Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3132211.3132464acmconferencesArticle/Chapter ViewAbstractPublication PagessecConference Proceedingsconference-collections
research-article

Privacy-preserving of platoon-based V2V in collaborative edge: poster abstract

Published: 12 October 2017 Publication History

Abstract

Next generation 5G cellular networks is designed as a device-centric architecture, which provides not only human-based services but also machine-type communication (Internet of Things applications). To meet different kinds of next generation IoT service requirements such as automated driving, in this paper we discuss multiple automated vehicles, each of which owns processing and communication ability as a fog node and form into multiple groups as platoons to do pseudonym change procedure. Different from the traditional studies without platoon design concept, we consider "reaction time"- a practical platoon management factor which affecting intra-platoon spacing between the leading vehicle and the following vehicle, to tackle a platoon-aware pseudonym change problem for jointly achieving privacy gains and traffic efficiency among multiple platoons' cooperation at the edge.

References

[1]
A. R. Beresford and F. Stajano. 2003. Location privacy in pervasive computing. IEEE Pervasive Computing 2, 1 (2003), 46--55.
[2]
B. K. Chaurasia, S. Verma, G. S. Tomar, and S. M. Bhaskar. 2009. Pseudonym Based Mechanism for Sustaining Privacy in VANETs. In Proc. of CICSYN. 420--425.
[3]
Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, and David C. Parkes. 2009. On Non-cooperative Location Privacy: A Game-theoretic Analysis. In Proc. of ACM CCS. 324--337.
[4]
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. 2010. Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking. IEEE Transactions on Mobile Computing 9, 8 (2010), 1089--1107.
[5]
D. Jia, K. Lu, J. Wang, X. Zhang, and X. Shen. 2016. A Survey on Platoon-Based Vehicular Cyber-Physical Systems. IEEE Communications Surveys Tutorials 18, 1 (2016), 263--284.
[6]
Y. J. Ku, D. Y. Lin, C. F. Lee, P. J. Hsieh, H. Y. Wei, C. T. Chou, and A. C. Pang. 2017. 5G Radio Access Network Design with the Fog Paradigm: Confluence of Communications and Computing. IEEE Commun. Mag. 55, 4 (2017), 46--52.
[7]
Xinxin Liu, Han Zhao, Miao Pan, Hao Yue, Xiaolin Li, and Yuguang Fang. 2012. Traffic-aware Multiple Mix Zone Placement for Protecting Location Privacy. In Proc. of IEEE TNFOCOM. 972--980.
[8]
R. Lu, X. Lin, and X. Shen. 2010. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. In Proc. of IEEE INFOCOM. 1--9.
[9]
Y.-Y. Shih, W.-H. Chung, A.-C. Pang, T.-C. Chiu, and H.-Y. Wei. 2017. Enabling Low-Latency Applications in Fog-Radio Access Network. IEEE Network 31, 1 (2017), 52--58.
[10]
P. Pandey T. X. Tran, A. Hajisami and D. Pompili. 2017. Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges. IEEE Commun. Mag. 55, 4 (2017), 54--61.
[11]
D. Yang, X. Fang, and G. Xue. 2013. Truthful incentive mechanisms for k-anonymity location privacy. In Proc. of IEEE INFOCOM. 2994--3002.
[12]
J. Zhang and Y. Xu. 2012. Breaking and Repairing of an Anonymous and Traceable Communication Protocol for Vehicular Ad hoc Networks. In Proc. of IEEE ICCIT. 88--93.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SEC '17: Proceedings of the Second ACM/IEEE Symposium on Edge Computing
October 2017
365 pages
ISBN:9781450350877
DOI:10.1145/3132211
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fog/edge computing
  2. internet of things
  3. platoon
  4. privacy-preserving
  5. vehicular networks

Qualifiers

  • Research-article

Conference

SEC '17
Sponsor:
SEC '17: IEEE/ACM Symposium on Edge Computing
October 12 - 14, 2017
California, San Jose

Acceptance Rates

SEC '17 Paper Acceptance Rate 20 of 41 submissions, 49%;
Overall Acceptance Rate 40 of 100 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 216
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media