zk-PoT: Zero-Knowledge Proof of Traffic for Privacy Enabled Cooperative Perception
@article{Tao2022zkPoTZP, title={zk-PoT: Zero-Knowledge Proof of Traffic for Privacy Enabled Cooperative Perception}, author={Ye Tao and Yuze Jiang and Pengfei Lin and Manabu Tsukada and Hiroshi Esaki}, journal={ArXiv}, year={2022}, volume={abs/2211.07875} }
Cooperative perception is an essential and widely discussed application of connected automated vehicles. However, the authenticity of perception data is not ensured, because the vehicles cannot independently verify the event they did not see. Many methods, including trust-based (i.e., statistical) approaches and plausibility-based methods, have been proposed to determine data authenticity. However, these methods cannot verify data without a priori knowledge. In this study, a novel approach of…
Figures and Tables from this paper
References
SHOWING 1-10 OF 29 REFERENCES
Real-time Trust-Building Schemes for Mitigating Malicious Behaviors in Connected and Automated Vehicles
- Computer Science2019 IEEE Intelligent Transportation Systems Conference (ITSC)
- 2019
Two types of architectures for mitigating malicious behaviors based on the collaboration between trust authorities and vehicles are proposed (centralized and distributed) and can be extended in future works to encourage benign behaviors in the long run.
Trust in VANET: A Survey of Current Solutions and Future Research Opportunities
- Computer ScienceIEEE Transactions on Intelligent Transportation Systems
- 2021
A review, analyze, and compare some of the recently proposed trust establishment and management mechanisms (from 2014 to 2019) in vehicular networks, and discusses the weaknesses and inadequacies of existing trustestablishment and management approaches when deployed in a VANET environment.
Vanet Security and Privacy – An Overview
- Computer Science
- 2018
A detailed overview of the state-of-the-art security and privacy requirements in VANET is provided and a brief of the approaches that are proposed in the literature to fulfill these requirements is given.
Misbehavior Detection Using Collective Perception under Privacy Considerations
- Computer Science2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC)
- 2022
This study improves the performance of misbehavior detection using observation data of other vehicles, referred to as collective perception message (CPM), which is becoming the new standard in European countries.
Detecting and correcting malicious data in VANETs
- Computer ScienceVANET '04
- 2004
A general approach to evaluating the validity of VANET data, where a node searches for possible explanations for the data it has collected based on the fact that malicious nodes may be present and accepts the data as dictated by the highest scoring explanations.
Toward Secure Crowd Sensing in Vehicle-to-Everything Networks
- Computer ScienceIEEE Network
- 2018
Security issues that may pose serious threats to crowd sensing in V2X networks are discussed, and this article focuses on V 2X-specific threats that are unique in V1X networks, e.g. platoon disruption and perception data falsification.
Zerocash: Decentralized Anonymous Payments from Bitcoin
- Computer Science2014 IEEE Symposium on Security and Privacy
- 2014
This paper formulate and construct decentralized anonymous payment schemes (DAP schemes) and builds Zero cash, a practical instantiation of the DAP scheme construction that is orders of magnitude more efficient than the less-anonymous Zero coin and competitive with plain Bit coin.
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
- Computer ScienceIEEE INFOCOM 2008 - The 27th Conference on Computer Communications
- 2008
This paper proposes a framework for data-centric trust establishment: first, trust in each individual piece of data is computed; then multiple, related but possibly contradictory, data are combined; finally, their validity is inferred by a decision component based on one of several evidence evaluation techniques.
Modeling Roadside Attacker Behavior in VANETs
- Computer Science2008 IEEE Globecom Workshops
- 2008
The degrees of freedom that are available for position forging are shown and two attacks that demand attention are found: single position forging having low effort compared to sophisticated movement path forging having a potentially high influence on road traffic safety.
A Multifaceted Approach to Modeling Agent Trust for Effective Communication in the Application of Mobile Ad Hoc Vehicular Networks
- Computer ScienceIEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)
- 2011
A multifaceted trust modeling approach that incorporates role-, experience-, priority-, and majority-based trust and this is able to restrict the number of reports that are received is developed, an important methodology to enable effective V2V communication via intelligent agents.