Chrome Extension
WeChat Mini Program
Use on ChatGLM

Privacy Preserving Multi-party Computation with Secret Sharing for Trajectory Prediction in VANETs

Dengzhi Liu, Geng Yu, Yongdong Ding,Zhaoman Zhong,Chen Wang

IEEE Transactions on Vehicular Technology(2024)

Cited 0|Views0
No score
Abstract
Vehicular ad-hoc networks (VANETs) enable communication among vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) with a dedicated short range communications (DSRC). In VANETs, the real-time trajectory prediction service can be provided by roadside units (RSUs) using data collected from vehicles. This service is important for the prevention of traffic accidents. Due to the openness of the communication in VANETs, the transmitted data is vulnerable to illegal users' attacks that results in the leakage of vehicles' data. To address the above concerns, a privacy-preserving multi-party computation scheme with secret sharing is proposed for vehicle trajectory prediction in VANETs. The proposed scheme is designed to protect the privacy of transmitted vehicle data during trajectory prediction. Note that four distributed interactive protocols of $\boldsymbol{(\cdot)}$ , $\boldsymbol{SecExp( \cdot)}$ , $\boldsymbol{SecRec(\cdot)}$ and $\boldsymbol{SecCmp(\cdot)}$ are introduced to carry out the computation of nonlinear logarithm, exponent, reciprocal and comparison functions in the proposed scheme. The aforementioned interactive protocols facilitate the distributed deployment of the Adaboost ensemble learning algorithm among multiple RSUs, while ensuring the privacy of vehicle data using secret sharing simultaneously. Security analysis proves that the proposed scheme can effectively protect the privacy of vehicle data. Performance analysis demonstrates that the proposed scheme has a minimal impact on the prediction accuracy of the Adaboost algorithm compared to the differential privacy (DP)-based scheme. Furthermore, the low latency of the proposed scheme allows for efficient trajectory prediction, as demonstrated by the runtime of the proposed scheme on test set.
More
Translated text
Key words
VANETs,Trajectory Prediction,Multi-party Computation,Secret Sharing,Ensemble Learning
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined