2022
DOI: 10.1109/tits.2021.3121125
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Trust in the Internet of Vehicles

Abstract: The Internet of Vehicles aims to fundamentally improve transportation by connecting vehicles, drivers, passengers, and service providers together. Several new services such as parking space identification, platooning and intersection control-to name just a few-are expected to improve traffic congestion, reduce pollution, and improve the efficiency, safety and logistics of transportation. Proposed end-user services, however, make extensive use of private information with little consideration for the impact on u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 37 publications
(11 citation statements)
references
References 110 publications
0
11
0
Order By: Relevance
“…Collaborative learning underpins local decisions and allows vehicles to exchange their locally trained model parameters. As discussed in Section IV.B, albeit FL approaches are gradually gaining momentum towards the realization of privacy-by-design V2X (e.g., anonymous data collection and/or retrieval [425]), they still rely on a server-client architecture, rendering them vulnerable to several attacks (e.g., due to faulty software, hardware invasions, and unreliable communication channel). In addition, locally trained ML models may suffer from data poisoning and adversarial manipulations (e.g., malicious samples deliberately crafting the model).…”
Section: ) Vulnerabilities Of Decentralized Learning Solutionsmentioning
confidence: 99%
“…Collaborative learning underpins local decisions and allows vehicles to exchange their locally trained model parameters. As discussed in Section IV.B, albeit FL approaches are gradually gaining momentum towards the realization of privacy-by-design V2X (e.g., anonymous data collection and/or retrieval [425]), they still rely on a server-client architecture, rendering them vulnerable to several attacks (e.g., due to faulty software, hardware invasions, and unreliable communication channel). In addition, locally trained ML models may suffer from data poisoning and adversarial manipulations (e.g., malicious samples deliberately crafting the model).…”
Section: ) Vulnerabilities Of Decentralized Learning Solutionsmentioning
confidence: 99%
“…Some work has focused on vehicular applications with centralized trust mechanisms. 7,35 For example, Zhang et al 36 proposed centralized Software-Defined Vehicular Networks (SDVNs) considering trust management using deep reinforcement learning. They proved their mechanism could enhance the link quality via simulation.…”
Section: Related Workmentioning
confidence: 99%
“…However, all the above research only considered communication performance without security risks, thus lacking the security strategies against malicious attacks, which might cause serious traffic accidents in the worst cases. 7 Some researchers have focused on the significance of security. [8][9][10] They have proposed various security strategies for V2X communications using cryptography, 11,12 fuzzy and other traditional security considerations.…”
Section: Introductionmentioning
confidence: 99%
“…Driver privacy is a potential issue due to the growing advancement toward the connected-vehicle environment [ 26 ]. There are different types of privacy concerns in connected vehicle environments, including personal information privacy [ 27 ], location privacy [ 28 ], driving-data privacy [ 29 ], third-party privacy [ 30 ], and information sharing consent–related privacy [ 31 ].…”
Section: Performance Evaluation—a Case Studymentioning
confidence: 99%