{"id":"https://openalex.org/W4412444855","doi":"https://doi.org/10.1109/tdsc.2025.3588717","title":"PPDR: A Privacy-Preserving Dual Reputation Management Scheme in Vehicle Platoon","display_name":"PPDR: A Privacy-Preserving Dual Reputation Management Scheme in Vehicle Platoon","publication_year":2025,"publication_date":"2025-07-15","ids":{"openalex":"https://openalex.org/W4412444855","doi":"https://doi.org/10.1109/tdsc.2025.3588717"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3588717","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3588717","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/tdsc.2025.3588717","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yuxin Sun","orcid":"https://orcid.org/0009-0001-5543-8697"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuxin Sun","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062494507","display_name":"Zhiquan Liu","orcid":"https://orcid.org/0000-0002-3934-2177"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiquan Liu","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044918612","display_name":"Yingjie Xia","orcid":"https://orcid.org/0000-0002-4642-2503"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingjie Xia","raw_affiliation_strings":["Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102003367","display_name":"Zhen Guo","orcid":"https://orcid.org/0000-0003-3967-4304"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Guo","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptography), Hainan University, Haikou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptography), Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106406908","display_name":"Gao Liu","orcid":"https://orcid.org/0000-0003-1325-5611"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gao Liu","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100408451","display_name":"Leping Li","orcid":"https://orcid.org/0000-0003-4208-0259"},"institutions":[{"id":"https://openalex.org/I49835588","display_name":"Macao Polytechnic University","ror":"https://ror.org/02sf5td35","country_code":"MO","type":"education","lineage":["https://openalex.org/I49835588"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Leping Li","raw_affiliation_strings":["Macau Polytechnic University, Macao, China","Macau Polytechnic University, Gomes, Macao, China"],"affiliations":[{"raw_affiliation_string":"Macau Polytechnic University, Macao, China","institution_ids":["https://openalex.org/I49835588"]},{"raw_affiliation_string":"Macau Polytechnic University, Gomes, Macao, China","institution_ids":["https://openalex.org/I49835588"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","School of Cyber Engineering, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":17.4332,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.99413213,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"22","issue":"6","first_page":"6636","last_page":"6652"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9736999869346619,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10524","display_name":"Traffic control and management","score":0.9708999991416931,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/platoon","display_name":"Platoon","score":0.881106436252594},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.6697072982788086},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6401533484458923},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6157557368278503},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5676059126853943},{"id":"https://openalex.org/keywords/reputation-management","display_name":"Reputation management","score":0.5393227934837341},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5373790264129639},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4631253182888031},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3501555323600769},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.18609043955802917},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09977877140045166},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.0653923749923706}],"concepts":[{"id":"https://openalex.org/C2777735972","wikidata":"https://www.wikidata.org/wiki/Q1061967","display_name":"Platoon","level":3,"score":0.881106436252594},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.6697072982788086},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6401533484458923},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6157557368278503},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5676059126853943},{"id":"https://openalex.org/C2985362895","wikidata":"https://www.wikidata.org/wiki/Q478594","display_name":"Reputation management","level":3,"score":0.5393227934837341},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5373790264129639},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4631253182888031},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3501555323600769},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.18609043955802917},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09977877140045166},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0653923749923706},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3588717","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3588717","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tdsc.2025.3588717","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3588717","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W2003736153","https://openalex.org/W2053429694","https://openalex.org/W2132172731","https://openalex.org/W2172738493","https://openalex.org/W2292235288","https://openalex.org/W2346365475","https://openalex.org/W2935722734","https://openalex.org/W2951181522","https://openalex.org/W2960636321","https://openalex.org/W2969492043","https://openalex.org/W2989399708","https://openalex.org/W2992137023","https://openalex.org/W2997149329","https://openalex.org/W3039750169","https://openalex.org/W3082684594","https://openalex.org/W3129648592","https://openalex.org/W3145427160","https://openalex.org/W3195133315","https://openalex.org/W3207190436","https://openalex.org/W4205204726","https://openalex.org/W4214874606","https://openalex.org/W4220995194","https://openalex.org/W4226149406","https://openalex.org/W4226240301","https://openalex.org/W4226321645","https://openalex.org/W4245047333","https://openalex.org/W4285263682","https://openalex.org/W4296704977","https://openalex.org/W4319996312","https://openalex.org/W4367016603","https://openalex.org/W4388626204","https://openalex.org/W4389230872","https://openalex.org/W4389495243","https://openalex.org/W4390044105","https://openalex.org/W4390586505","https://openalex.org/W4396679079","https://openalex.org/W4399074273","https://openalex.org/W4406457483","https://openalex.org/W4410029388"],"related_works":["https://openalex.org/W2150669607","https://openalex.org/W67683368","https://openalex.org/W2373768903","https://openalex.org/W2005254893","https://openalex.org/W2886854648","https://openalex.org/W2355218793","https://openalex.org/W3125171412","https://openalex.org/W2348491339","https://openalex.org/W2264833100","https://openalex.org/W2054636800"],"abstract_inverted_index":{"Vehicle":[0],"platoon":[1],"has":[2],"attracted":[3],"much":[4],"attention":[5],"in":[6,12,66,120,163,267],"recent":[7],"years":[8],"for":[9,116],"its":[10],"benefits":[11],"improving":[13],"traffic":[14],"efficiency,":[15],"road":[16],"safety,":[17],"and":[18,59,86,94,140,177,198,216,245,252],"energy":[19],"consumption.":[20],"In":[21],"a":[22,33,37,45,63,98,156,170,205],"vehicle":[23,35,48,57,130,164],"platoon,":[24,58],"vehicles":[25],"can":[26,223],"take":[27],"on":[28,41],"the":[29,42,53,56,71,79,87,104,109,117,129,143,146,182,188,201,212,217,226,253,257,264],"roles":[30],"of":[31,55,145,190,228],"either":[32],"leading":[34,47,80],"or":[36,137],"following":[38,88],"vehicle,":[39],"depending":[40],"need.":[43],"Selecting":[44],"reliable":[46],"is":[49,260],"crucial":[50],"to":[51,108,127,210],"improve":[52,225],"reliability":[54],"reputation":[60,73,82,90,100,105,111,131,147,172,184,192,219,229],"management":[61,74,106,148,161,220,230],"plays":[62],"vital":[64],"role":[65],"this":[67,121],"selection":[68],"process.":[69],"However,":[70],"existing":[72,265],"schemes":[75,125,266],"do":[76],"not":[77],"distinguish":[78],"vehicle's":[81,89,171],"value":[83,91,132,173,176,193],"(LV-Reputation":[84],"value)":[85],"(FV-Reputation":[92],"value),":[93],"merge":[95],"them":[96],"into":[97,174],"single":[99,110,183],"value,":[101,179],"which":[102,222],"exposes":[103],"scheme":[107,162,168,203,259],"attack,":[112],"an":[113],"attack":[114],"identified":[115],"first":[118],"time":[119],"work.":[122],"Additionally,":[123],"some":[124,141],"fail":[126],"preserve":[128],"privacy,":[133,136,139,194,197,200],"feedback":[134,195],"score":[135,196,206],"identity":[138,199],"overlook":[142],"security":[144,236],"scheme.":[149,231],"To":[150],"address":[151],"these":[152],"issues,":[153],"we":[154],"propose":[155],"Privacy-Preserving":[157],"Dual":[158],"Reputation":[159],"(PPDR)":[160],"platoon.":[165],"The":[166],"PPDR":[167,202,258],"separates":[169],"LV-Reputation":[175],"FV-Reputation":[178],"effectively":[180],"mitigating":[181],"attack.":[185],"Furthermore,":[186],"under":[187],"premise":[189],"preserving":[191],"employs":[204],"difference":[207],"calculation":[208],"algorithm":[209],"support":[211],"weighted":[213],"average":[214],"mechanism":[215],"dual":[218],"mechanism,":[221],"significantly":[224,261],"accuracy":[227],"It":[232],"also":[233],"provides":[234],"strong":[235],"with":[237],"acceptable":[238],"computation":[239],"communication":[240],"overheads.":[241],"Comprehensive":[242],"theoretical":[243],"analysis":[244],"simulation":[246],"evaluation":[247],"have":[248],"been":[249],"carried":[250],"out,":[251],"results":[254],"demonstrate":[255],"that":[256],"superior":[262],"than":[263],"several":[268],"aspects.":[269]},"counts_by_year":[{"year":2026,"cited_by_count":9},{"year":2025,"cited_by_count":16}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
