You are currently viewing a new version of our website. To view the old version click .
Cryptography
  • Article
  • Open Access

7 December 2022

Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection

,
,
and
1
School of Mathematics and Information Science, Guangzhou University, Guangzhou 510006, China
2
School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Lightweight Cryptography, Cybersecurity and IoT

Abstract

Performing location-based services in a secure and efficient manner that remains a huge challenge for the Internet of Vehicles with numerous privacy and security risks. However, most of the existing privacy protection schemes are based on centralized location servers, which makes them all have a common drawback of a single point of failure and leaking user privacy. The employment of anonymity and cryptography is a well-known solution to the above problem, but its expensive resource consumption and complex cryptographic operations are difficult problems to solve. Based on this, designing a distributed and privacy-secure privacy protection scheme for the Internet of Vehicles is an urgent issue for the smart city. In this paper, we propose a privacy protection scheme for the Internet of Vehicles based on privacy set intersection. Specially, using privacy set intersection and blockchain techniques, we propose two protocols, that is, a dual authentication protocol and a service recommendation protocol. The double authentication protocol not only ensures that both communicating parties are trusted users, but also ensures the reliability of their session keys; while the service recommendation protocol based on pseudorandom function and one-way hash function can well protect the location privacy of users from being leaked. Finally, we theoretically analyze the security that this scheme has, i.e., privacy security, non-repudiation, and anti-man-in-the-middle attack.

1. Introduction

Traffic congestion and road accidents are becoming increasingly severe with the increasing number of vehicles. It has caused great potential threats to their privacy, property, and even their lives. However, with the development of new generation mobile communication technologies, location-based services on the Internet of Vehicles (IoV) have become popular, which have alleviated the above problems to some extent and brought great convenience to people in their lives, such as carpooling [1,2], Ride-hailing [3,4,5], navigation [6,7] and finding parking spaces [8,9]. Unfortunately, however, it still poses a certain level of security threat to people. For example, the data traffic generated during data interaction can be analyzed by hackers to get the rest of the user’s sensitive information [10,11,12].
Most of the existing privacy protection schemes for the IoV generally adopt a centralized location server, which then performs location-based services via user-initiated location service queries. However, such schemes suffer from shortcomings such as single points of failure and user privacy leakage. Based on this, some scholars have tried to secure the privacy of the IoVs in other ways, and blockchain technology is a good way to do this.
Blockchain is a distributed network that can secure privacy in the IoV with hash functions and cryptography, and is not tampered with, and also supports the traceability of vehicle information. Existing blockchains can be divided into two categories, public and federated, depending on whether they require licensing authority. Where a public chain is a fully decentralized blockchain system that does not require a trusted center for maintenance, a federated chain is a partially decentralized or polycentric blockchain system. With the emergence of blockchain technology, some scholars have tried to combine blockchain technology with the IoV, and many schemes have been proposed [13,14,15]. However, since the public chain-based privacy protection scheme requires a consensus mechanism for inter-node maintenance, it runs slower compared to the federation chain-based privacy protection scheme.
Another issue that needs our attention is that privacy protection schemes based on anonymous, complex cryptographic algorithms can protect the privacy and security of users, but they consume enormous resources. Can we use the existing fundamental knowledge to propose a novel privacy protection scheme for vehicular networks? For this, we invoke the privacy set intersection (PSI). PSI is a specific problem in secure multi-party computation that allows participants to input private sets and jointly compute the intersection of private sets without revealing any information beyond the intersection. PSI-based privacy protection schemes can perform location-based services while protecting user privacy [16]. Nevertheless, it is still a great challenge to get a good application in the highly flexible and scalable vehicular networks.

1.1. Motivations

Existing privacy protection schemes for the IoV are difficult to protect users’ identity and location privacy in a privacy-secure manner. The main objective of this paper is to propose a privacy protection scheme for the IoV based on private set intersection, and to analyze the security of the proposed scheme from a theoretical point of view.

1.2. Contributions

To address the privacy and security issues in the IoV as much as possible, this paper proposes a privacy protection scheme for the IoV based on privacy set intersection. The legitimate user in the scheme completes the location-based service by initiating a query for the location-based service. In this process, no additional personal information of the user is disclosed and no large and complex cryptographic operations are required.
Below, we conclude our main contributions as follows.
1.
Privacy Security: This scheme can effectively protect the privacy and security of users from privacy and security threats caused by man-in-the-middle attacks.
2.
Dual Authentication Protocol: The dual authentication protocol based on PSI can achieve dual guarantees: First, it ensures that both communicating parties have registration certificates issued by the trusted authority (TA) and are trusted users. Second, it ensures that both communicating parties have established secure and reliable session keys in the process.
3.
Collaborative Recommendation of Location Services: Based on pseudorandom functions and secure one-way hash functions, we propose a privacy-secure PSI-based collaborative recommendation location service protocol. It can well protect the privacy and security of users without requiring large computational overhead and complex cryptographic algorithms.
4.
Distributed Storage of Transaction Information: We construct a private blockchain formed by the location service provider (LSP) and record service recommendation information in its transaction ledger to reduce LSPs’ storage costs.

1.3. Organization

The rest of this paper is organized as follows. We present the related work in Section 2, the scheme model and design goals in Section 3, some preparatory knowledge in Section 4, the main location privacy protection scheme in Section 5, the security analysis of our scheme and its comparison with existing schemes in Section 6, the performance analysis of our scheme and its comparison with existing schemes in Section 7, and finally a summary of the full paper in Section 8.

3. Problem Statement

3.1. System Model

The system model of this scheme consists of trusted authority (TA), road side unit (RSU), requesting users ( R U i ), collaborating users ( C U j ), and location service provider (LSP) which are depicted in Figure 1.
Figure 1. System model. Here, (a) the TA initializes the system, and then the user i d i register with the trusted authority and obtain the corresponding public-private key pair; (b) each user i d i ( R U i and C U j ) authenticates with each other; (c) the user i d i makes a service query (response) and sends it to the RSU, where (c.1) the R U i initiates a service query and (c.2) the C U j generates a service response; (d) the RSU writes the identity and transaction content of user i d i to the transaction and sends it to the blockchain network. Finally, the R U i and C U j will establish a personal channel to complete the relevant service recommendations.
1.
TA: A trust center, mainly responsible for user registration, generation of system private key s k , system public key p k and system parameters p a r a m s .
2.
LSP: A location service provider, which is the core component of this paper, is primarily responsible for the maintenance of the blockchain.
3.
RSU: A roadside infrastructure is installed on both sides of the road with some computing and storage capacity, mainly responsible for message forwarding, functional verification, and PSI operations.
4.
R U i : Users who initiate location service queries.
5.
C U j : Users who respond to a location service query.
The key notations are listed in Table 1.
Table 1. Symbol description.

3.2. Threat Model

The main security threats to this scheme originate from the following components.
1.
Most of the requesting users are honest and trustworthy, and will send real and reliable location service queries. However, a small percentage of requesting users will upload false location service queries or repeatedly initiate queries multiple times within a short period of time, thus reducing system security and query efficiency.
2.
Most of the collaborative users are honest and trustworthy, and will generate true and reliable location service responses based on their historical experience, background knowledge. However, there exists a small percentage of collaborative users who will generate false service responses, thus reducing service efficiency.
3.
A typical vulnerable attack during the communication between two parties is the man-in-the-middle attack, where a malicious user can perform acts such as wiretapping and forging messages during the communication between two parties.
4.
Security threats due to physical factors are not considered.

3.3. Design Goals

The design goals of this scheme have the following main parts.
1.
Identity Privacy: The user’s identity information is anonymous to other users, RSUs and LSPs during the registration, authentication and service query process.
2.
Location Privacy: Users’ location information must be protected from remaining malicious users who may obtain it in an undisclosed manner and derive the rest of the user’s sensitive information from it.
3.
Route Privacy: The user’s route information is known only to him/herself, and it is difficult for the rest of the users to infer the user’s route from the available information.
4.
Non-Repudiation: No user can repudiate the act of sending a message and the content of the message. TA can reveal the identity of users who have malicious behavior.
5.
Anti-Man-in-the-Middle Attack: No man-in-the-middle attacks from malicious users during the communication between the two parties.

4. Preliminaries

In this section, we briefly revisit elemental techniques that are used to support the construction of the proposed scheme. These include bilinear pairing, the problem of collusion attack algorithm with k traitors (k-CAA), and private set intersection.

4.1. Bilinear Pairing

Assume G 1 , G 2 are cyclic groups of prime order p, where g 1 is a generator in G 1 . Let e : G 1 × G 1 G 2 be a bilinear pairing if the following conditions are satisfied.
1.
Bilinearity: for all z 1 G 1 , z 2 G 2 and w 1 , w 2 Z P * , e w 1 z 1 , w 2 z 2 = e z 1 , z 2 w 1 w 2 .
2.
Non-degeneracy: e g 1 , g 1 1 .
3.
Computability: for all z 1 G 1 and z 2 G 2 , e z 1 , z 2 is efficiently computable.

4.2. k-CAA Problem

For any integer k and s Z P * , g 1 G 1 , given v 1 , , v k Z p * , g 1 , s g 1 , g 1 s + v 1 , , g 1 s + v k , compute v , g 1 s + v , where v Z p * and v v 1 , , v k .

4.3. Private Set Intersection

PSI means that the participants input the private set and jointly compute the intersection of the private set without revealing any information other than the intersection. And the most popular PSI scheme is the PSI scheme based on oblivious pseudo-random functions (OPRF-Based PSI), as shown in Figure 2.
Figure 2. OPRF-Based PSI.
1.
Sender holds the set Y = y 1 , , y n , Receiver holds the set X = x 1 , , x n , k i is Sender’s private key, and F is an oblivious pseudo-random function.
2.
Receiver sends x i X to OPRF. Then OPRF generates k i and F k i , x i and sends them to Sender and Receiver respectively.
3.
When receiving k i , Sender computes F k i , y 1 , , F k i , y n and sends it to the Receiver.
4.
When receiving F k i , y 1 , , F k i , y n from Sender, Receiver contrasts F k i , x i with F k i , y j , and then generates the PSI results for Sender and Receiver.
In Section 5.4, we construct a dual authentication protocol using PSI techniques and define a notation, i.e., P S I X , Y , which indicates that the PSI result of the set X and Y is P S I X , Y . For this, we make the following rules.
P S I X , Y 1 , P S I X , Y = X = Y , 0 , O t h e r w i s e .
If Sender and Receiver have the same set, i.e., P S I X , Y = X = Y , then we make P S I X , Y 1 ; otherwise we make P S I X , Y 0 .

5. The Proposed Scheme

5.1. Overview

The scheme consists of the following parts: system initialization, user registration, dual authentication, service query (response), service recommendations and service transactions. The flow of the scheme is shown in Figure 3. Specifically, In (i), each user (requesting user and collaborating user) registers with the TA and generates the corresponding public-private key pair. In (ii), each user to be communicated authenticates with each other and generates a temporary session key. In (iii), the requesting user initiates a service request (and the collaborating user generates a service response) and sends it to the RSU. In (iv), the RSU performs signature verification of the requesting user (or collaborating user) and generates the corresponding service recommendation for the requesting user. Finally, in (v), the requesting user and the collaborating user establish a communication channel to complete the service recommendation.
Figure 3. Overview of the proposed scheme.

5.2. System Initialization

Given a security parameter λ , the TA generates two cyclic groups G 1 , G 2 of prime order p p 2 λ and chooses a bilinear pairing e : G 1 × G 1 G 2 , where g 1 is a generator in G 1 , and g 2 = e g 1 , g 1 . The TA chooses three hash functions H 1 : 0 , 1 * Z p * , H 2 : Z p * × G 1 Z p * , H 3 : 0 , 1 * 0 , 1 κ , and H 4 : 0 , 1 * × Z p * { 0 , 1 } l . Next, the TA chooses s R Z p * , computes h 1 = s g 1 and generates a user’s certificate of registration C T A = H 1 i d T A s . Finally, the public key is p k = h 1 , the private key is s k = s , and the public parameters is p a r a m s = G 1 , G 2 , g 1 , g 2 , e , p , p k , H 1 , H 2 , H 3 , H 4 .

5.3. User Registration

Each user i d i ( R U i and C U j ) must register with the TA and generate their own public-private key pair, specifically.
1.
The user i d i chooses s k i , 1 R Z p * , computes p k i , 1 = g s k i , 1 and sends p k i , 1 , H 1 i d i to TA via a public channel.
2.
When receiving p k i , 1 , H 1 i d i from user i d i , TA performs the following operations.
  • Compute s k i , 2 = 1 s + H 1 i d i g 1 .
  • Choose ξ 1 , ξ 2 R Z p * , and compute h 2 , h 3 g ξ 1 , g ξ 2 .
  • Finally, send s k i , 2 , h 2 , h 3 , C T A to user i d i via a secure channel.

5.4. Dual Authentication

In this part, R U i and C U j verify each other and agree on a temporary session key.
1.
R U i randomly chooses a security parameter κ for pseudorandom function (PRF) and a number α R Z p * . R U i computes
R 0 = g 1 α mod p , R 1 = α p k + g 1 · H 1 i d i , R 2 = 1 α + H 2 C T A , R 1 · s k i , 2 , R 3 = H 3 C T A R 0 R 1 R 2 κ .
Then R U i sends R 0 , R 1 , R 2 , R 3 to C U j via public channel.
2.
When receiving R 0 , R 1 , R 2 , R 3 from R U i , C U j verifies
e R 2 , R 1 + H 2 C T A , R 1 p k + g 1 · H 1 i d i = ? g 2 .
If the verification is correct, C U j chooses a number β R Z p * and computes
κ = R 3 H 3 C T A R 0 R 1 R 2 , C 0 = g 1 β mod p , C 1 = β p k + g 1 · H 1 i d i , C 2 = 1 β + H 2 C T A , C 1 · s k i , 2 , C 3 = R 0 β , C 4 = H 3 F κ C T A , C 3 .
Then C U j sends C 0 , C 1 , C 2 , C 4 to R U i via public channel.
3.
When receiving C 0 , C 1 , C 2 , C 4 from C U j , R U i verifies
e C 2 , C 1 + H 2 C T A , C 1 p k + g 1 · H 1 i d i = ? g 2
If the verification is correct, R U i computes R 4 = C 0 α , R 5 = H 3 F κ C T A , R 4 and performs a intersection operation on R 5 , C 4 . If P S I R 5 , C 4 1 , i.e., P S I R 5 , C 4 = R 5 = C 4 , this indicates that C U j and R U i have the same registration certificate C T A issued by TA and generate a secure and reliable session key S K = C 3 = R 4 , and indicates that C U j is a reliable user. Then R U i sends R 5 to C U j via public channel; otherwise, interrupt process.
4.
When receiving R 5 from R U i , C U j performs a intersection operation on C 4 , R 5 . If P S I C 4 , R 5 1 , i.e., P S I C 4 , R 5 = C 4 = R 5 , this indicates that R U i and C U j have the same registration certificate C T A issued by TA and generate a secure and reliable session key S K = R 4 = C 3 , and indicates that R U i is a reliable user; otherwise, interrupt process.
The proof of correctness of the Equations (3) and (5) are demonstrated as shown below.
e R 2 , R 1 + H 2 C T A , R 1 p k + g 1 · H 1 i d i = e 1 α + H 2 C T A , R 1 · s k i , 2 , α p k + g 1 · H 1 i d i + H 2 C T A , R 1 p k + g 1 · H 1 i d i = e 1 α + H 2 C T A , R 1 s + H 1 i d i · g 1 , α + H 2 C T A , R 1 s + H 1 i d i g 1 = e g 1 , g 1 = g 2 .
e C 2 , C 1 + H 2 C T A , C 1 p k + g 1 · H 1 i d i = e 1 β + H 2 C T A , C 1 · s k i , 2 , β p k + g 1 · H 1 i d i + H 2 C T A , C 1 p k + g 1 · H 1 i d i = e 1 β + H 2 C T A , C 1 s + H 1 i d i · g 1 , β + H 2 C T A , C 1 s + H 1 i d i g 1 = e g 1 , g 1 = g 2 .

5.5. Service Query (Response)

In the service query (response) part, R U i initiates a service query ( C U j generates a service response) and sends it to the RSU for service recommendations, specifically.
1.
The user i d i chooses numbers r 1 , r 2 R Z p * and computes D 1 = g r 1 , D 2 = g r 2 , D 3 = h 2 r 1 h 3 r 3 s k i , 2 .
2.
The user i d i computes E = H 3 F κ M , L 1 = H 1 D 1 , D 2 , D 3 , E , L 2 = r 1 + s k i , 1 L 1 , and L 3 = r 2 + s k i , 1 L 1 , where M { 0 , 1 } l is the service query contents of R U i (or the service response contents of C U j ).
3.
Finally, the user i d i sends σ E , D 1 , D 2 , D 3 , L 1 , L 2 , L 3 to the RSU via public channel.

5.6. Service Recommendations

When receiving σ from different users i d i ( R U i or C U j ), the RSU performs the following operations:
1.
Compute D 1 = g L 2 p k i , 1 L 1 , D 2 = g L 3 p k i , 1 L 1 , and L 1 = H 1 D 1 , D 2 , D 3 , E and then verify the validity of D 1 = ? D 1 , D 2 = ? D 2 , and L 1 = ? L 1 . If it is not valid, drop the corresponding query (response); otherwise, continue.
2.
For two different users i d i ( R U i and C U j ) of E i σ i , compute P S I E i , E j and send it to the R U i
3.
Write i d i , E i , i d j , E j , E i E j i j into the transaction and send it to the blockchain network.
The proof of correctness of the equations D 1 = ? D 1 , D 2 = ? D 2 , and L 1 = ? L 1 are demonstrated as shown below.
D 1 = g L 2 p k i , 1 L 1 = g r 1 + s k i , 1 L 1 g s k i , 1 L 1 = g r 1 = D 1 .
D 2 = g L 3 p k i , 1 L 1 = g r 2 + s k i , 1 L 1 g s k i , 1 L 1 = g r 2 = D 2 .
L 1 = H D 1 , D 2 , D 3 , E = H D 1 , D 2 , D 3 , E = L 1 .

5.7. Service Transactions

In the service transactions part, the R U i and C U j will complete the relevant service recommendations via the personal channel. Specifically, the C U j encrypts the relevant service response content, i.e., E n c S K M = H 4 S K , C T A M , using the temporary session key S K = C 3 = R 4 and finally sends it to the R U i . And the R U i completes the location-based service query by computing D e c S K E n c S K M = E n c S K M H 4 S K , C T A = M .

6. Privacy and Security Analysis

In this section, we analyze the privacy and security of the proposed scheme, which mainly includes identity privacy, location privacy, route privacy, non-repudiation, and anti-man-in-the-middle attacks.

6.1. Identity Privacy

In our scheme, we protect the privacy of the user’s identity. During the user registration process, each user i d i must register with the TA to obtain the corresponding private key s k i , 2 and registration certificate C T A . And in this process, all users are registered using the hash of their identity, i.e., H 1 ( i d i ) , without revealing the user’s identity information. In the dual authentication process, each user proves that he or she is secure and trustworthy via a registration certificate C T A obtained at the time of registration, while maintaining the user’s anonymity. In the service query (response) process, the user’s identity information is secure because the user’s identity (in this case, anonymous identity) is not involved. In summary, the user’s identity information is anonymous to the rest of the users, RSUs and LSPs. However, the user’s identity privacy is conditionally secure for the TA. This is because the user’s private key s k i , 2 is issued by the TA. If the TA is compromised, the user’s identity will be revealed.

6.2. Location Privacy

In the service query (response) process, we use a secure pseudo-random function and a one-way hash function to process the user’s location data, i.e., H 3 F κ M . And during the service transaction, we process the user’s location data by its constructed session key, i.e. E n c S K M . The location data processed in both ways will become indistinguishable, thus ensuring the privacy and security of the user’s location.

6.3. Route Privacy

When R U i initiates a service query ( C U j generates a service response), it is known from Section 6.2 that the user’s location privacy is security. Moreover, the user uses a pseudo-random function and a hash function for its message content M, i.e., E = H F κ M , which prevents the adversary from determining that E and E are generated by the same M. Finally, in the service transaction phase, we claim the following two facts. (1) R U i cannot infer the routing information of C U j from the location service sent by C U j . For example, there are three routes available for driving from A to B. R U i only knows that C U j took one of the three routes, and does not know which one was taken. (2) C U j also cannot infer the next routing information of R U i from the location service it sends. On the one hand, the path selection of R U i has a large uncertainty, and on the other hand, C U j cannot know whether R U i accepts the location service it sends.

6.4. Non-Repudiation

When there exists some malicious users who endanger the privacy and security of the rest of the users by means of message replay and forgery, TA can compute D 3 D 3 D 1 ξ 1 D 2 ξ 2 D 1 ξ 1 D 2 ξ 2 to obtain the private key of the malicious user and its corresponding identity.
The proof of correctness of the equations D 3 D 3 D 1 ξ 1 D 2 ξ 2 D 1 ξ 1 D 2 ξ 2 is demonstrated as shown below.
D 3 D 3 D 1 ξ 1 D 2 ξ 2 D 1 ξ 1 D 2 ξ 2 = h 2 r 1 h 3 r 3 s k i , 2 h 2 r 1 h 3 r 3 s k i , 2 g r 1 ξ 1 g r 2 ξ 2 g r 1 ξ 1 g r 2 ξ 2 = s k i , 2 .

6.5. Anti-Man-in-the-Middle Attack

We have mainly considered man-in-the-middle attack resistance in the dual authentication phase. Specifically, under the random oracle and k-CAA assumptions, we prove by Theorem 1 that the proposed signature technique is resistant to existential forgery in the dual authentication phase. This ensures that the dual authentication protocol proposed in this paper is resistant to man-in-the-middle attacks.
Theorem 1.
The proposed scheme is existentially unforgeable in the random oracle model under the k-CAA assumption.
Proof of Theorem 1.
We assume that there exists an attacker A who adaptively selects messages and identities can break the scheme proposed in this paper with a non-negligible advantage ε after performing n H i i = 1 , 2 times of H i i = 1 , 2 queries, n E times of private key extraction queries and n S times of signature queries within the time t. Then there exists a challenger C who can solve the n E C A A problem with a non-negligible advantage ε in time t .
We assume that given a challenge to C , i.e., given g 1 , h 1 = s g 1 , v 1 , v 2 , , v n E Z p * , the goal of C is to output a solution v , g 1 s + v of the n E C A A problem, where v v 1 , v 2 , , v n E .
1.
Setup. C runs the system initialization algorithm, then chooses α i Z p * , and computes R i , 1 = α i p k + g 1 · H 1 i d 1 1 i n H 1 . C constructs a list Q l i s t containing the array i d i , H 1 i d i , α i , R i , 1 , and finally sends the public parameter G 1 , G 2 , g 1 , g 2 , e , p , p k , H 1 , H 2 , R i , 1 i = 1 n H 1 to A .
2.
Queries. In response to the query of A , C maintains list Q 1 , Q 2 , Q 3 , Q 4 to track the H 1 query, H 2 query, private key extraction query and signature query of A . The list Q 1 , Q 2 , Q 3 , Q 4 is empty at the beginning. We assume that for each i d i 1 i n E , A has queried the H 1 value of i d i before performing H 2 query, private key extraction query and signature query for simplicity.
  • H 1 query. C maintains a list Q 1 containing the array i d i , H 1 i d i . Specifically, for i d i , C prepares a n H 1 response H 1 i d i i = 1 n H 1 and adds it to the Q 1 . When A makes a H 1 query to i d i , C recovers i d i , H 1 i d i from Q 1 and sends it to A .
  • H 2 query. C maintains a list Q 2 containing the array i d i , C T A , R i , 1 , O i . When A makes a H 2 query to C T A , R i , 1 , C recovers i d i , H 1 i d i , α i , R i , 1 from Q l i s t and chooses a number O i Z p * , so that O i = H 2 C T A , R i , 1 . Then adds i d i , C T A , R i , 1 , O i to Q 2 and sends O i to A .
  • Private key extraction query. When A makes a private key extraction query to i d i 1 i n E , C recovers i d i , H 1 i d i , α i , R i , 1 from Q l i s t and then verifies H 1 i d i ? v 1 , v 2 , , v n E . If H 1 i d i v 1 , , v n E , output “⊥” (“” means failure). Otherwise there is H 1 i d i v 1 , v 2 , , v n E (i.e., there is v j v 1 , , v n E such that H 1 i d i = v j ), then computes s k i , 2 = g 1 s + v j . Finally, adds i d i , s k i , 2 to Q 3 and sends α i , s k i , 2 to A .
  • Signature query. When A makes signature query to i d i , C T A , C recovers ( i d i , H 1 ( i d i ) ) from Q 1 and verifies H 1 i d i ? v 1 , , v n E . If H 1 i d i v 1 , , v n E , C outputs “⊥”. Otherwise, C computes R i , 2 = s k i , 2 α i + H 2 C T A , R i , 1 and sends it to A .
3.
A outputs a message signature pair C T A * , R i , 2 * about the i d i * , and the signature satisfies the following equation.
e R i , 2 * , R i , 1 * + H 2 C T A * , R i , 1 * p k + g 1 · H 1 i d i * = g 2
C verifies H 1 i d i * ? v 1 , v 2 , , v n E . If H 1 i d i * v 1 , v 2 , , v n E , output “⊥”. Otherwise, we have that equation (12) holds. Therefore, C can compute g 1 s + H 1 i d i * = α * + H 2 C T A * , R i , 1 * R i , 2 * and thus output the array H 1 i d i * , g 1 s + H 1 i d i * as a solution to the n E C A A problem, where H 1 i d i * v 1 , v 2 , , v n E . And this contradicts the k-CAA assumption that it is a difficult problem.
We compare this scheme with existing work in Table 2 in terms of privacy and security. Only the proposed scheme can satisfy all the conditions. Generally speaking, some smart parking, carpooling and ride hailing schemes [1,2,4,8,41] based on location services can protect users’ location privacy to a certain extent, but they can still lead to location and route information leakage due to malicious compromise by attackers.
Table 2. Comparison of privacy and security properties.

7. Performance Analysis

To instantiate our proposed scheme, we compare the proposed scheme with other existing schemes in terms of computational and communication overheads. The experimental performance verifies the efficiency and effectiveness of our scheme.

7.1. Experiment Setting

The experiments in our scheme were all conducted on a computer (Intel®Core™ i5-3470S CPU @ 2.90 GHz × 2, 3.8 GiB RAM) running Ubuntu 20.04.3 LTS 64-bit OS. We made use of modules such as hashlib and cryptography in Python. We first evaluate the time cost of the exponential operation T e , hash operation T h , and bilinear operation T p , where the time cost of each operation is the average time after running 1000 times. Specifically, the time cost of each operation is T e = 0.0431 ms, T h = 0.0293 ms, T p = 4.6691 ms. Next, we instantiated 100 users on a computer and compared the performance of our scheme with other schemes in terms of computation and communication overhead.

7.2. Computational Overhead

We experimentally evaluate the computational overhead of our scheme in the user registration, signature and signature verification phases and compare it with PiSim [7], SRPP [8], and ASAP [41], as shown in Figure 4.
Figure 4. Comparison of computational overhead.
In user registration, we only use exponential and hash operations with low computational overhead, making the computational overhead of this paper only 0.1586 ms, which is much smaller than [7,8,41]. In signature, we use only 5 exponential operations and 2 hash operations, and its computational overhead is 0.2741 ms. Compared with [7,8,41], our scheme has a slight advantage. And in signature verification, although we use bilinear operations with high computational overhead, we can still have some advantages in this paper compared with [7,8,41].

7.3. Communication Overhead

Next, we analyze the communication overhead of the user’s location service query during transmission.
In PPCS [30], the user generates a service query L q = u i d , x 1 , y 1 , , x n , y n , R , C , where u i d is the user’s identity, x 1 , y 1 , , x n , y n are the location data, R is the the radius of the user’s query scope, C is the service query content. Therefore, the total communication overhead is expressed as L q = u i d + x 1 , y 1 + + x n , y n + R + C 1.52 + 0.0020 n KBytes.
In RR-DLS [34], the user generates a service query L q = ( u i d , { ( x 1 , y 1 ) , , ( x n , y n ) , C 1 , , C n , V } ) , where C i is the service query content at location ( x i , y i ) , V is the degree of privacy protection. Therefore, the total communication overhead is expressed as | L q | = | u i d | + | ( x 1 , y 1 ) | + + | ( x n , y n ) | + | C 1 | + + | C n | + | V | 1.5 + 0.03 n KBytes.
In DK-A [45], the user generates a service request R i = n a m e i , p o s i , r e q i and sends it to a trusted server for encryption. After the server receives n service requests R i , it saves n a m e i i = 1 n and generates two matrices O , E about the service requests. Finally, it outputs O × E as the user’s service query, where n a m e i is the user ID, p o s i is the location data, r e q i is the service query content. Therefore, the total communication overhead is expressed as O × E 0.0020 n 2 KBytes.
In our scheme, the user generates a service query σ E , D 1 , D 2 , D 3 , L 1 , L 2 , L 3 , then its total communication overhead is expressed as σ = E + D 1 + D 2 + D 3 + L 1 + L 2 + L 3 0.10 KBytes. Specifically, since the number of occupied bits of D 1 , D 2 , D 3 , L 1 , L 2 , L 3 is fixed, and the number of bits of E is related to the hash function H 3 . In the case that H 3 is deterministic, the number of bits of E is also fixed and does not change with the number of users. Therefore, the communication overhead of the service query of the users in our scheme is constant 0.10 KBytes.
The results of the communication overhead comparison for each scheme are shown in Figure 5. Through our analysis, we found that the service queries of [30,34,45] are constructed based on anonymity sets, which makes their communication overhead increase linearly with the increase of anonymity sets. Although the increase of anonymity set can further improve the security of user’s location privacy, its higher communication overhead is not tolerable for us. In contrast, this paper reduces the communication overhead to a constant 0.10 while guaranteeing user privacy security. Obviously, our paper has a greater advantage in terms of communication overhead compared to [30,34,45].
Figure 5. Comparison of communication overhead.

8. Conclusions

To better protect users’ privacy and security, this paper proposes a privacy protection scheme for the Internet of Vehicles based on privacy set intersection. Specifically, we propose two privacy-secure protocols: a dual authentication protocol and a service recommendation protocol. The dual authentication protocol based on privacy set intersection has dual security guarantees. One can ensure that both sides of the authenticated communication are secure and trusted, and the other ensures that the session keys established by both sides in the process are secure and reliable. While in the service recommendation protocol, users are blinded to their location information by a pseudorandom function and a one-way hash function, making the user’s location information available and invisible. Compared with existing schemes, our scheme is more security, achieving identity privacy, location privacy, routing privacy, non-repudiation, and anti-man-in-the-middle attack. Also, it is experimentally shown that our scheme is significantly better than the existing schemes in terms of computation overhead and communication overhead.
In the future, we will design a more fully functional privacy protection scheme, such as migrating the PSI operation in the service recommendation protocol to the smart contract of the blockchain. Thus, we can avoid the privacy leakage of users due to the excessive authority of RSU.

Author Contributions

Conceptualization, Q.Z. and Z.Z.; methodology, Z.Z.; formal analysis, Q.Z., K.W. and M.C.; writing—original draft preparation, Z.Z.; writing—review and editing, Q.Z. and Z.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China grant number 2021YFA1000600 and by the National Natural Science Foundation of China grant number 12171114.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Baza, M.; Lasla, N.; Mahmoud, M.M.E.A.; Srivastava, G.; Abdallah, M. B-Ride: Ride Sharing with Privacy-preservation, Trust and Fair Payment Atop Public Blockchain. IEEE Trans. Netw. Sci. Eng. 2021, 8, 1214–1229. [Google Scholar] [CrossRef]
  2. Nabil, M.; Sherif, A.; Mahmoud, M.; Alsharif, A.; Abdallah, M. Efficient and Privacy-preserving Ridesharing Organization for Transferable and Non-transferable Services. IEEE Trans. Dependable Secur. Comput. 2021, 18, 1291–1306. [Google Scholar] [CrossRef]
  3. Zhao, Q.; Zuo, C.; Pellegrino, G.; Lin, Z. Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-hailing Services. In Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–27 February 2019. [Google Scholar]
  4. Yu, H.; Shu, J.; Jia, X.; Zhang, H.; Yu, X. Lpride: Lightweight and Privacy-preserving Ride Matching over Road Networks in Online Ride Hailing Systems. IEEE Trans. Veh. Technol. 2019, 68, 10418–10428. [Google Scholar] [CrossRef]
  5. Yu, H.; Zhang, H.; Yu, X.; Du, X.; Guizani, M. Pgride: Privacy-preserving Group Ridesharing Matching in Online Ride Hailing Services. IEEE Internet Things J. 2021, 8, 5722–5735. [Google Scholar] [CrossRef]
  6. Baruah, B.; Dhal, S. An Intelligent Privacy Preserving Vehicle Navigation System. In Proceedings of the 2019 IEEE Region 10 Symposium (TENSYMP), Kolkata, India, 7–9 June 2019; pp. 727–732. [Google Scholar]
  7. Li, M.; Chen, Y.; Zheng, S.; Hu, D.; Lal, C.; Conti, M. Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 2022, 19, 1133–1148. [Google Scholar] [CrossRef]
  8. Zhang, Y.; Zhang, L.; Kang, B.; Ma, Y.; Chen, T. Secure and Reliable Parking Protocol Based on Blockchain for Vanets. In Proceedings of the 2021 IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, China, 29 March–1 April 2021; pp. 1–6. [Google Scholar]
  9. Wang, L.; Lin, X.; Zima, E.; Ma, C. Towards Airbnb-like Privacy-enhanced Private Parking Spot Sharing Based on Blockchain. IEEE Trans. Veh. Technol. 2020, 69, 2411–2423. [Google Scholar] [CrossRef]
  10. Jiang, S.; Zhu, X.; Wang, L. An Efficient Anonymous Batch Authentication Scheme Based on HMAC for Vanets. IEEE Trans. Intell. Transp. Syst. 2016, 17, 2193–2204. [Google Scholar] [CrossRef]
  11. Arif, M.; Wang, G.; Bhuiyan, M.; Wang, T.; Chen, J. A Survey on Security Attacks in VANETs: Communication, applications and challenges. Veh. Commun. 2019, 19, 100179. [Google Scholar] [CrossRef]
  12. Chen, J.; He, K.; Yuan, Q.; Chen, M.; Du, R.; Xiang, Y. Blind Filtering at Third Parties: An Efficient Privacy-preserving Framework for Location-based Services. IEEE Trans. Mob. Comput. 2018, 17, 2524–2535. [Google Scholar] [CrossRef]
  13. Karim, H.; Rawat, D.B. Tollsonly Please—Homomorphic Encryption for Toll Transponder Privacy in Internet of Vehicles. IEEE Internet Things J. 2022, 9, 2627–2636. [Google Scholar] [CrossRef]
  14. Li, B.; Liang, R.; Zhou, W.; Yin, H.; Gao, H.; Cai, K. LBS Meets Blockchain: An Efficient Method with Security Preserving Trust in SAGIN. IEEE Internet Things J. 2022, 9, 5932–5942. [Google Scholar] [CrossRef]
  15. Qureshi, K.N.; Shahzad, L.; Abdelmaboud, A.; Elfadil Eisa, T.A.; Alamri, B.; Javed, I.T.; Al-Dhaqm, A.; Crespi, N. A Blockchain-based Efficient, Secure and Anonymous Conditional Privacy-preserving and Authentication Scheme for the Internet of Vehicles. Appl. Sci. 2022, 12, 476. [Google Scholar] [CrossRef]
  16. Li, Z.; Alazab, M.; Garg, S.; Hossain, M.S. Priparkrec: Privacy-preserving Decentralized Parking Recommendation Service. IEEE Trans. Veh. Technol. 2021, 70, 4037–4050. [Google Scholar] [CrossRef]
  17. Shamir, A. Identity-Based Cryptosystems and Signature Schemes. In Proceedings of CRYPTO 84 on Advances in Cryptology; Springer: Berlin/Heidelberg, Germany, 1985; Volume 196, pp. 47–53. [Google Scholar]
  18. Gupta, M.; Kumar, R.; Shekhar, S.; Sharma, B.; Patel, R.B.; Jain, S.; Dhaou, I.B.; Iwendi, C. Game Theory-based Authentication Framework to Secure Internet of Vehicles with Blockchain. Sensors 2022, 22, 5119. [Google Scholar] [CrossRef]
  19. Wu, T.-Y.; Guo, X.; Chen, Y.-C.; Kumari, S.; Chen, C.-M. SGXAP: Sgx-based Authentication Protocol in Iov-enabled Fog Computing. Symmetry 2022, 14, 1393. [Google Scholar] [CrossRef]
  20. Sikarwar, H.; Das, D. Towards Lightweight Authentication and Batch Verification Scheme in Iov. IEEE Trans. Dependable Secur. Comput. 2022, 19, 3244–3256. [Google Scholar] [CrossRef]
  21. Zhang, M.; Zhu, B.; Li, Y.; Wang, Y. Tpm-based Conditional Privacy-preserving Authentication Protocol in Vanets. Symmetry 2022, 14, 1123. [Google Scholar] [CrossRef]
  22. Jan, S.A.; Amin, N.U.; Shuja, J.; Abbas, A.; Maray, M.; Ali, M. SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for Iot Based Vehicular Ad Hoc Networks. Sensors 2022, 22, 4019. [Google Scholar] [CrossRef]
  23. Zhang, M.; Zhou, J.; Cong, P.; Zhang, G.; Zhuo, C.; Hu, S. LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in Iov. IEEE Trans. Autom. Sci. Eng. 2022, 1–16. [Google Scholar] [CrossRef]
  24. Jiang, Q.; Zhang, X.; Zhang, N.; Tian, Y.; Ma, X.; Ma, J. Three-factor authentication protocol using physical unclonable function for IoV. Comput. Commun. 2021, 173, 45–55. [Google Scholar] [CrossRef]
  25. Ahmim, I.; Ghoualmi-Zine, N.; Ahmim, A.; Ahmim, M. Security Analysis on “three-factor Authentication Protocol Using Physical Unclonable Function for Iov”. Int. J. Inf. Secur. 2022, 21, 1019–1026. [Google Scholar] [CrossRef]
  26. Zhao, P.; Huang, Y.; Gao, J.; Xing, L.; Wu, H.; Ma, H. Federated Learning-based Collaborative Authentication Protocol for Shared Data in Social Iov. IEEE Sens. J. 2022, 22, 7385–7398. [Google Scholar] [CrossRef]
  27. Sweeney, L. K-Anonymity: A Model for Protecting Privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 2002, 10, 557–570. [Google Scholar] [CrossRef]
  28. Gruteser, M.; Grunwald, D. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In MobiSys ’03, Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, CA, USA, 5–8 May 2003; Association for Computing Machinery: New York, NY, USA, 2003; pp. 31–42. [Google Scholar]
  29. Kido, H.; Yanagisawa, Y.; Satoh, T. An Anonymous Communication Technique Using Dummies for Location-Based Services. In Proceedings of the International Conference on Pervasive Services, Santorini, Greece, 11–14 July 2005; pp. 88–97. [Google Scholar]
  30. Sun, G.; Cai, S.; Yu, H.; Maharjan, S.; Chang, V.; Du, X.; Guizani, M. Location Privacy Preservation for Mobile Users in Location-based Services. IEEE Access 2019, 7, 87425–87438. [Google Scholar] [CrossRef]
  31. Liu, J.; Jiang, X.; Zhang, S.; Wang, H.; Dou, W. FADBM: Frequency-aware Dummy-based Method in Long-term Location Privacy Protection. In Proceedings of the 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), Tianjin, China, 4–6 December 2019; pp. 384–391. [Google Scholar]
  32. Niu, J.; Zhu, X.; Shi, L.; Ma, J. Time-aware Dummy-based Privacy Protection for Continuous LBSs. In Proceedings of the 2019 International Conference on Networking and Network Applications (NaNA), Daegu, Republic of Korea, 10–13 October 2019; pp. 15–20. [Google Scholar]
  33. Ni, L.; Tian, F.; Ni, Q.; Yan, Y.; Zhang, J. An Anonymous Entropy-based Location Privacy Protection Scheme in Mobile Social Networks. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 1–19. [Google Scholar] [CrossRef]
  34. Xu, X.; Chen, H.; Xie, L. A Location Privacy Preservation Method Based on Dummy Locations in Internet of Vehicles. Appl. Sci. 2021, 11, 4594. [Google Scholar] [CrossRef]
  35. Li, M.; Zhu, L.; Lin, X. Efficient and Privacy-preserving Carpooling Using Blockchain-assisted Vehicular Fog Computing. IEEE Internet Things J. 2019, 6, 4573–4584. [Google Scholar] [CrossRef]
  36. Wang, D.; Zhang, X. Secure Ride-sharing Services Based on a Consortium Blockchain. IEEE Internet Things J. 2021, 8, 2976–2991. [Google Scholar] [CrossRef]
  37. Yu, H.; Jia, X.; Zhang, H.; Shu, J. Efficient and Privacy-preserving Ride Matching Using Exact Road Distance in Online Ride Hailing Services. IEEE Trans. Serv. Comput. 2022, 15, 1841–1854. [Google Scholar] [CrossRef]
  38. Huang, J.; Luo, Y.; Xu, M.; Hu, B.; Long, J. Pshare: Privacy-preserving Ride-sharing System with Minimum-detouring Route. Appl. Sci. 2022, 12, 842. [Google Scholar] [CrossRef]
  39. Wang, K.; Liu, M.; Wang, J.; Wu, M.; Zhao, F. BBARHS: Blockchain-Based Anonymous Ride-Hailing Scheme for Autonomous Taxi Network. Secur. Commun. Netw. 2022, 2022, 8296608. [Google Scholar] [CrossRef]
  40. Ma, H.; Ping, Y.; Zhang, Y. Privacy-Preserving Cross-Zone Ride-Matching for Online Ride-Hailing Service. Math. Probl. Eng. 2022, 2022, 5040766. [Google Scholar] [CrossRef]
  41. Zhu, L.; Li, M.; Zhang, Z.; Qin, Z. ASAP: An Anonymous Smart-parking and Payment Scheme in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 2020, 17, 703–715. [Google Scholar] [CrossRef]
  42. Kou, B.; Cao, S.; Lv, J. A Privacy Protection Scheme for Carpooling Service Using Fog Computing. J. Phys. Conf. Ser. 2020, 1601, 032019. [Google Scholar] [CrossRef]
  43. Zhou, X.; He, D.; Khan, M.K.; Wu, W.; Choo, K.-K.R. An Efficient Blockchain-based Conditional Privacy-preserving Authentication Protocol for Vanets. IEEE Trans. Veh. Technol. 2022, 1–12. [Google Scholar] [CrossRef]
  44. Lin, C.; He, D.; Huang, X.; Kumar, N.; Choo, K.-K.R. BCPPA: A Blockchain-based Conditional Privacy-preserving Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2021, 22, 7408–7420. [Google Scholar] [CrossRef]
  45. Xing, L.; Jia, X.; Gao, J.; Wu, H. A Location Privacy Protection Algorithm Based on Double K-anonymity in the Social Internet of Vehicles. IEEE Commun. Lett. 2021, 25, 3199–3203. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.