2021
DOI: 10.1109/tits.2020.2964410
|View full text |Cite
|
Sign up to set email alerts
|

Preserving Privacy in the Internet of Connected Vehicles

Abstract: Today's vehicles are advancing from stand-alone transportation means to vehicle-to-vehicle, and vehicle-toinfrastructure communications enabled devices which are able to exchange data through the transportation communication infrastructure. As the IoT and data remain intrinsically linked together, the fast-changing mobility landscape of intent-based networking for the Internet of connected vehicles comes with a great risk of data security and privacy violations. This paper considers the privacy issues in the d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 64 publications
(24 citation statements)
references
References 29 publications
(29 reference statements)
0
18
0
Order By: Relevance
“…In addition to E2E encryption, obfuscation techniques related to the location metadata of the data collection agent [42][43][44][45] are necessary when the data is being processed at the end of its journey through the communications network. These obfuscation techniques have also been explored in the edge as well [46].…”
Section: Security and Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to E2E encryption, obfuscation techniques related to the location metadata of the data collection agent [42][43][44][45] are necessary when the data is being processed at the end of its journey through the communications network. These obfuscation techniques have also been explored in the edge as well [46].…”
Section: Security and Privacymentioning
confidence: 99%
“…Mobile Spatial Automated Sensing Task Recruitment [38,47] Advanced routing strategies beyond minimizing time traveled; powered through crowd-sourced data X X X [30] Spectrum sensing assignment X [11] Multi-objective task allocation X X [31] Ratings system for crowdsourced workers X [36] Spatial Crowdsourcing Task assignment survey X X [37] Crowdsourcing assignment for mobile crowdsensing X Edge Computing [33,48] Edge computing architectures for mobile crowdsensing X [10,49] Efficient data processing and handling on the edge X [27] Survey of IoT; discussion of edge computing X X X Security/Privacy [40,41] End-to-end encrypted mobile crowdsourcing X [42][43][44][45] Obfuscation of identifying information of crowdsourcing by reducing granularity of data X X X [46] Obfuscation of data in edge computing servers X [39] Perspectives and suggestions of engineering "privacy by design" in smart vehicles X…”
Section: Concept Reference(s) Contribution Crowdsourcing Variantmentioning
confidence: 99%
See 1 more Smart Citation
“…DP techniques promise a rigorous level of privacy, however, there are limited applications that have adopted DP in practise. Some examples where DP has been proposed to be used include: scheduling the recharging of electronic vehicles [84] where the location of the vehicles are perturbed, vehicle platooning [85], and streaming data of multiple vehicles to Edge services [86].…”
Section: Perturbing Datamentioning
confidence: 99%
“…If all such data is transmitted to the vehicle user by remote cloud networks, the vehicle user will experience a large delay. Due to vehicles switch between edge clouds frequently, vehicles need to constantly re-initiate requests to the cloud for obtaining the remaining data [1][2][3]. In addition, a single edge cloud-assisted caching strategy may cause vehicles to fail to obtain complete data in high-speed free-flow scenarios.…”
Section: Introductionmentioning
confidence: 99%