Privacy Attacks and Defenses for Digital Twin Migrations in Vehicular Metaverses

被引:4
|
作者
Luo, Xiaofeng [1 ]
Wen, Jinbo [2 ]
Kang, Jiawen [1 ]
Nie, Jiangtian [3 ]
Xiong, Zehui [4 ]
Zhang, Yang [2 ]
Yang, Zhaohui [5 ]
Xie, Shengli [1 ]
机构
[1] Guangdong Univ Technol, Sch Automat, Guangzhou 510006, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211100, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
[4] Singapore Univ Technol & Design, Pillar Informat Syst Technol & Design, Singapore 487372, Singapore
[5] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Peoples R China
来源
IEEE NETWORK | 2023年 / 37卷 / 06期
基金
新加坡国家研究基金会;
关键词
TECHNOLOGIES;
D O I
10.1109/MNET.2023.3317320
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The gradual fusion of intelligent transportation systems with metaverse technologies is giving rise to vehicular metaverses, which blend virtual spaces with physical space. As indispensable components for vehicular metaverses, Vehicular Twins (VTs) are digital replicas of Vehicular Metaverse Users (VMUs) and facilitate customized metaverse services to VMUs. VTs are established and maintained in RoadSide Units (RSUs) with sufficient computing and storage resources. Due to the limited communication coverage of RSUs and the high mobility of VMUs, VTs need to be migrated among RSUs to ensure real-time and seamless services for VMUs. However, during VT migrations, physical- virtual synchronization and massive communications among VTs may cause identity and location privacy disclosures of VMUs and VTs. In this article, we study privacy issues and the corresponding defenses for VT migrations in vehicular metaverses. We first present four kinds of specific privacy attacks during VT migrations. Then, we propose a VMU-VT dual pseudonym scheme and a synchronous pseudonym change framework to defend against these attacks. Additionally, we evaluate average privacy entropy for pseudonym changes and optimize the number of pseudonym distribution based on inventory theory. Numerical results show that the average utility of VMUs under our proposed schemes is 33.8% higher than that under the equal distribution scheme, demonstrating the superiority of our schemes.
引用
收藏
页码:82 / 91
页数:10
相关论文
共 50 条
  • [1] Adversarial Attacks and Defenses for Semantic Communication in Vehicular Metaverses
    Kang, Jiawen
    He, Jiayi
    Du, Hongyang
    Xiong, Zehui
    Yang, Zhaohui
    Huang, Xumin
    Xie, Shengli
    [J]. IEEE WIRELESS COMMUNICATIONS, 2023, 30 (04) : 48 - 55
  • [2] Online privacy: Attacks and defenses
    Herrmann, Dominik
    [J]. IT-INFORMATION TECHNOLOGY, 2015, 57 (02): : 133 - 137
  • [3] Security and Privacy in Vehicular Digital Twin Networks: Challenges and Solutions
    He, Chao
    Luan, Tom H.
    Lu, Rongxing
    Su, Zhou
    Dong, Mianxiong
    [J]. IEEE WIRELESS COMMUNICATIONS, 2023, 30 (04) : 154 - 160
  • [4] Blockchain-assisted twin migration for vehicular metaverses: A game theory approach
    Zhong, Yue
    Wen, Jinbo
    Zhang, Junhong
    Kang, Jiawen
    Jiang, Yuna
    Zhang, Yang
    Cheng, Yanyu
    Tong, Yongju
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (12)
  • [5] Privacy Attacks and Defenses in Machine Learning: A Survey
    Liu, Wei
    Han, Xun
    He, Meiling
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 413 - 422
  • [6] Survey on Privacy Attacks and Defenses in Machine Learning
    Liu R.-X.
    Chen H.
    Guo R.-Y.
    Zhao D.
    Liang W.-J.
    Li C.-P.
    [J]. Chen, Hong (chong@ruc.edu.cn), 1600, Chinese Academy of Sciences (31): : 866 - 892
  • [7] Practical Defenses for Evil Twin Attacks in 802.11
    Gonzales, Harold
    Bauer, Kevin
    Lindqvist, Janne
    McCoy, Damon
    Sicker, Douglas
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [8] Privacy and Robustness in Federated Learning: Attacks and Defenses
    Lyu, Lingjuan
    Yu, Han
    Ma, Xingjun
    Chen, Chen
    Sun, Lichao
    Zhao, Jun
    Yang, Qiang
    Yu, Philip S.
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (07) : 8726 - 8746
  • [9] Secure and Flexible Data Sharing With Dual Privacy Protection in Vehicular Digital Twin Networks
    Wang, Chenhao
    Ming, Yang
    Liu, Hang
    Feng, Jie
    Zhang, Ning
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (09) : 1 - 14
  • [10] Visual privacy attacks and defenses in deep learning: a survey
    Zhang, Guangsheng
    Liu, Bo
    Zhu, Tianqing
    Zhou, Andi
    Zhou, Wanlei
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (06) : 4347 - 4401