On Spatial-Provenance Recovery in Wireless Networks with Relaxed-Privacy Constraints
- URL: http://arxiv.org/abs/2509.11761v1
- Date: Mon, 15 Sep 2025 10:28:52 GMT
- Title: On Spatial-Provenance Recovery in Wireless Networks with Relaxed-Privacy Constraints
- Authors: Manish Bansal, Pramsu Shrivastava, J. Harshan,
- Abstract summary: We introduce a relaxed-privacy model wherein the vehicles share their partial location information in order to avail the location-based services.<n>We propose a low-latency protocol for spatial-provenance recovery, wherein vehicles use correlated linear Bloom filters to embed their position information.<n>We show that our proposed method requires a few bits in the packet header to provide security features such as localizing a low-power jammer executing a denial-of-service attack.
- Score: 1.1795056270534288
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In Vehicle-to-Everything (V2X) networks with multi-hop communication, Road Side Units (RSUs) intend to gather location data from the vehicles to offer various location-based services. Although vehicles use the Global Positioning System (GPS) for navigation, they may refrain from sharing their exact GPS coordinates to the RSUs due to privacy considerations. Thus, to address the localization expectations of the RSUs and the privacy concerns of the vehicles, we introduce a relaxed-privacy model wherein the vehicles share their partial location information in order to avail the location-based services. To implement this notion of relaxed-privacy, we propose a low-latency protocol for spatial-provenance recovery, wherein vehicles use correlated linear Bloom filters to embed their position information. Our proposed spatial-provenance recovery process takes into account the resolution of localization, the underlying ad hoc protocol, and the coverage range of the wireless technology used by the vehicles. Through a rigorous theoretical analysis, we present extensive analysis on the underlying trade-off between relaxed-privacy and the communication-overhead of the protocol. Finally, using a wireless testbed, we show that our proposed method requires a few bits in the packet header to provide security features such as localizing a low-power jammer executing a denial-of-service attack.
Related papers
- A Privacy-Preserving Localization Scheme with Node Selection in Mobile Networks [48.845334743016345]
We propose a privacy-preserving localization scheme, named PPLZN. PPLZN protects the location privacy of both the target and anchor nodes in crowdsourced localization.<n>It can achieve accurate position estimation without location leakage and outperform state-of-the-art approaches in both positioning accuracy and communication overhead.
arXiv Detail & Related papers (2026-01-07T12:48:45Z) - Adversary-Aware Private Inference over Wireless Channels [51.93574339176914]
AI-based sensing at wireless edge devices has the potential to significantly enhance Artificial Intelligence (AI) applications.<n>As sensitive personal data can be reconstructed by an adversary, transformation of the features are required to reduce the risk of privacy violations.<n>We propose a novel framework for privacy-preserving AI-based sensing, where devices apply transformations of extracted features before transmission to a model server.
arXiv Detail & Related papers (2025-10-23T13:02:14Z) - Leveraging Functional Encryption and Deep Learning for Privacy-Preserving Traffic Forecasting [3.177180500119784]
We propose a secure, privacy-preserving location reporting and traffic forecasting system.<n>Our novel k-anonymity scheme utilize functional encryption to aggregate encrypted location information submitted by drivers.<n>We demonstrate the effectiveness of the proposed scheme with less than 10% mean absolute error for a 60-minute forecasting horizon.
arXiv Detail & Related papers (2025-04-17T18:21:55Z) - Collaborative Inference over Wireless Channels with Feature Differential Privacy [57.68286389879283]
Collaborative inference among multiple wireless edge devices has the potential to significantly enhance Artificial Intelligence (AI) applications.
transmitting extracted features poses a significant privacy risk, as sensitive personal data can be exposed during the process.
We propose a novel privacy-preserving collaborative inference mechanism, wherein each edge device in the network secures the privacy of extracted features before transmitting them to a central server for inference.
arXiv Detail & Related papers (2024-10-25T18:11:02Z) - A Location Validation Technique to Mitigate GPS Spoofing Attacks in IEEE 802.11p based Fleet Operator's Network of Electric Vehicles [2.5582913676558205]
Vehicle rebalancing application uses the GPS location data of the vehicles periodically to determine the vehicle(s) to be moved to a different charging station for rebalancing.
A malicious attacker residing in the network can spoof the GPS location data packets of the target vehicle(s) resulting in misinterpretation of the location of the vehicle(s)
We propose a location tracking technique that can validate the current location of a vehicle based on its previous location and roadmaps.
arXiv Detail & Related papers (2024-10-16T20:42:27Z) - Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data [57.22545280370174]
On Path Diagnostic - Intrusion & Inference (OPD-II) is a novel path inference attack leveraging a physical car model and a map matching algorithm.
We implement our attack on a set of four different cars and a total number of 41 tracks in different road and traffic scenarios.
arXiv Detail & Related papers (2024-06-30T04:21:46Z) - QoS prediction in radio vehicular environments via prior user
information [54.853542701389074]
We evaluate ML tree-ensemble methods to predict in the range of minutes with data collected from a cellular test network.
Specifically, we use the correlations of the measurements coming from the radio environment by including information of prior vehicles to enhance the prediction of the target vehicles.
arXiv Detail & Related papers (2024-02-27T17:05:41Z) - Protecting Personalized Trajectory with Differential Privacy under Temporal Correlations [37.88484505367802]
This paper proposes a personalized trajectory privacy protection mechanism (PTPPM)
We identify a protection location set (PLS) for each location by employing the Hilbert curve-based minimum distance search algorithm.
We put forth a novel Permute-and-Flip mechanism for location perturbation, which maps its initial application in data publishing privacy protection to a location perturbation mechanism.
arXiv Detail & Related papers (2024-01-20T12:59:08Z) - A Prototype on the Feasibility of Learning Spatial Provenance in XBee and LoRa Networks [0.732582506267845]
In Vehicle-to-Everything (V2X) networks, Road Side Units (RSUs) typically desire to gather the location information of the participating vehicles to provide security and network-diagnostics features.
We propose a new spatial-provenance framework wherein the vehicles agree to compromise their privacy to a certain extent and share a low-precision variant of its coordinates in agreement with the demands of the RSU.
Our demonstrations reveal that low-to-moderate precision localization can be achieved in fewer packets, thus making an appealing case for next-generation vehicular networks to include our methods for providing real-time security and network-
arXiv Detail & Related papers (2024-01-12T15:36:28Z) - Cooperative Probabilistic Trajectory Forecasting under Occlusion [110.4960878651584]
Occlusion-aware planning often requires communicating the information of the occluded object to the ego agent for safe navigation.
In this paper, we design an end-to-end network that cooperatively estimates the current states of occluded pedestrian in the reference frame of ego agent.
We show that the uncertainty-aware trajectory prediction of occluded pedestrian by the ego agent is almost similar to the ground truth trajectory assuming no occlusion.
arXiv Detail & Related papers (2023-12-06T05:36:52Z) - Location Privacy Threats and Protections in 6G Vehicular Networks: A Comprehensive Review [23.901688216192397]
Location privacy is critical in vehicular networks, where drivers' trajectories and personal information can be exposed.<n>This survey reviews comprehensively different localization techniques, including sensing infrastructure-based, optical vision-based, and cellular radio-based localization.<n>We classify Location Privacy Preserving Mechanisms (LPPMs) into user-side, server-side, and user-server-interface-based, and evaluate their effectiveness.
arXiv Detail & Related papers (2023-05-08T06:55:35Z) - Real-time Outdoor Localization Using Radio Maps: A Deep Learning
Approach [59.17191114000146]
LocUNet: A convolutional, end-to-end trained neural network (NN) for the localization task.
We show that LocUNet can localize users with state-of-the-art accuracy and enjoys high robustness to inaccuracies in the estimations of radio maps.
arXiv Detail & Related papers (2021-06-23T17:27:04Z) - PGLP: Customizable and Rigorous Location Privacy through Policy Graph [68.3736286350014]
We propose a new location privacy notion called PGLP, which provides a rich interface to release private locations with customizable and rigorous privacy guarantee.
Specifically, we formalize a user's location privacy requirements using a textitlocation policy graph, which is expressive and customizable.
Third, we design a private location trace release framework that pipelines the detection of location exposure, policy graph repair, and private trajectory release with customizable and rigorous location privacy.
arXiv Detail & Related papers (2020-05-04T04:25:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.