• 제목/요약/키워드: Vehicle Privacy

검색결과 72건 처리시간 0.021초

Clustering-Based Federated Learning for Enhancing Data Privacy in Internet of Vehicles

  • Zilong Jin;Jin Wang;Lejun Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권6호
    • /
    • pp.1462-1477
    • /
    • 2024
  • With the evolving complexity of connected vehicle features, the volume and diversity of data generated during driving continue to escalate. Enabling data sharing among interconnected vehicles holds promise for improving users' driving experiences and alleviating traffic congestion. Yet, the unintentional disclosure of users' private information through data sharing poses a risk, potentially compromising the interests of vehicle users and, in certain cases, endangering driving safety. Federated learning (FL) is a newly emerged distributed machine learning paradigm, which is expected to play a prominent role for privacy-preserving learning in autonomous vehicles. While FL holds significant potential to enhance the architecture of the Internet of Vehicles (IoV), the dynamic mobility of vehicles poses a considerable challenge to integrating FL with vehicular networks. In this paper, a novel clustered FL framework is proposed which is efficient for reducing communication and protecting data privacy. By assessing the similarity among feature vectors, vehicles are categorized into distinct clusters. An optimal vehicle is elected as the cluster head, which enhances the efficiency of personalized data processing and model training while reducing communication overhead. Simultaneously, the Local Differential Privacy (LDP) mechanism is incorporated during local training to safeguard vehicle privacy. The simulation results obtained from the 20newsgroups dataset and the MNIST dataset validate the effectiveness of the proposed scheme, indicating that the proposed scheme can ensure data privacy effectively while reducing communication overhead.

스마트 그리드환경에서 전기자동차 양방향 충전기술의 보안과 개인정보 보호에 관한 연구 (Security and Privacy Protection of Vehicle-To-Grid Technology for Electric Vehicle in Smart Grid Environment)

  • 이성욱
    • 문화기술의 융합
    • /
    • 제6권1호
    • /
    • pp.441-448
    • /
    • 2020
  • Vehicle-to-Grid(V2G) 기술은 전기자동차의 배터리를 분산발전원 및 에너지 저장장치로의 이용하려는 기술로 스마트그리드의 주요한 한 부분을 차지하고 있다. V2G 네트워크는 양방향의 통신망을 사용함으로 피할 수 없는 보안 취약점과 개인정보보호의 문제를 가지고 있다. 본고에서는 V2G 시스템의 구조, 사용되는 개인정보, 보안취약점 및 보안 요구사항에 대해 자세히 알아보고 분석한다. 그리고 V2G 시스템의 특성을 고려하여 효율적인 V2G 시스템의 구조와 운용방안을 제안한다. 제안하는 방식은 대칭키 암호와 해쉬 알고리즘을 이용하여 개인정보의 유출을 방지하고 양방향 인증을 수행하며 개인정보 유출의 위험성을 최소화 한다.

Privacy-Preserving Traffic Volume Estimation by Leveraging Local Differential Privacy

  • Oh, Yang-Taek;Kim, Jong Wook
    • 한국컴퓨터정보학회논문지
    • /
    • 제26권12호
    • /
    • pp.19-27
    • /
    • 2021
  • 본 논문에서는 지역 차분 프라이버시(Local Differential Privacy, LDP) 기법을 이용하여 프라이버시를 보호하면서 수집한 차량 위치 데이터와 딥러닝 기법을 이용하여 교통량을 예측하기 위한 기법을 제시한다. 제시한 기법은 데이터를 수집하는 과정과 수집한 데이터를 이용하여 교통량을 예측하는 과정으로 구성된다. 첫 번째 단계에서는 데이터 수집 과정 중에 발생할 수 있는 프라이버시 침해 문제를 해결하기 위해 LDP 기법을 적용하여 차량의 위치 데이터를 수집한다. LDP 기법은 데이터 수집 시 원본 데이터에 노이즈를 추가해 사용자의 민감한 데이터가 외부에 노출되는 것을 방지한다. 이를 통해 운전자의 프라이버시를 보존하면서 차량의 위치 데이터를 수집할 수 있다. 두 번째 단계에서는 첫 번째 단계에서 수집한 데이터에 딥러닝 기법을 적용하여, 교통량을 예측한다. 또한, 본 논문에서 제안한 기법의 우수성을 입증하기 위해, 실데이터를 이용한 성능 평가를 진행한다. 성능 평가 결과는 본 논문에서 제안한 기법이 사용자의 프라이버시를 보호하면서 수집된 데이터를 이용하여 효과적으로 교통량을 예측할 수 있음을 입증한다.

A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs

  • Chen, Yi-Ming;Wei, Yu-Chih
    • Journal of Communications and Networks
    • /
    • 제15권2호
    • /
    • pp.153-163
    • /
    • 2013
  • In recent years, more and more researches have been focusing on trust management of vehicle ad-hoc networks (VANETs) for improving the safety of vehicles. However, in these researches, little attention has been paid to the location privacy due to the natural conflict between trust and anonymity, which is the basic protection of privacy. Although traffic safety remains the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither can be ignored. In this paper, we propose a beacon-based trust management system, called BTM, that aims to thwart internal attackers from sending false messages in privacy-enhanced VANETs. To evaluate the reliability and performance of the proposed system, we conducted a set of simulations under alteration attacks, bogus message attacks, and message suppression attacks. The simulation results show that the proposed system is highly resilient to adversarial attacks, whether it is under a fixed silent period or random silent period location privacy-enhancement scheme.

무인항공기 사생활 보호 방안 (Privacy Protection from Unmanned Aerial Vehicle)

  • 이보성;이중엽;박유진;김범수
    • 정보보호학회논문지
    • /
    • 제26권4호
    • /
    • pp.1057-1071
    • /
    • 2016
  • 무인항공기에 의한 사생활 침해는 신고를 필요로 하지 않는 소형 무인항공기에 장착된 영상정보처리기기로 인해 발생할 가능성이 크다. 본 논문에서는 무인항공기로부터의 사생활 보호를 위해 사생활 보호 관련 법령 - 개인정보보호법, 정보통신망법 - 등이 무인항공기에 장착된 영상정보처리기기의 이동성을 반영할 수 있도록 보완될 것을 제안한다. 이와 함께, 사생활 침해의 우려가 가장 큰 미신고 소형 무인항공기에 대한 규정을 항공관련 법령에 포함할 것을 제안한다. 또한 피촬영자의 무인항공기 인지 및 촬영된 영상정보에 대한 비식별화 조치 등의 기술적 대응 방안을 제안한다.

A Survey on Security Schemes based on Conditional Privacy-Preserving in Vehicular Ad Hoc Networks

  • Al-Mekhlafi, Zeyad Ghaleb;Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.105-110
    • /
    • 2021
  • Contact between Vehicle-to-vehicle and vehicle-to-infrastructural is becoming increasingly popular in recent years due to their crucial role in the field of intelligent transportation. Vehicular Ad-hoc networks (VANETs) security and privacy are of the highest value since a transparent wireless communication tool allows an intruder to intercept, tamper, reply and erase messages in plain text. The security of a VANET based intelligent transport system may therefore be compromised. There is a strong likelihood. Securing and maintaining message exchange in VANETs is currently the focal point of several security testing teams, as it is reflected in the number of authentication schemes. However, these systems have not fulfilled all aspects of security and privacy criteria. This study is an attempt to provide a detailed history of VANETs and their components; different kinds of attacks and all protection and privacy criteria for VANETs. This paper contributed to the existing literature by systematically analyzes and compares existing authentication and confidentiality systems based on all security needs, the cost of information and communication as well as the level of resistance to different types of attacks. This paper may be used as a guide and reference for any new VANET protection and privacy technologies in the design and development.

Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network

  • Nur Afiqah Suzelan Amir;Wan Ainun Mior Othman;Kok Bin Wong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권5호
    • /
    • pp.1450-1470
    • /
    • 2023
  • In a Vehicular Cloud (VC) network, an announcement protocol plays a critical role in promoting safety and efficiency by enabling vehicles to disseminate safety-related messages. The reliability of message exchange is essential for improving traffic safety and road conditions. However, verifying the message authenticity could lead to the potential compromise of vehicle privacy, presenting a significant security challenge in the VC network. In contrast, if any misbehavior occurs, the accountable vehicle must be identifiable and removed from the network to ensure public safety. Addressing this conflict between message reliability and privacy requires a secure protocol that satisfies accountability properties while preserving user privacy. This paper presents a novel announcement protocol for secure communication in VC networks that utilizes group signature to achieve seemingly contradictory goals of reliability, privacy, and accountability. We have developed the first comprehensive announcement protocol for VC using group signature, which has been shown to improve the performance efficiency and feasibility of the VC network through performance analysis and simulation results.

프라이버시를 보호하며 안전하고 효율적인 차량간 통신 프로토콜 (Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation)

  • 김인환;최형기;김정윤
    • 한국정보과학회논문지:정보통신
    • /
    • 제37권6호
    • /
    • pp.420-430
    • /
    • 2010
  • Vehicular Ad Hoc Network(VANET)은 차량과 차량, 차량과 네트워크 기반 구조 간에 통신을 지완하는 네트워크로서, 다양한 서비스를 제공할 수 있어 학문적으로나 상업적으로 많은 관심을 받고 있다. 그러나 VANET이 널려 사용되기 위해서는 보안과 프라이버시 관련 문제들이 선행적으로 해결되어야 한다. VANET은 무선 통신과 ad hoc network의 성질을 그대로 이어받아, 다양한 보안 취약점이 존재하며 이에 따라 다양한 공격이 가능하다. 또한, 프라이버시 요구사항을 만족시키지 못하는 경우, 공격자는 특정 차량에 때해서 추적할 수 있으며, 운전자의 민감한 개인정보들이 노출될 수 있다. VANET에서 프라이버시와 보안을 제공하기 위해 많은 연구들이 진행되었지만, 대부분이 차량 간의 통신 혹은 차량과 네트워크 기반 구조 간의 통신 중 하나에만 집중하고 있으며, 차량의 폐지목록(Revocation List)으로 인해 많은 네트워크 자원을 소비하고 있다. 본 논문에서는 차량과 네트워크 기반구조간의 효율적인 상호 인증을 제공하고, 상호인증 시 네트워크 기반 구조가 차량에게 짧은 시간 동안 차량과 차량 간의 통신에서 사용할 익명 인증서를 생성해주는 프로토콜을 제안한다. 보안 분석을 통해 제안한 프로토콜이 차량과 차량, 차량과 네트워크 기반 구조간의 안전한 통신을 보장하고, 차량의 프라이버시를 보호할 수 있음을 확인 하였으며, 성능 분석을 통해 제안한 프로토콜이 기존의 연구들 보다 높은 효율성을 지니고 있음을 검증하였다.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

Blockchain-Assisted Trust Management Scheme for Securing VANETs

  • Ahmed, Waheeb;Wu, Di;Mukathie, Daniel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권2호
    • /
    • pp.609-631
    • /
    • 2022
  • The main goal of VANETs is to improve the safety of all road users. Therefore, the accuracy and trustworthiness of messages transmitted in VANETs are essential, given that life may rely on them. VANETs are provided with basic security services through the use of public key infrastructure-based authentication. However, the trust of users is still an open issue in VANETs. It is important to prevent bogus message attacks from internal vehicles as well as protect vehicle privacy. In this paper, we propose a trust management scheme that ensures trust in VANETs while maintaining vehicle privacy. The trust scheme establishes trust between vehicles where a trust value is assigned to every vehicle based on its behavior and messages are accepted only from vehicles whose trust value is greater than a threshold, therefore, protecting VANETs from malicious vehicles and eliminating bogus messages. If a traffic event happens, vehicles upload event messages to the reachable roadside unit (RSU). Once the RSU has confirmed that the event happened, it announces the event to vehicles in its vicinity and records it into the blockchain. Using this mechanism, RSUs are prevented from sending fake or unverified event notifications. Simulations are carried out in the context of bogus message attacks to evaluate the trust scheme's reliability and efficiency. The results of the simulation indicate that the proposed scheme outperforms the compared schemes and is highly resistant to bogus message attacks.