of a vehicle mainly include the percentage of malicious passengers in carpooling and the weight of passenger’s feedback. The detailed simulation parameter setting is shown in Table 5.
In addition, we use Rh and Rm to evaluate the robustness of the proposed trust management model, where Rh denotes the average reputation score of honest carpooling vehicles; Rm denotes the average reputation score of malicious carpooling vehicles. The reputation score range of passengers is (0, 1], which is generated by random sampling and obeys a normal distribution, where
,
.
(18)
2) Robustness evaluation
Table 5. Simulation parameter settings.
Figure 6. The probability of successful carpooling matching.
We mainly evaluate the robustness of proposed trust management model, that is, malicious passengers deliberately provide false trust feedback after carpooling to reduce or increase the trust value of certain travel preferences of the vehicle, thereby affecting the average reputation score of the vehicle. In this paper, the percentage of malicious passengers in carpooling is set to 5% - 25%. Each carpooling vehicle is first initialized and then performed 5 - 25 carpooling tasks respectively. The number of travel preferences selected by passengers is 1 - 7. After the interval, TA updates the trust value of each travel preference and preference attribute set of the unrevoked vehicle in the local database, and then updates the average reputation score of the vehicle based on the trust value of each updated travel preference. In the process of reputation update, the trust value of the travel preference of the carpooling vehicle that is not selected is 0.5 by default.
Figure 7 shows how the average reputation score of honest vehicles changes with the percentage of malicious passengers and weight ws. We can see that when the percentage of malicious passengers gradually increases from 5% - 20%, the average reputation score of honest vehicles decreases slowly, which indicates that the presence of malicious passengers can’t largely affect the average reputation score of honest vehicles. Therefore, our trust management model can resist attacks from malicious passengers. As ws decreases, the average reputation score of honest carpooling vehicles decreases slightly, which is due to the fact that after the trust value of the travel preferences selected of honest vehicles are updated, the trust value of the corresponding travel preferences increases in a large extent
Figure 7. Average reputation score of honest vehicles.
Figure 8. Average reputation score of malicious vehicles.
and is greater than the historical trust value of unselected travel preferences, reducing the weight ws is equivalent to reduce the weight of the travel preference selected and updated by passengers, and the average reputation score of honest vehicles is reduced.
Figure 8 shows the changing process of the average reputation score of malicious vehicles with the percentage of malicious passengers and weight ws. We can see that as the percentage of malicious passengers increases, the average reputation score of malicious vehicles increases very slowly, and the false feedback of malicious passengers can’t greatly increase the average reputation score of malicious vehicles. Therefore, the trust management model proposed in this paper shows robustness against malicious users’ attacks. With the weight ws decreases, the average reputation score of malicious vehicles has increased slightly, which is due to that after the trust value of travel preferences of vehicle reputation set selected by passengers is updated, the trust value rapidly decreases and is lower than the historical trust value of unselected travel preferences. Decreasing the weight ws is equivalent to increase wt, and the average reputation score of malicious vehicles is increased to a certain extent.
8. Conclusions
This paper adopts the privacy set intersection technology based on Bloom filter to propose a trusted and privacy-preserving carpooling matching scheme (TPCM). This scheme not only protects the privacy of vehicles and passengers during carpooling matching, but also solves the problem of carpooling mismatching caused by ignoring the individual needs of passengers by introducing travel preferences, which achieves a balance between precise carpooling matching and privacy protection; In addition, a multi-faceted trust management model is established to better describe the trust between the vehicles and the passengers, and to evaluate the trustworthiness of the vehicle from multi-faceted. Our TPCM scheme is robust against malicious attacks. Performance analysis shows that TPCM scheme can achieve fast and accurate carpooling matching, and has lower overhead compared with existing schemes.
In the future, we will consider the issue of batch authentication of multiple information, which will reduce the verification delay. And we will consider how to reduce the cost during the verification process and protect the privacy of the vehicle.
Acknowledgements
This work was in part supported by Fundamental Research Funds for the Central Universities of Jinan University (Grant No. 21621417), Natural Science Foundation of Guangdong Province of China (Grant No. 2017A030308013), Science and Technology Planning Project of Guangdong Province of China (Grant No. KTP20200022), National Natural Science Foundation of China (Grant No. 62032025, No. 62102167).