Skip to main content
Top

2023 | OriginalPaper | Chapter

A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks

Authors : Muhammad Firdaus, Kyung-Hyune Rhee

Published in: Information Security Applications

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The number of internet-connected devices has been exponentially growing with the massive volume of heterogeneous data generated from various devices, resulting in a highly intertwined cyber-physical system. Currently, the Edge Intelligence System (EIS) concept that leverages the merits of edge computing and Artificial Intelligence (AI) is utilized to provide smart cloud services with powerful computational processing and reduce decision-making delays. Thus, EIS offers a possible solution to realizing future Intelligent Transportation Systems (ITS), especially in a vehicular network framework. However, since the central aggregator server is responsible for supervising the entire system orchestration, the existing EIS framework faces several challenges and is still potentially susceptible to numerous malicious attacks. Hence, to solve the issues mentioned earlier, this paper presents the notion of secure edge intelligence, merging the benefits of Federated Learning (FL), blockchain, and Local Differential Privacy (LDP). The blockchain-assisted FL approach is used to efficiently improve traffic prediction accuracy and enhance user privacy and security by recording transactions in immutable distributed ledger networks as well as providing a decentralized reward mechanism system. Furthermore, LDP is empowered to strengthen the confidentiality of data sharing transactions, especially in protecting the user’s private data from various attacks. The proposed framework has been implemented in two scenarios, i.e., blockchain-based FL to efficiently develop the decentralized traffic management for vehicular networks and LDP-based FL to produce the randomized privacy protection using the IBM Library for differential privacy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Anh, T.T., Luong, N.C., Niyato, D., Kim, D.I., Wang, L.C.: Efficient training management for mobile crowd-machine learning: a deep reinforcement learning approach. IEEE Wirel. Commun. Lett. 8(5), 1345–1348 (2019)CrossRef Anh, T.T., Luong, N.C., Niyato, D., Kim, D.I., Wang, L.C.: Efficient training management for mobile crowd-machine learning: a deep reinforcement learning approach. IEEE Wirel. Commun. Lett. 8(5), 1345–1348 (2019)CrossRef
2.
go back to reference Boyes, H., Hallaq, B., Cunningham, J., Watson, T.: The industrial internet of things (iiot): an analysis framework. Comput. Ind. 101, 1–12 (2018)CrossRef Boyes, H., Hallaq, B., Cunningham, J., Watson, T.: The industrial internet of things (iiot): an analysis framework. Comput. Ind. 101, 1–12 (2018)CrossRef
3.
go back to reference Cai, H., Rueckert, D., Passerat-Palmbach, J.: 2cp: decentralized protocols to transparently evaluate contributivity in blockchain federated learning environments. arXiv preprint arXiv:2011.07516 (2020) Cai, H., Rueckert, D., Passerat-Palmbach, J.: 2cp: decentralized protocols to transparently evaluate contributivity in blockchain federated learning environments. arXiv preprint arXiv:​2011.​07516 (2020)
4.
go back to reference Chen, M., Yang, Z., Saad, W., Yin, C., Poor, H.V., Cui, S.: A joint learning and communications framework for federated learning over wireless networks. IEEE Trans. Wirel. Commun. 20(1), 269–283 (2020)CrossRef Chen, M., Yang, Z., Saad, W., Yin, C., Poor, H.V., Cui, S.: A joint learning and communications framework for federated learning over wireless networks. IEEE Trans. Wirel. Commun. 20(1), 269–283 (2020)CrossRef
5.
go back to reference Yueyue Dai, D.X., Maharjan, S., Qiao, G., Zhang, Y.: Artificial intelligence empowered edge computing and caching for internet of vehicles. IEEE Wirel. Commun. 26(3), 12–18 (2019)CrossRef Yueyue Dai, D.X., Maharjan, S., Qiao, G., Zhang, Y.: Artificial intelligence empowered edge computing and caching for internet of vehicles. IEEE Wirel. Commun. 26(3), 12–18 (2019)CrossRef
7.
go back to reference Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)MathSciNetMATH Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)MathSciNetMATH
8.
go back to reference Firdaus, M., Rhee, K.-H.: On blockchain-enhanced secure data storage and sharing in vehicular edge computing networks. Appl. Sci. 11(1), 414 (2021)CrossRef Firdaus, M., Rhee, K.-H.: On blockchain-enhanced secure data storage and sharing in vehicular edge computing networks. Appl. Sci. 11(1), 414 (2021)CrossRef
10.
go back to reference Holohan, N., Braghin, S., Aonghusa, P.M., Levacher, K.: Diffprivlib: the ibm differential privacy library. arXiv preprint arXiv:1907.02444 (2019) Holohan, N., Braghin, S., Aonghusa, P.M., Levacher, K.: Diffprivlib: the ibm differential privacy library. arXiv preprint arXiv:​1907.​02444 (2019)
11.
go back to reference Kang, J., Xiong, Z., Niyato, D., Zou, Y., Zhang, Y., Guizani, M.: Reliable federated learning for mobile networks. IEEE Wirel. Commun. 27(2), 72–80 (2020)CrossRef Kang, J., Xiong, Z., Niyato, D., Zou, Y., Zhang, Y., Guizani, M.: Reliable federated learning for mobile networks. IEEE Wirel. Commun. 27(2), 72–80 (2020)CrossRef
12.
go back to reference Kenney, J.B.: Dedicated short-range communications (dsrc) standards in the united states. Proc. IEEE 99(7), 1162–1182 (2011)CrossRef Kenney, J.B.: Dedicated short-range communications (dsrc) standards in the united states. Proc. IEEE 99(7), 1162–1182 (2011)CrossRef
13.
go back to reference LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278–2324 (1998)CrossRef LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278–2324 (1998)CrossRef
14.
go back to reference Le, L., Ye, H., Li, G.Y.: Toward intelligent vehicular networks: a machine learning framework. IEEE Internet Things J. 6(1), 124–135 (2018) Le, L., Ye, H., Li, G.Y.: Toward intelligent vehicular networks: a machine learning framework. IEEE Internet Things J. 6(1), 124–135 (2018)
15.
go back to reference Yi, L., Peng, J., Kang, J., Iliyasu, A.M., Niyato, D., El-Latif, A.A.A.: A secure federated learning framework for 5g networks. IEEE Wirel. Commun. 27(4), 24–31 (2020)CrossRef Yi, L., Peng, J., Kang, J., Iliyasu, A.M., Niyato, D., El-Latif, A.A.A.: A secure federated learning framework for 5g networks. IEEE Wirel. Commun. 27(4), 24–31 (2020)CrossRef
16.
go back to reference Yunlong, L., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Blockchain and federated learning for privacy-preserved data sharing in industrial iot. IEEE Trans. Ind. Inf. 16(6), 4177–4186 (2019) Yunlong, L., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Blockchain and federated learning for privacy-preserved data sharing in industrial iot. IEEE Trans. Ind. Inf. 16(6), 4177–4186 (2019)
17.
go back to reference Yunlong, L., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Federated learning for data privacy preservation in vehicular cyber-physical systems. IEEE Netw. 34(3), 50–56 (2020)CrossRef Yunlong, L., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Federated learning for data privacy preservation in vehicular cyber-physical systems. IEEE Netw. 34(3), 50–56 (2020)CrossRef
18.
go back to reference Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. In: Decentralized Business Review, p. 21260 (2008) Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. In: Decentralized Business Review, p. 21260 (2008)
19.
go back to reference Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310–1321 (2015) Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310–1321 (2015)
20.
go back to reference Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3–18. IEEE (2017) Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3–18. IEEE (2017)
22.
go back to reference Tian, S., Yang, W., Grange, J.M.L., Wang, P., Huang, W., Ye, Z.: Smart healthcare: making medical care more intelligent. Glob. Health J. 3(3), 62–65 (2019)CrossRef Tian, S., Yang, W., Grange, J.M.L., Wang, P., Huang, W., Ye, Z.: Smart healthcare: making medical care more intelligent. Glob. Health J. 3(3), 62–65 (2019)CrossRef
23.
go back to reference Tran, N.H., Bao, W., Zomaya, A., Nguyen, M.N.H., Hong, C.S.: Federated learning over wireless networks: optimization model design and analysis. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 1387–1395. IEEE (2019) Tran, N.H., Bao, W., Zomaya, A., Nguyen, M.N.H., Hong, C.S.: Federated learning over wireless networks: optimization model design and analysis. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 1387–1395. IEEE (2019)
24.
go back to reference Truex, S., et al.: A hybrid approach to privacy-preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, pp. 1–11 (2019) Truex, S., et al.: A hybrid approach to privacy-preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, pp. 1–11 (2019)
25.
go back to reference Al-Turjman, F., Abujubbeh, M.: Iot-enabled smart grid via sm: an overview. Future Gener. Comput. Syst. 96, 579–590 (2019)CrossRef Al-Turjman, F., Abujubbeh, M.: Iot-enabled smart grid via sm: an overview. Future Gener. Comput. Syst. 96, 579–590 (2019)CrossRef
26.
go back to reference Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454–3469 (2020)CrossRef Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454–3469 (2020)CrossRef
27.
go back to reference Weng, J., Weng, J., Zhang, J., Li, M., Zhang, Y., Luo, W.: Deepchain: auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Trans. Depend. Secure Comput. 18(5), 2438–2455 (2019) Weng, J., Weng, J., Zhang, J., Li, M., Zhang, Y., Luo, W.: Deepchain: auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Trans. Depend. Secure Comput. 18(5), 2438–2455 (2019)
28.
go back to reference Zhi Zhou, X., Chen, E.L., Zeng, L., Luo, K., Zhang, J.: Edge intelligence: paving the last mile of artificial intelligence with edge computing. Proc. IEEE 107(8), 1738–1762 (2019)CrossRef Zhi Zhou, X., Chen, E.L., Zeng, L., Luo, K., Zhang, J.: Edge intelligence: paving the last mile of artificial intelligence with edge computing. Proc. IEEE 107(8), 1738–1762 (2019)CrossRef
29.
go back to reference Li, Z., Yu, F.R., Wang, Y., Ning, B., Tang, T.: Big data analytics in intelligent transportation systems: a survey. IEEE Trans. Intell. Transp. Syst. 20(1), 383–398 (2018) Li, Z., Yu, F.R., Wang, Y., Ning, B., Tang, T.: Big data analytics in intelligent transportation systems: a survey. IEEE Trans. Intell. Transp. Syst. 20(1), 383–398 (2018)
Metadata
Title
A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks
Authors
Muhammad Firdaus
Kyung-Hyune Rhee
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-25659-2_12

Premium Partner