{"title":"V2V能源交易中的双层位置隐私匹配","authors":"Saad Masood , Muneeb Ul Hassan , Pei-Wei Tsai , Jinjun Chen","doi":"10.1016/j.sysarc.2025.103507","DOIUrl":null,"url":null,"abstract":"<div><div>The recent increase in Electric Vehicles (EVs) on the road has highlighted privacy concerns, particularly in the Vehicle-to-Vehicle (V2V) energy trading scenario. Ensuring location privacy in Vehicular Ad Hoc Networks (VANETs) is crucial for user confidentiality. Existing privacy techniques in the V2V paradigm protect the location coordinates of the EVs, but privacy risks persist after EVs are matched. In this paper, we introduce a dual-layer location privacy matching (DLLPM) technique to enhance the privacy of V2V matching. Our approach utilizes Laplace differential privacy and partial homomorphic encryption, ensuring that the EV’s private data remains inaccessible to both participants and adversaries. We introduce a noise addition and clipping algorithm to obfuscate EV coordinates within a defined radius. Encrypted distance-based preference lists are generated using partial homomorphic encryption to establish differentially private stable matches. DLLPM ensures EV location privacy throughout the matching process and mitigates the risk of location privacy leakage even after suppliers and demanders exchange location information. Theoretical analysis and experimental results confirm the efficiency of DLLPM, demonstrating robust privacy preservation with a computational complexity of <span><math><mrow><mi>O</mi><mrow><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>log</mo><mi>n</mi><mi>⋅</mi><mrow><mo>(</mo><msub><mrow><mi>C</mi></mrow><mrow><mtext>enc</mtext></mrow></msub><mo>+</mo><msub><mrow><mi>C</mi></mrow><mrow><mtext>addHE</mtext></mrow></msub><mo>+</mo><msub><mrow><mi>C</mi></mrow><mrow><mtext>subHE</mtext></mrow></msub><mo>+</mo><msub><mrow><mi>C</mi></mrow><mrow><mtext>dec</mtext></mrow></msub><mo>)</mo></mrow><mo>)</mo></mrow></mrow></math></span>. We further evaluate computational performance using 128-bit and 256-bit encryption, showing that DLLPM achieves private and efficient matching in the V2V trading paradigm.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103507"},"PeriodicalIF":3.7000,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DLLPM: Dual-layer location privacy matching in V2V energy trading\",\"authors\":\"Saad Masood , Muneeb Ul Hassan , Pei-Wei Tsai , Jinjun Chen\",\"doi\":\"10.1016/j.sysarc.2025.103507\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The recent increase in Electric Vehicles (EVs) on the road has highlighted privacy concerns, particularly in the Vehicle-to-Vehicle (V2V) energy trading scenario. Ensuring location privacy in Vehicular Ad Hoc Networks (VANETs) is crucial for user confidentiality. Existing privacy techniques in the V2V paradigm protect the location coordinates of the EVs, but privacy risks persist after EVs are matched. In this paper, we introduce a dual-layer location privacy matching (DLLPM) technique to enhance the privacy of V2V matching. Our approach utilizes Laplace differential privacy and partial homomorphic encryption, ensuring that the EV’s private data remains inaccessible to both participants and adversaries. We introduce a noise addition and clipping algorithm to obfuscate EV coordinates within a defined radius. Encrypted distance-based preference lists are generated using partial homomorphic encryption to establish differentially private stable matches. DLLPM ensures EV location privacy throughout the matching process and mitigates the risk of location privacy leakage even after suppliers and demanders exchange location information. Theoretical analysis and experimental results confirm the efficiency of DLLPM, demonstrating robust privacy preservation with a computational complexity of <span><math><mrow><mi>O</mi><mrow><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>log</mo><mi>n</mi><mi>⋅</mi><mrow><mo>(</mo><msub><mrow><mi>C</mi></mrow><mrow><mtext>enc</mtext></mrow></msub><mo>+</mo><msub><mrow><mi>C</mi></mrow><mrow><mtext>addHE</mtext></mrow></msub><mo>+</mo><msub><mrow><mi>C</mi></mrow><mrow><mtext>subHE</mtext></mrow></msub><mo>+</mo><msub><mrow><mi>C</mi></mrow><mrow><mtext>dec</mtext></mrow></msub><mo>)</mo></mrow><mo>)</mo></mrow></mrow></math></span>. We further evaluate computational performance using 128-bit and 256-bit encryption, showing that DLLPM achieves private and efficient matching in the V2V trading paradigm.</div></div>\",\"PeriodicalId\":50027,\"journal\":{\"name\":\"Journal of Systems Architecture\",\"volume\":\"167 \",\"pages\":\"Article 103507\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Systems Architecture\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1383762125001791\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Systems Architecture","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1383762125001791","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
DLLPM: Dual-layer location privacy matching in V2V energy trading
The recent increase in Electric Vehicles (EVs) on the road has highlighted privacy concerns, particularly in the Vehicle-to-Vehicle (V2V) energy trading scenario. Ensuring location privacy in Vehicular Ad Hoc Networks (VANETs) is crucial for user confidentiality. Existing privacy techniques in the V2V paradigm protect the location coordinates of the EVs, but privacy risks persist after EVs are matched. In this paper, we introduce a dual-layer location privacy matching (DLLPM) technique to enhance the privacy of V2V matching. Our approach utilizes Laplace differential privacy and partial homomorphic encryption, ensuring that the EV’s private data remains inaccessible to both participants and adversaries. We introduce a noise addition and clipping algorithm to obfuscate EV coordinates within a defined radius. Encrypted distance-based preference lists are generated using partial homomorphic encryption to establish differentially private stable matches. DLLPM ensures EV location privacy throughout the matching process and mitigates the risk of location privacy leakage even after suppliers and demanders exchange location information. Theoretical analysis and experimental results confirm the efficiency of DLLPM, demonstrating robust privacy preservation with a computational complexity of . We further evaluate computational performance using 128-bit and 256-bit encryption, showing that DLLPM achieves private and efficient matching in the V2V trading paradigm.
期刊介绍:
The Journal of Systems Architecture: Embedded Software Design (JSA) is a journal covering all design and architectural aspects related to embedded systems and software. It ranges from the microarchitecture level via the system software level up to the application-specific architecture level. Aspects such as real-time systems, operating systems, FPGA programming, programming languages, communications (limited to analysis and the software stack), mobile systems, parallel and distributed architectures as well as additional subjects in the computer and system architecture area will fall within the scope of this journal. Technology will not be a main focus, but its use and relevance to particular designs will be. Case studies are welcome but must contribute more than just a design for a particular piece of software.
Design automation of such systems including methodologies, techniques and tools for their design as well as novel designs of software components fall within the scope of this journal. Novel applications that use embedded systems are also central in this journal. While hardware is not a part of this journal hardware/software co-design methods that consider interplay between software and hardware components with and emphasis on software are also relevant here.