<i>k</i>-anonymity in Resource Allocation for Vehicle-to-Everything (V2X) Systems release_spsb74xoyzb37on6p2yedtclwe

by Andres Vejar, Faysal Marzuk, Piotr Chołda

Published in Journal of Telecommunications and Information Technology by National Institute of Telecommunications.

2025   p1-4

Abstract

Sixth generation (6G) vehicle-to-everything (V2X) systems face numerous security threats, including Sybil and denial-of-service (DoS) cyber-attacks. To provide a secure exchange of data and protect users' identities in 6G V2X communication systems, anonymization techniques - such as k-anonymity - can be used. In this work, we study centralized vs. k-anonymity based resource allocation methods in a vehicular edge computing (VEC) network. Allocation decisions for vehicular networks are classically posed as a centralized optimization task. Therefore, an information flow is transmitted from the vehicles to the communication premises. In addition to a resource allocation decision, vehicle information is not required. We analyze the centralized allocation versus k-anonymous allocation models. To show a potential deterioration introduced by anonymity, we quantify the gap in the optimal goal in two cases: based on resource allocation and with aim at energy reduction. Our numerical results indicate that energy consumption rises by 1% in smaller scenarios and 23% in medium scenarios, whereas it decreases by 14% in larger scenarios.
In application/xml+jats format

Archived Files and Locations

application/pdf   506.6 kB
file_cvlz3d6ytrhdbepcarffttcr5y
jtit.pl (publisher)
web.archive.org (webarchive)
Read Archived PDF
Preserved and Accessible
Type  article-journal
Stage   published
Date   2025-02-10
Journal Metadata
Not in DOAJ
Not in Keepers Registry
ISSN-L:  1509-4553
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 4d9d5371-aa29-4a92-8884-f4a989a2301c
API URL: JSON