{"title":"合谋攻击场景下保护隐私的自动驾驶车辆组形成","authors":"Zebin Xiang;Jiujun Cheng;Cong Liu;Qichao Mao;Guiyuan Yuan;Shangce Gao","doi":"10.1109/JIOT.2025.3559151","DOIUrl":null,"url":null,"abstract":"The dynamic topologies and sensitive information exchanged among autonomous vehicle groups make them prime targets for attackers. In particular, in a collusive attack scenario, malicious nodes can collaborate to manipulate the trust evaluation system, thereby compromising the security of the entire vehicle group. To handle this limitation, this work proposes a privacy-preserving method for forming autonomous vehicle groups in a collusive attack scenario. First, we introduce a distributed trust evaluation algorithm based on a federated learning topology, which preserves local data privacy while facilitating reliable intervehicle trust computation. Then, we propose a PageRank-based detection mechanism that analyzes the trust propagation network to identify potential collusive attackers. Finally, we present a privacy-preserving method for autonomous vehicle group formation. Experimental results show that our proposed approach significantly improves the security and stability of autonomous vehicle groups compared to existing methods.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 13","pages":"25576-25586"},"PeriodicalIF":8.9000,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Privacy-Preserving Autonomous Vehicle Group Formation in a Collusive Attack Scenario\",\"authors\":\"Zebin Xiang;Jiujun Cheng;Cong Liu;Qichao Mao;Guiyuan Yuan;Shangce Gao\",\"doi\":\"10.1109/JIOT.2025.3559151\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The dynamic topologies and sensitive information exchanged among autonomous vehicle groups make them prime targets for attackers. In particular, in a collusive attack scenario, malicious nodes can collaborate to manipulate the trust evaluation system, thereby compromising the security of the entire vehicle group. To handle this limitation, this work proposes a privacy-preserving method for forming autonomous vehicle groups in a collusive attack scenario. First, we introduce a distributed trust evaluation algorithm based on a federated learning topology, which preserves local data privacy while facilitating reliable intervehicle trust computation. Then, we propose a PageRank-based detection mechanism that analyzes the trust propagation network to identify potential collusive attackers. Finally, we present a privacy-preserving method for autonomous vehicle group formation. Experimental results show that our proposed approach significantly improves the security and stability of autonomous vehicle groups compared to existing methods.\",\"PeriodicalId\":54347,\"journal\":{\"name\":\"IEEE Internet of Things Journal\",\"volume\":\"12 13\",\"pages\":\"25576-25586\"},\"PeriodicalIF\":8.9000,\"publicationDate\":\"2025-04-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Internet of Things Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10960402/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10960402/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Privacy-Preserving Autonomous Vehicle Group Formation in a Collusive Attack Scenario
The dynamic topologies and sensitive information exchanged among autonomous vehicle groups make them prime targets for attackers. In particular, in a collusive attack scenario, malicious nodes can collaborate to manipulate the trust evaluation system, thereby compromising the security of the entire vehicle group. To handle this limitation, this work proposes a privacy-preserving method for forming autonomous vehicle groups in a collusive attack scenario. First, we introduce a distributed trust evaluation algorithm based on a federated learning topology, which preserves local data privacy while facilitating reliable intervehicle trust computation. Then, we propose a PageRank-based detection mechanism that analyzes the trust propagation network to identify potential collusive attackers. Finally, we present a privacy-preserving method for autonomous vehicle group formation. Experimental results show that our proposed approach significantly improves the security and stability of autonomous vehicle groups compared to existing methods.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.