Forthcoming

k-anonymity in Resource Allocation for Vehicle-to-Everything (V2X) Systems

Authors

DOI:

https://doi.org/10.26636/jtit.2025.FITCE2024.1998

Keywords:

k-anonymity, privacy-enhancing technologies, resource allocation in 6G, vehicle-to-everything (V2X) systems

Abstract

Sixth generation (6G) vehicle-to-everything (V2X) systems face numerous security threats, including Sybil and denial-of-service (DoS) cyber-attacks. To provide a secure exchange of data and protect users' identities in 6G V2X communication systems, anonymization techniques - such as k-anonymity - can be used. In this work, we study centralized vs. k-anonymity based resource allocation methods in a vehicular edge computing (VEC) network. Allocation decisions for vehicular networks are classically posed as a centralized optimization task. Therefore, an information flow is transmitted from the vehicles to the communication premises. In addition to a resource allocation decision, vehicle information is not required. We analyze the centralized allocation versus k-anonymous allocation models. To show a potential deterioration introduced by anonymity, we quantify the gap in the optimal goal in two cases: based on resource allocation and with aim at energy reduction. Our numerical results indicate that energy consumption rises by 1% in smaller scenarios and 23% in medium scenarios, whereas it decreases by 14% in larger scenarios.

Downloads

Download data is not yet available.

References

[1] M. Humayun et al., "Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey", IEEE Access, vol. 12, pp. 25469-25490, 2024.
View in Google Scholar

[2] O. Aouedi et al., "A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions", IEEE Communications Surveys & Tutorials, 2024.
View in Google Scholar

[3] M. AlMarshoud, M.S. Kiraz, and A.H. Al-Bayatti, "Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions", ACM Computing Surveys, vol. 56, pp. 1-29, 2024.
View in Google Scholar

[4] P. Samarati and L. Sweeney, "Generalizing Data to Provide Anonymity when Disclosing Information (Abstract)", Proc. of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. PODS ’98, p. 188, 1998.
View in Google Scholar

[5] F. Song, T. Ma, Y. Tian, and M. Al-Rodhaan, "A New Method of Privacy Protection: Random k-Anonymous", IEEE Access, vol. 7, pp. 75434-75445, 2019.
View in Google Scholar

[6] F. Wang, H. Chen, and Y. Zhou. "A Privacy Protection Application of Consumer Personal Information Based on an Improved K-Anonymity Algorithm", 2024 5th International Conference for Emerging Technology (INCET), Belgaum, India, 2024.
View in Google Scholar

[7] C. Gu, X. Cui, M. Li, and D. Hu. "An Efficient and Privacy-preserving Information Reporting Framework for Traffic Monitoring in Vehicular Networks", IEEE Transactions on Vehicular Technology, vol. 72, pp. 7900-7913, 2023.
View in Google Scholar

[8] H. Batool et al., "A Secure and Privacy Preserved Infrastructure for VANETs Based on Federated Learning with Local Differential Privacy", Information Sciences, vol. 652, art. no. 119717, 2024.
View in Google Scholar

[9] Z. Iftikhar et al., "Privacy Preservation in the Internet of Vehicles Using Local Differential Privacy and IOTA Ledger", Cluster Computing, vol. 26, pp. 3361-3377, 2023.
View in Google Scholar

[10] Z. Qi and W. Chen, "Location Privacy Protection of IoV Based on Blockchain and K-anonymity Technology", 2023 6th International Conference on Electronics Technology (ICET), Chengdu, China, 2023.
View in Google Scholar

[11] S. Zhang et al., "A Caching-based Dual K-anonymous Location Privacy-preserving Scheme for Edge Computing", IEEE Internet of Things Journal, vol. 10, pp. 9768-9781, 2023.
View in Google Scholar

[12] B. Wang, J. Liu, and L. Dai, "K-anonymity-based Privacy-preserving and Efficient Location-based Services for Internet of Vehicles Withstand Viterbi Attack", Proc. of International Conference on Image, Vision and Intelligent Systems 2022 (ICIVIS 2022), pp. 1016-1028, 2022.
View in Google Scholar

[13] M. Georgiades and M.S. Poullas, "Emerging Technologies for V2X Communication and Vehicular Edge Computing in the 6G Era: Challenges and Opportunities for Sustainable IoV", 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Pafos, Cyprus, 2023.
View in Google Scholar

[14] R.-H. Hwang, F. Marzuk, M. Sikora, P. Chołda, and Y.-D. Lin, "Resource Management in LADNs Supporting 5G V2X Communications", IEEE Access, vol. 11, pp. 63958-63971, 2020.
View in Google Scholar

[15] ETSI, "Evolved Universal Terrestrial Radio Access (E-UTRA). Physical Layer Procedures (Technical Specification)", 3GPP TS 36.213 V17.6.0. Release 17, 2024.
View in Google Scholar

[16] K. Sehla, T.M.T. Nguyen, G. Pujolle, and P.B. Velloso, "Resource Allocation Modes in C-V2X: From LTE-V2X to 5G-V2X", IEEE Internet of Things Journal, vol. 9, pp. 8291-8314, 2022.
View in Google Scholar

[17] F. Marzuk, A. Vejar, and P. Chołda, "Optimal Resource Allocation for 6G V2X Communication Systems". Przegląd Telekomunikacyjny - Wiadomości Telekomunikacyjne, vol. 97, pp. 350-353, 2024.
View in Google Scholar

Downloads

Published

2025-02-10

Issue

Section

ARTICLES FROM THIS ISSUE

How to Cite

[1]
A. Vejar, F. Marzuk, and P. Chołda, “k-anonymity in Resource Allocation for Vehicle-to-Everything (V2X) Systems”, JTIT, vol. 99, no. 1, pp. 1–4, Feb. 2025, doi: 10.26636/jtit.2025.FITCE2024.1998.