Vol. 2 No. 1 (2022): Journal of AI-Assisted Scientific Discovery
Articles

Privacy-Preserving Localization Techniques for Autonomous Vehicle Navigation Systems

Dr. Svetlana Bozhko
Professor of Applied Mathematics, Belarusian State University
Cover

Published 24-06-2024

Keywords

  • privacy-preserving techniques

How to Cite

[1]
Dr. Svetlana Bozhko, “Privacy-Preserving Localization Techniques for Autonomous Vehicle Navigation Systems”, Journal of AI-Assisted Scientific Discovery, vol. 2, no. 1, pp. 1–24, Jun. 2024, Accessed: Sep. 18, 2024. [Online]. Available: https://scienceacadpress.com/index.php/jaasd/article/view/50

Abstract

In this paper, we present several privacy-preserving techniques that can be used for vehicle localization in autonomous vehicles. These techniques use plausibly deniable encryption and randomness in initial seeds to hide the location trajectory of a vehicle while it is moving. We evaluate our techniques and demonstrate that it is possible to achieve the same level of accuracy (in terms of localization) and save power on the computing platform in the autonomous vehicle, as compared to using the basic distributed (or centralized) Monte Carlo localization algorithms. Our privacy-preserving algorithms also operate about the same amount of time as Monte Carlo localization, while the vehicle is moving on a given trajectory. We also demonstrate that an adversarial observer cannot retrieve the last known location or the true position trajectory of an autonomous vehicle that uses our privacy-preserving Monte Carlo localization algorithm while it is moving. Our work is the first published evidence that privacy-preserving vehicle localization is practical.

Downloads

Download data is not yet available.

References

  1. M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking," in IEEE Transactions on Mobile Computing, vol. 7, no. 5, pp. 557-571, May 2008.
  2. L. K. Hui, J. C. S. Lui, and D. M. Chiu, "Dynamic vehicle routing for mobile urban sensing networks with privacy preservation," in 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom), Seattle, WA, USA, 2011, pp. 197-206.
  3. H. Deng, Z. Liu, Y. Tao and S. S. Iyengar, "Privacy-preserving data collection and aggregation in mobile wireless sensor networks," 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, Pisa, 2007, pp. 1-9.
  4. Y. Xue, X. Lin, W. Trappe and R. P. Martin, "Outsourced private spatial data sets with location-based access control," in IEEE Transactions on Mobile Computing, vol. 9, no. 10, pp. 1421-1433, Oct. 2010.
  5. H. Shin, Y. Won, S. S. Kanhere and W. Hu, "Secure location-based services for vehicular networks," in IEEE Transactions on Vehicular Technology, vol. 64, no. 6, pp. 2741-2753, June 2015.
  6. S. Yi, Z. Qin, J. Li and Q. Li, "A Survey of Fog Computing: Concepts, Applications and Issues," in IEEE Access, vol. 5, pp. 2547-2564, 2017.
  7. Tatineni, Sumanth. "Cost Optimization Strategies for Navigating the Economics of AWS Cloud Services." International Journal of Advanced Research in Engineering and Technology (IJARET) 10.6 (2019): 827-842.
  8. Vemoori, Vamsi. "Comparative Assessment of Technological Advancements in Autonomous Vehicles, Electric Vehicles, and Hybrid Vehicles vis-à-vis Manual Vehicles: A Multi-Criteria Analysis Considering Environmental Sustainability, Economic Feasibility, and Regulatory Frameworks." Journal of Artificial Intelligence Research 1.1 (2021): 66-98.
  9. Mahammad Shaik, et al. “Envisioning Secure and Scalable Network Access Control: A Framework for Mitigating Device Heterogeneity and Network Complexity in Large-Scale Internet-of-Things (IoT) Deployments”. Distributed Learning and Broad Applications in Scientific Research, vol. 3, June 2017, pp. 1-24, https://dlabi.org/index.php/journal/article/view/1.
  10. Tatineni, Sumanth. "Deep Learning for Natural Language Processing in Low-Resource Languages." International Journal of Advanced Research in Engineering and Technology (IJARET) 11.5 (2020): 1301-1311.
  11. M. Yang, S. Zhu, and G. Cao, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," in IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 6, pp. 792-802, June 2008.
  12. S. Lee, K. Kim, and H. Lee, "Lightweight Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks," in IEEE Transactions on Vehicular Technology, vol. 66, no. 11, pp. 10048-10058, Nov. 2017.
  13. C. Liang, H. Luan, J. Lu, and P. Lin, "Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks," in IEEE Transactions on Mobile Computing, vol. 14, no. 4, pp. 821-835, April 2015.
  14. D. Yao, M. Li, L. Ma, and J. Yan, "Location Privacy Preservation for Outsourced Spatial Data in Mobile Cloud Computing," in IEEE Transactions on Services Computing, vol. 11, no. 5, pp. 825-838, Sept.-Oct. 2018.
  15. A. Asadi, Q. Wang, and V. C. M. Leung, "A survey on indoor positioning systems," in IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2548-2571, Fourthquarter 2015.
  16. X. Li, J. Yang, W. Lou, and X. Lin, "Privacy-preserving cooperative path planning for connected autonomous vehicles," in Proceedings of the 1st ACM Workshop on Cyber-Physical Systems Security & Privacy, New York, NY, USA, 2015, pp. 25-36.
  17. R. Lu, X. Lin, H. Zhu, X. Shen, and B. Liang, "ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications," in IEEE Transactions on Vehicular Technology, vol. 60, no. 7, pp. 3117-3128, Sept. 2011.
  18. H. K. Yap, K. C. Lee, and S. Tan, "An improved algorithm for secure elliptic curve based remote user authentication scheme," in IEEE Transactions on Consumer Electronics, vol. 55, no. 4, pp. 2031-2035, Nov. 2009.
  19. S. Chong, H. Kim, and T. Kwon, "A Secure and Efficient Key Management Scheme for Hierarchical Access Control in E-healthcare Cloud System," in IEEE Transactions on Consumer Electronics, vol. 64, no. 4, pp. 376-382, Nov. 2018.
  20. F. Hossain, M. Fotouhi, K. Dantu, and H. Kim, "A Secure and Lightweight Protocol for Vehicle-to-Cloud Communications in Autonomous Vehicles," in IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13742-13756, Nov. 2020.
  21. G. Chen, Y. Liu, and D. P. Agrawal, "Privacy-Preserving Health Data Collection in IoT-Enabled Fog Computing," in IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4423-4436, March 2021.
  22. S. S. Kanhere, S. Ruj, P. B. Patil, and D. C. Jinwala, "Protecting location privacy: optimal strategy for location obfuscation," in IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 2, pp. 205-217, March-April 2012.