=Paper=
{{Paper
|id=Vol-2129/paper6
|storemode=property
|title=Privacy-Preserving Intersection Management for Autonomous Vehicles
|pdfUrl=https://ceur-ws.org/Vol-2129/paper6.pdf
|volume=Vol-2129
|authors=Nadin Kökciyan,Mustafa Erdogan,Tuna Han Salih Meral,Pinar Yolum
|dblpUrl=https://dblp.org/rec/conf/ijcai/KokciyanEMY18
}}
==Privacy-Preserving Intersection Management for Autonomous Vehicles==
Privacy-Preserving Intersection Management for Autonomous Vehicles Nadin Kökciyan1 , Mustafa Erdogan2 , Tuna Han Salih Meral2 , Pınar Yolum2,3 , 1 King’s College London 2 Bogazici University 3 Utrecht University nadin.kokciyan@kcl.ac.uk, p.yolum@uu.nl Abstract through sound and colors. However, with regular cars, there are no special symbols that can designate their purpose. Thus, Traffic lights are a common instrument to regulate in junctions, the decision making is done in a simple turn- the traffic in junctions. However, when a vehicle taking manner that treats every vehicle equally. Ideally, it has an urgency, it may violate the traffic lights. would be best if the vehicles could communicate with each Since the other vehicles do not expect this, such vi- other about their emergencies or constraints [Atherton, 2016] olations lead to road accidents. Connected and au- and automatically reach a decision as to which one should go tonomous vehicles can coordinate their actions and first. Recent technologies, such as Vehicle-to-X (V2X) make decide on the priority of passing without the need it possible for vehicles to talk to each other as well as des- of traffic lights if they can share information about ignated entities on a road [Lu et al., 2014]. Using such a their current situation. That is, a vehicle with an ur- technology, vehicles could communicate information such as gency can communicate this with justifications to the purpose of their trip, physical conditions of the vehicle as others and ask to go first. However, the shared in- well as the external properties of the environment. formation can potentially yield privacy violations while helping vehicles attain priority. We propose a While such a communication between autonomous vehi- privacy-preserving decision making framework for cles could serve to reach a decision, it could also create im- managing traffic at junctions. The vehicles are rep- portant privacy challenges. For example, a vehicle could re- resented as autonomous agents that can communi- veal that it is in an emergency because it is carrying the presi- cate with each other and make priority-based deci- dent and might actually end up passing through a junction be- sions using auctions. The bids in the auctions are fore others, but disclosing this information could create other not monetary but contain information that each ve- threats for the vehicle. Or, a stroke patient who has high blood hicle is willing to declare. Our experiments on real- pressure symptoms could be in hurry to go to hospital. How- world accident data show that our proposed bidding ever, he might prefer not sharing his health condition with strategies help vehicles preserve their privacy while other entities because the breach of this information can lead still enabling them to receive priority at junctions. to loss of insurance or a job. Thus, preserving privacy of the vehicles while reaching a decision is of utmost importance. This paper proposes an agent-based approach to realize 1 Introduction privacy-preserving decision making for autonomous vehi- Traffic accidents are the leading cause of casualties in many cles [Bazzan and Klugl, 2014]. Whenever two vehicles are at countries. Only in US, approximately 40,000 people died in a junction, the vehicles bid with their information in an auc- traffic accidents in 2016 [National Safety Council, 2016] and tion to decide which vehicle will go first. The vehicle whose millions of people have been injured. Most of these acci- bid yields a higher priority gets to pass before the other. Con- dents happen because human drivers do not obey traffic rules, trary to traditional auctions with monetary bids, here even or are not aware of the physical conditions of the environ- when a bid does not win the auction, the bidder is at a loss ment. Autonomous vehicles are expected to reverse this as because some information has been disclosed. To handle this, they can be designed to follow the rules more strictly than we propose bidding strategies where each vehicle bids incre- human drivers [Crew, 2015]. However, human drivers also mentally so that private information is only revealed if it will choose to violate the rules on purpose to address their own help the vehicle in taking a priority. As a result, a vehicle needs. For example, a driver can choose not to stop at a red that provides enough information to convince the intersection light at a junction because of a special condition; i.e., she manager for its priority passes first. This enables the vehicles is in a hurry because of a sick passenger. In many occa- to preserve their privacy while reporting their situation. sions, if the other drivers were aware of the situation, they The rest of this paper is organized as follows: Section 2 in- might accommodate it, for example by lending the road to troduces a multiagent model where each autonomous vehicle that driver. This is widely seen in case of a fire truck or an is represented as an agent that uses auctions to make priority- ambulance, where the vehicles physically show their purpose based decisions. We explain various parameters and condi- Property Property Weight Instance Instance Weight Ambulance 1.0 Vehicle Type (t) 0.25 Car 0.9 Taxi 0.9 Journey as part of work 1.0 Journey of Purpose (p) 0.25 Commuting to/from work 0.8 Riding to/from school 0.8 0-5, 6-10, 66-75, 75+ 0.8 Age Band of Driver (b) 0.25 11-65 1.0 Age of Vehicle (a) 0.25 Numeric Value (0-105) 1.0 Table 1: An Example Set of Properties and Instances tions that cause accidents. Section 3 develops our approach Manager (IM) who acts as the auctioneer. Each vehicle bids and bidding strategies. Section 4 evaluates the approach on with information and based on the type of the auction, IM de- real word accident data. Section 5 provides a discussion on cides on the winner of the auction. The bidder that provides relevant approaches for junction managements. Finally, Sec- information with the highest priority value wins. Contrary to tion 6 concludes with directions for future research. existing work, the autonomous vehicles bid information in- stead of money to preserve privacy. We assume that the IM represents an authoritative entity, such as traffic patrol and 2 Autonomous Vehicles as a Multiagent is equipped with the necessary security techniques to collect, System save, and process the bids without compromise. We propose an agent-based approach where each agent repre- The auctions that have been used before have not taken into sents an autonomous vehicle [Chen and Cheng, 2010]. Each consideration the privacy of the autonomous vehicles. Since agent is aware of the properties that are associated with the the vehicles are giving away information as their bids to re- vehicle and the journey, such as the purpose of the trip or flect their situation, it could very well be that the information the type of the vehicle. When they arrive at a junction, they they provide contain sensitive information. Thus, it is neces- need to reach a decision as to which vehicle will pass first. sary to account for privacy in handling decision making. To do so, each vehicle can put forward its current status to convince other vehicles of its priority. In order to be able to 2.1 Understanding Accidents compare the status of two different vehicles, it is best if the To understand road accidents better, we have analyzed the information can be transformed into a single priority value. Road Safety Data [The UK Government, 2016] published However, if each vehicle computes this value for itself, there by the UK Government. This dataset contains more than is no guarantee that they would report it correctly; i.e., each 140,000 road accidents with numerous properties including vehicle can report a high priority value to pass first. To over- details about the consequential casualties. We show a repre- come this, it is best if both vehicles can report information sentative subset in Table 1. about their status and a mediator can compute the priority val- Each property has a name and a sample set of instances. ues and announce the decision. Such an entity can have fur- The first property is the Vehicle Type with instances of ambu- ther information about the environment and compute a prior- lance, car and taxi. We associate an instance weight that de- ity value. Auctions serve as an ideal mechanism for decision notes the importance of each instance. A regular car usually making through a mediator, where the entities involved (e.g., gives priority to an ambulance, which gets a higher instance autonomous vehicles) express their priorities independently. weight. The second property is the Journey of Purpose. For The general idea is that an auctioneer provides a service (e.g., example, a car can be in a hurry because it is late for school. selling an item) and wants to get the highest possible price. The third property is the Age Band of the Driver. For exam- On the other hand, the potential bidders want to receive ser- ple, a vehicle may need to pass first because it has an older vice at the lowest possible price [Weiss, 1999]. For example, driver. The fourth property is the Age of a Vehicle, a value in an English auction, the buyer with the highest bid wins an between 0 and 105. Older vehicles may have brakes that are auction and gets the item. not robust and thus may be preferred to lead the road to a Auctions have been studied before in the context of deci- high-speed car. As seen in Table 1, some properties are about sion making for autonomous vehicles at junctions and have the vehicle itself (e.g., vehicle type), whereas some proper- been shown to reduce delays significantly [Carlino et al., ties give information about the passengers in the vehicle (e.g., 2013]. In that approach, autonomous vehicles bid money to journey of purpose). measure the value of a trip in terms of the value of time. Ac- In addition to the instances of properties, properties them- cording to the result of the auction, the driver can cross the in- selves can be associated a weight, to denote that one aspect tersection or wait. In our work, the bids consist of properties, of the vehicle is more important than a second one. The val- and the value of a bid is computed by a trusted Intersection ues in this table can be adjusted. Here, we assume that each Vehicle Type (t) Purpose of Journey (p) Age Band of Driver (b) Age of Vehicle (a) Vehicle 1 (V1 ) CAR SCHOOL 6 9 [0.76] [0.885] [0.15] [0.452] Vehicle 2 (V2 ) TAXI PARTOFWORK 9 5 [0.477] [0.879] [0.334] [0.948] Table 2: Properties for the Two Vehicles in Accident Number 2015331500103 property is equally important and thus assign a value of 0.25. to consider, since a vehicle may choose to keep some proper- Running Example. A taxi and a car meet at a junction, ties private to preserve its privacy instead of moving first. On where the car is headed for school and the taxi for work. How the other hand, there is no guarantee that a vehicle will get the to decide which vehicle will pass first? priority if it shares all its shareable properties. Recall that a The vehicles (V1 and V2 ) have the properties specified in vehicle only reveals its properties to the IM, which leads the Table 2 with different privacy values, which will be detailed auction and makes the decision about the winner. in Section 3. The age band of driver values of the vehicles To preserve privacy, each vehicle needs to prioritise its are 6 and 9 respectively; the age of the vehicle V1 is 9 and properties according to their privacy needs. Each property the age of the vehicle V2 is 5. An immediate question is how in Table 1 can be shared by a vehicle, if it meets the privacy the vehicles will generate the bids regarding the properties of needs of that vehicle. First, a vehicle assigns a privacy value the vehicles. We study three strategies that vary in how they for each property between 0 and 1. This value shows how preserve privacy. much a property is private for the vehicle. In Table 2, the pri- vacy values for each property are specified in brackets. For 2.2 Strategy 1: Bid-All. example, the vehicle type property has a privacy value of 0.76 The simplest strategy is when the vehicles decide to reveal for V1 . Second, a vehicle sets a single privacy threshold value all their properties in their bids. This type of strategy corre- between 0 and 1. A vehicle can only share a property with sponds to the Blind auction, where each bidder places a bid other IM entities if the privacy value of that property is below without considering the bids of others. The auctioneer an- or equal to its threshold. We call such properties shareable nounces the highest bidder who pays the amount of his bid. properties. According to Table 2 and Figure 1, if the privacy The Intersection Manager (IM) should make a decision to threshold is set to 0.8 for both of the vehicles, the shareable compute a priority value for the received bids, and let the ve- properties of V1 are {t, b, a}; and those of V2 are {t, b}. A hicle with the highest priority value to move first at the junc- shareable property is a candidate property that can be shared. tion. Note that the priority values can be computed in dif- In other words, a vehicle can decide which shareable property ferent ways; we propose one such priority function in Equa- to reveal according to the privacy-aware strategy that it em- tion 1. uv is the priority value of the vehicle v. All the shared ploys. In the following, we propose two such privacy-aware properties of a vehicle are added to the computation of the strategies. priority value. wp is the weight of the property p and wp.i is the weight for the instance of the property p. 3.1 Strategy 2: Bid-Privacy-Aware X A privacy-aware strategy would be when the vehicles decide uv = (wp ∗ wp.i ) (1) to reveal only all or some of their shareable properties. Bid- Privacy-Aware (BPA) strategy again corresponds to the Blind Figure 1 shows the interactions of two vehicles with IM, auction, but this time the vehicles place a privacy-preserving when the vehicles employ different bidding strategies. The bid and share some of their shareable properties. dotted circles and the dotted squares show the possible bids In Figure 1b, the shareable properties of V1 are {t, b, a}; of the two vehicles V1 and V2 . The winner of the auction has whereas V2 can share from {t, b}. When the vehicles fol- an underlined label. The first two strategies are single-shot low the BPA strategy, IM collects the shareable properties auctions; whereas the third strategy requires multiple interac- of V1 and V2 . It computes the priority values as 0.675 and tions with the IM. 0.425 (Equation 1). V1 wins the auction with the highest pri- In Figure 1a, when the vehicles follow Bid-All strategy, the ority value. In the Bid-All strategy, V2 was the winner when two vehicles share all their properties (t, p, b, a). According it shared all its properties. In the BPA strategy, V2 lost the to Equation 1, IM computes the priority values as 0.875 and auction since it preferred not to share some of its properties. 0.925 for V1 and V2 respectively. V2 is the vehicle with the In other words, V2 chose to preserve its privacy by revealing highest priority value; hence, it wins the auction and moves some of its shareable properties. This is a prime example that first. This strategy is blind to privacy since all relevant infor- depicts that vehicles might value their privacy more than the mation is shared without a privacy consideration. utility they will gain by revealing private information. 3 Privacy-aware Strategies 3.2 Strategy 3: Bid-Privacy-Incremental A vehicle that is willing to share most of its properties might The vehicles could decide when to make a bid regarding what be in an urgent situation. However, there is a privacy tradeoff properties they could share. If they knew that they would not (a) Bid-All (c) Bid-Privacy-Incremental Intersection Manager Intersection Manager V1 V1 bid? [0] t p t p t p b a b a b b a V2 t p V2 bid? [0.2] t p t p b a b a b a b (b) Bid-Privacy-Aware Intersection Manager V1 t p bid? [0.2] V1 t p a b a t b a b a V2 t p bid? [0.45] V2 t t p b a b a b Figure 1: Bidding strategies applied on the running example (Accident Number 2015331500103). The privacy threshold is set to 0.8. place a higher bid, they could choose not to place a new bid This strategy cannot change the outcome of an auction where to preserve their privacy. In Bid-Privacy-Incremental (BPI) the vehicles follow Bid-Privacy-Aware strategy. However, it strategy, each time that IM is waiting for new bids from the can help the vehicles to disclose their shareable properties vehicles, it broadcasts the priority value of the current high- minimally as shown in this particular example. est bid. The auction continues with the vehicles that can raise the highest bid. In this strategy, the vehicles are free to leave 4 Evaluation an auction if they cannot beat the current highest bid. Differ- ent from the previous strategies, the auction may terminate in So far we have introduced three strategies: Bid-All, Bid- several iterations. As before, the vehicle placing the highest Privacy-Aware and Bid-Privacy-Incremental. The first strat- bid gets the priority in traffic. This strategy corresponds into egy does not consider any privacy concerns of the agents in- an English auction. volved in an auction. However, the other two strategies can Assume that V1 is the first vehicle that communicates with be employed by the agents to preserve their privacy. In this the IM. In Figure 1c, V1 places a bid that consists of b in the section, we first introduce a privacy loss metric and we show first iteration. Note that in previous strategies, V1 revealed how this metric would be applied to our running example. By all its shareable properties. Then, IM computes the priority using a real-world dataset, we report the privacy loss results value of the received bid that is 0.2. IM asks V2 to place a when the agents employ various strategies for different pri- new bid and announces the current priority value. V2 places vacy thresholds. a bid that consists of b. IM computes the priority value of the received bid that is 0.2. IM asks V1 to place a new bid that 4.1 The Privacy Loss Metric values more than 0.2. V1 makes a bid that consists of a. IM In auctions, the vehicles put their bids by revealing all or computes the current priority value as 0.45. V2 is not able some of their properties. However, revealing a property re- to make a better bid since the only property that it can share sults in privacy loss. In Equation 2, we introduce a metric to is t. In such case, its priority value would become 0.425, measure the privacy loss of a vehicle. P Lv is the privacy loss which is less than the V1 ’s bid value. V2 leaves the auction value for the vehicle v. The privacy loss is basically the ratio without placing a new bid, and chooses to keep the property t of the privacy value of shared properties per the privacy value private. Compared to Bid-Privacy-Aware strategy, the privacy of all properties. In this equation, K is the number of shared loss for V1 and V2 is minimized. V1 wins the auction by only properties provided by v, N is the number of total proper- disclosing b and a; V2 loses the auction by only sharing b. ties and Pk is the privacy value of the kth property chosen by v. In this work, N is set to four as we refer to the auction well they help preserve the privacy of autonomous vehicles. properties described in Table 1. In each imported accident, there are two vehicles, which are the vehicle agents in the simulation. Our program reports K P the privacy loss results for each agent, and it makes use of Pk MongoDB to store the experiment results for different pri- P Lv = k=1 N ∗ 100 (2) vacy thresholds. Our implementation is available online at our GitHub page2 . P Pk k=1 For each accident, we generate two vehicle agents from In Table 2, for each vehicle, the privacy values of the prop- the dataset and one IM agent. Each vehicle agent represents erties are shown. The total privacy value of V1 is 2.247 (i.e., a vehicle involved in the accident from the dataset, and is the sum of all the privacy values); whereas V2 ’s total privacy equipped with the four auction properties (see Table 1). The value is 2.638. To compare the different strategies, we refer dataset does not contain any privacy values for such proper- to Figure 1. In Table 3, we report the privacy loss results of ties. Therefore, the privacy value for each property is gener- V1 and V2 when the vehicles employ different strategies. In ated randomly, each privacy value is a uniformly distributed Bid-All strategy, the privacy value of shared properties (the double value between 0 and 1. Note that these privacy values lost privacy value) is equal to the total privacy. Hence, the are only generated once and used throughout the experiments. privacy loss is 100% for both of the vehicles. Recall that For each accident in the dataset, the IM agent starts an the privacy threshold value is set to 0.8 for the running ex- auction with the vehicle agents, where both vehicle agents ample. In Bid-Privacy-Aware strategy, for V1 , the journey of use either Bid-All (BA), Bid-Privacy-Aware (BPA) or Bid- purpose (p) is not shared, then the lost privacy value becomes Privacy-Incremental (BPI) strategy. In Bid-All strategy, a 1.362. According to Equation 2, the privacy loss is computed vehicle shares all its properties, leading to a privacy loss of as 136.2/2.247 = 60.62%. In a similar way, the privacy value 100% at all times. In privacy-aware strategies, the privacy for V2 is computed as 30.74% (i.e., the properties t and b loss depends on the privacy threshold of the vehicle. If the are shared). In Bid-Privacy-Incremental strategy, for V1 the vehicle is in an urgent situation, it can choose a high pri- properties b and a are shared, and the privacy loss becomes vacy threshold to move first at the junction by sharing most 26.79%. For V2 , b is the only shared property and the privacy of its properties. To observe such variations, we run our ex- loss becomes 12.66%. If we look at the privacy-aware strate- periments with different privacy thresholds: 0.3, 0.5, 0.7, 0.8 gies, both vehicles preserve their privacy better when they and 0.9. For each accident, a privacy loss value is computed win or lose the auctions that they are involved in. For ex- per vehicle according to the metric in Equation 2. Hence, ample, when both vehicles employ Bid-Privacy-Incremental we can also compute the average privacy loss value of both strategy, V2 loses the auction by only revealing one property, vehicles involved in an accident. For the accident number which results in a low privacy loss value. 2015331500103, the generated privacy values are shown in Table 2. We report the privacy loss results for this accident in Figure 2 when the vehicles employ privacy-aware strategies. th=0.8 P Lv1 P Lv2 The privacy loss values are the same for both strategies when Bid-All 100% 100% the privacy threshold is 0.3. When this threshold is one of Bid-Privacy-Aware 60.62% 30.74% 0.5, 0.7 and 0.8, we observe that the privacy loss of Vehicle 2 is less (12.66%) when it uses Bid-Privacy-Incremental strat- Bid-Privacy-Incremental 26.79% 12.66% egy. Similarly, when the privacy threshold is 0.9, the privacy loss values are minimized for both vehicles when they pre- Table 3: Privacy loss results for the two vehicles fer using Bid-Privacy-Incremental strategy instead of Bid-All and Bid-Privacy-Aware strategies. The main reason for this is that the vehicles do not disclose their shareable properties 4.2 Results if they realize that they cannot place a better bid. We use the Road Safety Data [The UK Government, 2016] with the auction properties discussed in Table 1 and create 0.3 0.5 0.7 0.8 0.9 a real-world multiagent environment. We focus on the road BA 100% 100% 100% 100% 100% accidents that occurred between two vehicles at junctions. There are 4563 road accidents where complete information BPA 11.84% 30.1% 54.46% 68.73% 83.98% about the vehicles and their properties have been revealed. BPI 7.01% 20.57% 42.87% 58.19% 76.2% We developed a Java-based simulation environment that can represent the accidents that are of interest from the Table 4: Average privacy loss results when the privacy threshold is dataset. In our work, we have focused on accidents that have set to different values all the properties reported for the vehicles. The dataset is split into databases and collections, which are stored in Mon- In Table 4, we report the average privacy loss results of goDB1 . Our developed system can represent agents with var- 4563 road accidents from the dataset. We observe that Bid- ious settings and test different auction strategies to see how 2 https://github.com/PrivacyInInternetOfThings/ 1 https://www.mongodb.com/ AuctionBasedTraffic 100 100 PL1 PL1 PL2 PL2 80 80 AvgPL AvgPL % Privacy Loss % Privacy Loss 60 60 40 40 20 20 0 0 0.3 {0.5, 0.7, 0.8} 0.9 0.3 {0.5, 0.7, 0.8} 0.9 Privacy Threshold Privacy Threshold (a) Bid-Privacy-Aware (BPA) (b) Bid-Privacy-Incremental (BPI) Figure 2: The Privacy Loss of the Vehicles in Accident Number 2015331500103 with different strategies and privacy thresholds. The privacy loss of Vehicle 1, Vehicle 2 and their average are denoted as PL1, PL2 and AvgPL, respectively. Privacy-Incremental strategy helps the vehicles to preserve even to large networks. Both approaches show that by agent- their privacy more in every case. When the vehicles prefer a based signaling, the total amount of time that vehicles stop low privacy threshold value (i.e., the vehicles are conserva- is reduced significantly. While the main idea of those ap- tive about privacy), their privacy is preserved more. For ex- proaches is to reduce overall traffic, our focus here is to en- ample, when the privacy threshold is 0.3, the average privacy able urgent vehicles to express their situation and take prior- loss is only about 7%. The privacy loss increases when the ity. In doing so, we emphasize the fact that agents’ privacy vehicles decide to share most of their properties to pass first need to be preserved. at the junction. For example, when the privacy threshold is Intersection management has been studied extensively 0.8, the average privacy loss is 68.73% in Bid-Privacy-Aware from different angles [Lu et al., 2014]. Zohdy, Ka- strategy. The vehicles can preserve their privacy better by malanathsharma, and Rakha develop a tool called iCACC using Bid-Privacy-Incremental strategy. In that case, the pri- to regulate and optimize autonomous vehicles through inter- vacy loss becomes 58.19%. As a result, vehicles that employ section [Zohdy et al., 2012]. They show that compared to Bid-Privacy-Incremental strategy achieve the same level of signal control iCACC can minimize delays and fuel usage. success at passing at intersections, while they enjoy a higher Miculescu and Karaman propose a polling-systems-based al- level of privacy. gorithm for autonomous vehicles to adjust their speeds when they arrive in a traffic intersection [Miculescu and Karaman, 5 Related Work 2016]. They show that no accidents happen when the road length is above certain threshold. In our model, an inter- Agent-based approaches have been used to study traffic flow. section manager collects information provided by the vehi- Through multiagent simulations, the effect of traffic jams or cles to compute their priority values; accordingly, it coordi- speed limits have been studied. Doniec et al. [Doniec et al., nates the traffic. Dresner and Stone propose a mechanism 2008] develop a multiagent model to study the traffic flow for coordinating autonomous vehicles at intersections based at intersections. They represent the behavior of drivers with on information such as time of arrival and vehicle character- rules, with an emphasis on capturing an opportunistic behav- istics [Dresner and Stone, 2008]. Similarly, they use an in- ior, where drivers may prefer to violate norms. Their evalu- tersection manager that grants or rejects the requests of the ation shows that their proposed behavior models capture real vehicles and give priority to emergency vehicles such as am- life traffic flow better. In our approach, we facilitate the coor- bulances. However, in our model, we assume that each ve- dination of agents based on their particular context and infor- hicle can communicate with the intersection manager private mation, which might be private. Our coordination mechanism information. Another well-known work on intersection man- preserves the privacy of the vehicles as much as possible. agement is that of Virtual Traffic Lights [Ferreira et al., 2010], An alternative approach to coordinating traffic is to de- where the vehicles that approach an intersection first choose a sign intelligent traffic signaling. Choy et al. [Choy et al., leader, who then creates a virtual signal using predefined rules 2003] represent the signaling as a multiagent system, where based on the observable data that the vehicles communicate each agent is responsible for controlling an intersection. Each such as their speed and location. However, in our approach, agent employs a fuzzy-neural decision making module to in- we also consider the sensitive information of the passengers fluence the traffic policy. The agents learn over time how in the vehicle as well. Hence, we want to consider the par- they should produce the policies. They evaluate their ap- ticular situation in the vehicle (e.g., a patient in the vehicle). proach on a large traffic network. On a similar line, Abdoos While all discussed approaches are important, they do not ex- et al. [Abdoos et al., 2014] develop an approach where traf- plicitly consider the privacy of the autonomous vehicles. fic signals are controlled hierarchically by agents that employ Some approaches focus on using auctions to solve trans- Q-learning. Using tile coding, the approach is made to scale portation problems in a multiagent setting. Seshadri et al. al- leviate the traffic congestion and propose a multiagent system to the ambulance being the group leader. It would be interest- for reducing the node pressure [Seshadri et al., 2017]. They ing to extend our approach to handle such cases and study it introduce a multi-unit combinatorial auctioning system to al- on the Road Safety Data dataset to measure its applicability locate the resources and re-route the vehicle agents. Each ve- and effect on possible delays. hicle submits a bid, which is a binary vector, to change its cur- Another important extension would be adding a seman- rent path if it wins the auction. In our work, a bid is not a nu- tic layer to the auctions. Currently, each agent views vari- meric value but it consists of piece(s) of information. Accord- ous dimensions of the information as private with a certain ing to the internal reasoning of the agent, the agent decides to weight and acts accordingly. However, it is important to reveal some of its properties. The IM agent is the one that be able to capture what the privacy constraints of the vehi- gives a value to the bids (i.e., pieces of information received cles are semantically so that at different situations, the agents from other agents), and makes a decision about which vehi- can assign the privacy values based on environment, context, cle gets the priority, according to its decision-making mech- and other available information [Kökciyan and Yolum, 2016; anism. Ito et al. propose a multiagent setting for common Kökciyan and Yolum, 2017]. This would require the agent to value auctions [Ito et al., 2000]. Each agent is trying to pre- make inferences and decide based on that. dict an approximate market value of an item to avoid the win- For our proposed approach to be applied in real life, many ner’s curse. Gerding et al. consider a market where the seller underlying technologies need to be in place. For example, we employs a single second-price auction [Gerding et al., 2008]. assume that each vehicle reports its bids to the IM and thus Two types of bidders are involved in an auction. A global IM is the only entity with this information. However, if at bidder can bid in multiple auctions; whereas, a local bidder is the time of sharing, used communication technology results only allowed to bid only in a single auction. In this work, the in the information to reach third parties, there would be a vi- goal is to find the optimal bid (which is the value of an item) olation of privacy. It would be interesting to use a test-bed under various settings. environment to realize the approach on actual vehicles using existing communication technologies. 6 Future Directions Acknowledgments Intersections can be managed effectively and safely when ve- hicles can inform others about their situation. However, en- This work was partially supported under grant by the UK En- suring the privacy of the entities are of utmost importance. gineering & Physical Sciences Research Council (EPSRC) We show that privacy-preserving bidding strategies can both under grant #EP/P010105/1. help vehicles preserve their privacy while enabling intersec- tions to be managed dynamically. References This work opens up interesting directions for research. [Abdoos et al., 2014] Monireh Abdoos, Nasser Mozayani, Here, we ran our experiments for specific settings. There are and Ana LC Bazzan. Hierarchical control of traffic signals more settings that we would like to work on as part of our using q-learning with tile coding. Applied intelligence, future work. For example, what would happen if each agent 40(2):201–213, 2014. employs a different strategy when they meet at a junction? [Atherton, 2016] Kelsey D. Atherton. The de- Or, would it be possible for them to collaborate independently partment of transportation wants to make cars to abuse the system? Or, how our proposed strategies would talk. https://www.popsci.com/department- work if more than two vehicles meet at a junction? Or, how an transportation-wants-to-make-cars-talk, agent can choose a privacy threshold automatically according 2016. last accessed 11/04/2018. to its previous auction results, the variables of its environ- ment? In other words, a vehicle can learn how to bid better to [Bazzan and Klugl, 2014] Ana L. C. Bazzan and Franziska win the auctions by preserving its privacy at the same time. Klugl. A review on agent-based technology for traffic In some cases, vehicles would need to move in groups (i.e., and transportation. The Knowledge Engineering Review, vehicle platoons) for various reasons; e.g., people in the vehi- 29(3):375–403, 2014. cles would be traveling together. This would require groups [Carlino et al., 2013] Dustin Carlino, Stephen D Boyles, and to go into auctions, rather than the individual vehicles as we Peter Stone. Auction-based autonomous intersection man- have shown above. However, different vehicles in the group agement. In 16th International IEEE Conference on Intel- could have different privacy concerns that might not have ligent Transportation Systems, pages 529–534, 2013. been revealed even to the other vehicles in the group, requir- [Chen and Cheng, 2010] B. Chen and H. H. Cheng. A re- ing extended mechanisms to be in place. As a motivating ex- ample, consider this case: A vehicle v does not want to reveal view of the applications of agent technology in traffic and any of its properties because it wants to preserve its privacy. transportation systems. IEEE Transactions on Intelligent Such a vehicle would lose all of the auctions since the other Transportation Systems, 11(2):485–497, 2010. vehicles would be winners by just sharing at least one prop- [Choy et al., 2003] Min Chee Choy, Dipti Srinivasan, and erty. Now assume that the vehicle v is part of a group of Ruey Long Cheu. Cooperative, hybrid agent architecture vehicles and it is ahead of an ambulance, which has a high for real-time traffic signal control. IEEE Transactions on chance of getting priority at a junction. In such a case, v Systems, Man, and Cybernetics-Part A: systems and hu- could pass first without revealing any of its properties thanks mans, 33(5):597–607, 2003. [Crew, 2015] Bec Crew. Driverless cars could re- pressure and auctions. In Intelligent Transportation Sys- duce traffic fatalities by up to 90report. https: tems (ITSC), 2017 IEEE 20th International Conference on, //www.sciencealert.com/driverless-cars- pages 1–7. IEEE, 2017. could-reduce-traffic-fatalities-by-up-to- [The UK Government, 2016] The UK Government. Road 90-says-report, 2015. last accessed 11/04/2018. safety data. https://data.gov.uk/dataset/road- [Doniec et al., 2008] Arnaud Doniec, René Mandiau, Syl- accidents-safety-data, 2016. last accessed vain Piechowiak, and Stéphane Espié. A behavioral multi- 11/04/2018. agent model for road traffic simulation. Engineering [Weiss, 1999] Gerhard Weiss, editor. Multiagent Systems: Applications of Artificial Intelligence, 21(8):1443–1454, A Modern Approach to Distributed Artificial Intelligence. 2008. MIT Press, Cambridge, MA, USA, 1999. [Dresner and Stone, 2008] Kurt Dresner and Peter Stone. A [Zohdy et al., 2012] I. H. Zohdy, R. K. Kamalanathsharma, multiagent approach to autonomous intersection manage- and H. Rakha. Intersection management for autonomous ment. Journal of artificial intelligence research, 31:591– vehicles using iCACC. In IEEE Conference on Intelligent 656, 2008. Transportation Systems, pages 1109–1114, 2012. [Ferreira et al., 2010] Michel Ferreira, Ricardo Fernandes, Hugo Conceição, Wantanee Viriyasitavat, and Ozan K Tonguz. Self-organized traffic control. In Proceedings of the seventh ACM international workshop on VehiculAr In- terNETworking, pages 85–90. ACM, 2010. [Gerding et al., 2008] Enrico H. Gerding, Rajdeep K. Dash, Andrew Byde, and Nicholas R. Jennings. Optimal strate- gies for bidding agents participating in simultaneous vick- rey auctions with perfect substitutes. Journal of Artificial Intelligence Research, 32(1):939–982, 2008. [Ito et al., 2000] T. Ito, N. Fukuta, T. Shintani, and K. Sycara. BiddingBot: a multiagent support system for cooperative bidding in multiple auctions. In Proceedings Fourth International Conference on MultiAgent Systems, pages 399–400, 2000. [Kökciyan and Yolum, 2016] Nadin Kökciyan and Pınar Yolum. Priguard: A semantic approach to detect privacy violations in online social networks. IEEE Transactions on Knowledge and Data Engineering, 28(10):2724–2737, 2016. [Kökciyan and Yolum, 2017] Nadin Kökciyan and Pınar Yolum. Context-based reasoning on privacy in internet of things. In Proceedings of the Twenty-Sixth Interna- tional Joint Conference on Artificial Intelligence, IJCAI- 17, pages 4738–4744, 2017. [Lu et al., 2014] N. Lu, N. Cheng, N. Zhang, X. Shen, and J. W. Mark. Connected vehicles: Solutions and challenges. IEEE Internet of Things Journal, 1(4):289–299, 2014. [Miculescu and Karaman, 2016] David Miculescu and Ser- tac Karaman. Polling-systems-based autonomous vehicle coordination in traffic intersections with no traffic signals. CoRR, abs/1607.07896, 2016. [National Safety Council, 2016] National Safety Council. 2017 estimates show vehicle fatalities topped 40,000 for second straight year. https://www.nsc.org/road- safety/safety-topics/fatality-estimates, 2016. last accessed 11/04/2018. [Seshadri et al., 2017] Madhavan Seshadri, Zhiguang Cao, Hongliang Guo, Jie Zhang, and Ulrich Fastenrath. Multiagent-based cooperative vehicle routing using node