k-anonymity in Resource Allocation for Vehicle-to-Everything (V2X) Systems
DOI:
https://doi.org/10.26636/jtit.2025.FITCE2024.1998Keywords:
k-anonymity, privacy-enhancing technologies, resource allocation in 6G, vehicle-to-everything (V2X) systemsAbstract
Sixth generation (6G) vehicle-to-everything (V2X) systems face numerous security threats, including Sybil and denial-of-service (DoS) cyber-attacks. To provide a secure exchange of data and protect users' identities in 6G V2X communication systems, anonymization techniques - such as k-anonymity - can be used. In this work, we study centralized vs. k-anonymity based resource allocation methods in a vehicular edge computing (VEC) network. Allocation decisions for vehicular networks are classically posed as a centralized optimization task. Therefore, an information flow is transmitted from the vehicles to the communication premises. In addition to a resource allocation decision, vehicle information is not required. We analyze the centralized allocation versus k-anonymous allocation models. To show a potential deterioration introduced by anonymity, we quantify the gap in the optimal goal in two cases: based on resource allocation and with aim at energy reduction. Our numerical results indicate that energy consumption rises by 1% in smaller scenarios and 23% in medium scenarios, whereas it decreases by 14% in larger scenarios.
Downloads
References
[1] M. Humayun et al., "Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey", IEEE Access, vol. 12, pp. 25469-25490, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3365634
View in Google Scholar
[2] O. Aouedi et al., "A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions", IEEE Communications Surveys & Tutorials, 2024. DOI: https://doi.org/10.1109/COMST.2024.3430368
View in Google Scholar
[3] M. AlMarshoud, M.S. Kiraz, and A.H. Al-Bayatti, "Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions", ACM Computing Surveys, vol. 56, pp. 1-29, 2024. DOI: https://doi.org/10.1145/3656166
View in Google Scholar
[4] P. Samarati and L. Sweeney, "Generalizing Data to Provide Anonymity when Disclosing Information (Abstract)", Proc. of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. PODS ’98, p. 188, 1998. DOI: https://doi.org/10.1145/275487.275508
View in Google Scholar
[5] F. Song, T. Ma, Y. Tian, and M. Al-Rodhaan, "A New Method of Privacy Protection: Random k-Anonymous", IEEE Access, vol. 7, pp. 75434-75445, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2919165
View in Google Scholar
[6] F. Wang, H. Chen, and Y. Zhou. "A Privacy Protection Application of Consumer Personal Information Based on an Improved K-Anonymity Algorithm", 2024 5th International Conference for Emerging Technology (INCET), Belgaum, India, 2024. DOI: https://doi.org/10.1109/INCET61516.2024.10593091
View in Google Scholar
[7] C. Gu, X. Cui, M. Li, and D. Hu. "An Efficient and Privacy-preserving Information Reporting Framework for Traffic Monitoring in Vehicular Networks", IEEE Transactions on Vehicular Technology, vol. 72, pp. 7900-7913, 2023. DOI: https://doi.org/10.1109/TVT.2023.3241656
View in Google Scholar
[8] H. Batool et al., "A Secure and Privacy Preserved Infrastructure for VANETs Based on Federated Learning with Local Differential Privacy", Information Sciences, vol. 652, art. no. 119717, 2024. DOI: https://doi.org/10.1016/j.ins.2023.119717
View in Google Scholar
[9] Z. Iftikhar et al., "Privacy Preservation in the Internet of Vehicles Using Local Differential Privacy and IOTA Ledger", Cluster Computing, vol. 26, pp. 3361-3377, 2023. DOI: https://doi.org/10.1007/s10586-023-04002-0
View in Google Scholar
[10] Z. Qi and W. Chen, "Location Privacy Protection of IoV Based on Blockchain and K-anonymity Technology", 2023 6th International Conference on Electronics Technology (ICET), Chengdu, China, 2023. DOI: https://doi.org/10.1109/ICET58434.2023.10211967
View in Google Scholar
[11] S. Zhang et al., "A Caching-based Dual K-anonymous Location Privacy-preserving Scheme for Edge Computing", IEEE Internet of Things Journal, vol. 10, pp. 9768-9781, 2023. DOI: https://doi.org/10.1109/JIOT.2023.3235707
View in Google Scholar
[12] B. Wang, J. Liu, and L. Dai, "K-anonymity-based Privacy-preserving and Efficient Location-based Services for Internet of Vehicles Withstand Viterbi Attack", Proc. of International Conference on Image, Vision and Intelligent Systems 2022 (ICIVIS 2022), pp. 1016-1028, 2022. DOI: https://doi.org/10.1007/978-981-99-0923-0_101
View in Google Scholar
[13] M. Georgiades and M.S. Poullas, "Emerging Technologies for V2X Communication and Vehicular Edge Computing in the 6G Era: Challenges and Opportunities for Sustainable IoV", 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Pafos, Cyprus, 2023. DOI: https://doi.org/10.1109/DCOSS-IoT58021.2023.00108
View in Google Scholar
[14] R.-H. Hwang, F. Marzuk, M. Sikora, P. Chołda, and Y.-D. Lin, "Resource Management in LADNs Supporting 5G V2X Communications", IEEE Access, vol. 11, pp. 63958-63971, 2020. DOI: https://doi.org/10.1109/ACCESS.2023.3288699
View in Google Scholar
[15] ETSI, "Evolved Universal Terrestrial Radio Access (E-UTRA). Physical Layer Procedures (Technical Specification)", 3GPP TS 36.213 V17.6.0. Release 17, 2024.
View in Google Scholar
[16] K. Sehla, T.M.T. Nguyen, G. Pujolle, and P.B. Velloso, "Resource Allocation Modes in C-V2X: From LTE-V2X to 5G-V2X", IEEE Internet of Things Journal, vol. 9, pp. 8291-8314, 2022. DOI: https://doi.org/10.1109/JIOT.2022.3159591
View in Google Scholar
[17] F. Marzuk, A. Vejar, and P. Chołda, "Optimal Resource Allocation for 6G V2X Communication Systems". Przegląd Telekomunikacyjny - Wiadomości Telekomunikacyjne, vol. 97, pp. 350-353, 2024. DOI: https://doi.org/10.15199/59.2024.4.78
View in Google Scholar
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Andres Vejar, Faysal Marzuk, Piotr Chołda

This work is licensed under a Creative Commons Attribution 4.0 International License.