This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

\hypersetup

hidelinks

Reputation-Driven Asynchronous Federated Learning for Enhanced Trajectory Prediction with Blockchain

Weiliang Chen, Li Jia, Yang Zhou, Qianqian Ren Manuscript received April 19, 2021; revised August 16, 2021. This work was supported by National Natural Science Foundation of China (62303296, 61773251). (Corresponding author: Yang Zhou, Qianqian Ren.) Weiliang Chen and Qianqian Ren are with the Department of Computer Science and Technology, Heilongjiang University, Harbin 150080, Peoples R China (e-mail: [email protected], [email protected]). Li Jia and Yang Zhou are with Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai 200444, Peoples R China (e-mail: [email protected]; [email protected]). Yang Zhou is with Shanghai Univ, Shanghai Artificial Intelligence Lab, Shanghai 201109, Peoples R China (e-mail: [email protected]). 0000-0003-1978-7504 0000-0002-5566-9209 0000-0002-2582-9494 0000-0003-1171-7018
Abstract

Federated learning combined with blockchain empowers secure data sharing in autonomous driving applications. Nevertheless, with the increasing granularity and complexity of vehicle-generated data, the lack of data quality audits raises concerns about multi-party mistrust in trajectory prediction tasks. In response, this paper proposes an asynchronous federated learning data sharing method based on an interpretable reputation quantization mechanism utilizing graph neural network tools. Data providers share data structures under differential privacy constraints to ensure security while reducing redundant data. We implement deep reinforcement learning to categorize vehicles by reputation level, which optimizes the aggregation efficiency of federated learning. Experimental results demonstrate that the proposed data sharing scheme not only reinforces the security of the trajectory prediction task but also enhances prediction accuracy.

Index Terms:
Trajectory prediction, data sharing, graph convolutional network, asynchronous federated learning, differential privacy, deep reinforcement learning.

I Introduction

The rapid advancements in emerging computational and communication technologies within the 5G network have revolutionized the operational paradigms of modern vehicular services and applications, thereby enhancing the overall driving experience[1]. Autonomous vehicles represent intricate systems that amalgamate various technologies, including perception algorithms[2], path planning[3], control theory[4], and vehicle positioning[5]. Among the crucial research domains in autonomous vehicles, trajectory prediction[6] stands out as it plays an essential role in the decision-making processes of intelligent vehicles. A precise and dependable vehicle trajectory prediction algorithm holds the capability to anticipate potential traffic accidents, thus safeguarding overall vehicular safety by enabling timely preventive measures.

Currently, trajectory prediction in the context of autonomous vehicles is mainly driven by neural network approaches. Recurrent neural networks (RNNs) are leading the way. Researchers have made extensive efforts to develop vehicle trajectory prediction models based on historical trajectory data and environmental information. For instance, GRIP[7] optimizes convolutional layers with graph operations, treating the driving scenario as a graph model. In this way, the interactions between the vehicles are represented as the interrelationships between the nodes of this graph model. The method[8] introduces a novel framework based on spectral clustering, enabling simultaneous prediction of vehicle trajectories and driving behavior. While these studies yield promising results, we must recognize that trajectory prediction faces significant challenges in the real world, especially in traditional telematics environments. In these cases, owners of trajectory data face a vexing problem of data silos. This issue emphasizes the necessity for creative solutions, and federated learning (FL) is a promising method for addressing it.

FL presents a viable strategy for preserving data privacy in distributed settings[9]. It achieves edge intelligence by imparting knowledge gleaned from decentralized data sources while upholding stringent privacy standards. Moreover, when coupled with the inherent features of blockchain technology[10], such as tamper resistance, anonymity, and traceability, it establishes a robust foundation for efficient and reliable data sharing among participants. Even in situations where trust among participants is limited, users are required to transmit model parameters to a central server for aggregation. This not only facilitates parallel learning to enhance the global model but also ensures data integrity, maintains anonymity, and provides traceability. Nonetheless, as autonomous driving continues to advance rapidly and the data generated by vehicles becomes increasingly complex, the task of trajectory prediction still confronts several pressing challenges that require resolution:

  1. 1.

    Lack of complete trust in multiple parties. Many current data sharing schemes with central administrators pose an increased risk of data leakage. Administrators must manage large volumes of aggregated data from multiple parties, including unknown or raw sources.

  2. 2.

    Uncertainty in participant data quality. Due to vehicle mobility and unreliable communications, the data sharing environment is highly fluid, with new unverified data being created constantly. When data providers share malicious or redundant data, it can significantly bias the entire prediction process.

  3. 3.

    Extensive prediction delays. In the context of updating dynamic vehicle data, addressing aggregation challenges caused by delays in heterogeneous vehicle data is crucial. The conventional approach, which relies solely on federated learning-enabled blockchain technology, requires coordination among Roadside Units (RSUs) at each timestamp before uniformly uploading data for global aggregation.

To systemically address these limitations, we introduce a novel trajectory prediction approach RAFLTP based on graph neural networks to address the aforementioned challenges. We design an asynchronous FL strategy based on reputation evaluation to quantify vehicle reputation through interactions between vehicles. Furthermore, data providers release data structures under the constraints of differential privacy. Due to the excellent performance of deep reinforcement learning (DRL) in dealing with dynamic stochastic decision problems, many studies use DRL to improve the performance and efficiency of FL. For instance, deep Q-learning network (DQN) and FL are applied jointly to address challenges in edge computing, including task offloading [11], caching, and communication issues [12]. Additionally, deep deterministic policy gradient (DDPG) is employed to select device nodes with high data quality for improved model aggregation and reduced communication costs [13, 14]. Moreover, proximal policy optimization (PPO) is utilized to determine the optimal task scheduling strategy [15]. It is worth noting that both DQN and PPO are more adept at solving discrete action space problems. Due to its excellent stability and efficiency [16], PPO is our primary choice for achieving the vehicle grouping task to minimize the FL cost. The contributions of this paper can be summarized as follows.

  • We present an interpretable reputation-based framework for secure data sharing in trajectory prediction tasks. We design a reputation reward mechanism that replaces the traditional loss function with reputation values computed from vehicle trajectory data, driving the method components to cooperate and promoting federated learning to train more instructive global models.

  • We propose a reputation-driven asynchronous FL scheme adapted to dynamic and heterogeneous vehicle networks. This scheme is complemented by a reputation-enhanced PPO algorithm that groups vehicle trajectory models based on reputation values to reduce the FL cost. High-reputation vehicle clusters, characterized by high data quality and similar trajectory graph models, are prioritized for deep global federated learning aggregation.

  • We introduce differential privacy techniques to enhance the privacy and security of shared trajectory graph models and vehicle reputation values while preserving the graph structure and interactions among vehicles.

  • Extensive experiments are conducted on two large-scale vehicle trajectory datasets, namely NGSIM and ApolloScape, with different real-world scenarios, comparing our approach with other related models. The results demonstrate that our data sharing scheme effectively ensures data security, enhances trajectory prediction accuracy, and adapts well to various traffic scenarios. Moreover, comprehensive ablation studies confirm the effectiveness of our method components.

The rest of the paper is organized as follows. Section II presents related work. Section III gives the problem definition. Sections IV and V elaborate on the proposed model. Section VI presents an extensive experiment evaluation. Section VII concludes the paper.

II RELATED WORK

Trajectory prediction spans multiple domains, incorporating statistics[17], signal processing[18], and control systems engineering[4]. Contemporary trajectory prediction techniques often rely on data-driven approaches, particularly deep learning methods. CS-LSTM[19] and Social-STGCNN[20] combine neural networks and graph-based models to handle vehicle interactions. Some deep learning methods[21, 22, 23] have been employed for trajectory prediction. However, they primarily focus on local road interactions. In contrast, graph-based methods such as GRIP[7] and certain traffic density prediction techniques are capable of accommodating interactions without geographical constraints, ensuring a comprehensive view. Spectral[8] simulates the entire world, allowing graph models to capture diverse temporal correlations. Real-world traffic scenarios often face data silos, contrasting with the Internet of Vehicles (IoV)[24], an emerging paradigm that promotes high-quality services by enabling vehicles to share road-related information within in-vehicle networks. Data sharing[25] is integral to enhancing driving experiences and Internet of Thing (IoT) services, with data quality hinging on vehicle reputation[26], considering the potential for incorrect or irrelevant information stemming from defective sensors, corrupted firmware, or selfish motives. Therefore, developing a mechanism for quantifying vehicle reputation based on inter-vehicle interactions is pivotal[27].

Trust management systems in vehicular networks enable vehicles to assess information trustworthiness and provide network operators with a basis for incentives or penalties[28]. Centralized trust systems often struggle to meet stringent quality of service (QoS) requirements due to short decision times and central server reliance[29]. Distributed trust systems, where vehicles or roadside units manage trust locally, reduce network infrastructure interactions but face challenges due to variable vehicle capabilities and network dynamics[30]. Some studies involve roadside units in trust management[31], but RSUs can be half-trusted, leading to inconsistent services[32]. Various schemes exist, including trust calculation upon data reception and joint privacy-reputation consideration[33]. These approaches require vehicles to manage trust values, which may be inaccurate due to limited observations or failures[34]. Blockchain technology, known for its security features, has gained attention for vehicular data sharing[35]. Combining AI and blockchain enhances resource sharing under 5G conditions. Despite efforts like the Bayesian inference model on a public blockchain[26], creating a decentralized, reliable, and consistent vehicular trust management system remains challenging.

FL[36] offers privacy-preserving edge intelligence in distributed scenarios, allowing users to maintain their data while sharing model parameters with a server for collaborative global model learning. Traditional synchronous FL results in high communication costs and idle times[37, 38]. To improve efficiency, an asynchronous mini-batch algorithm was proposed, addressing optimization problems with multiple processors[39]. However, existing FL methods like Stochastic Gradient Descent (SGD) or Deep Neural Networks (DNN) may risk exposing sensitive data. Most data sharing schemes involve large amounts of aggregated data, including fresh, malicious, or redundant data[40]. Differential privacy[41], unlike prior models such as k-anonymity[42] and l-diversity[43], offers reliable privacy guarantees, defending against various privacy attacks. A machine learning differential privacy[44] has been proposed that releases data structures under the constraints of differential privacy rather than directly disclosing queries and answers.

III SYSTEM MODEL

In this paper, based on the inefficiency and poor security of current trajectory prediction methods, we propose a new asynchronous FL model for trajectory prediction, which effectively addresses the problems of inefficient training and privacy leakage in existing methods.

III-A Formulation of Trajectory Prediction

To begin with, we propose integrating the task of trajectory prediction into a practical scenario of distributed data sharing that involves multiple participants. Each participant has their own data and is willing to share it to realize the collaborative task, but we cannot exclude the existence of malicious sharers who try to interfere with the trajectory prediction task. In addition, the vehicular network comprises vehicles, RSUs, and Macro Base Stations (MBSs), primarily utilizing vehicle-to-vehicle (V2V) and vehicle-to-RSU (V2R) communication. RSUs are equipped with Mobile Edge Computing (MEC) servers, providing computational and storage capabilities. The proposed data sharing architecture comprises a permissioned blockchain module and a FL module, illustrated in Fig. 1. The permissioned blockchain handles retrieval and data-sharing transactions. We utilize the permissioned blockchain solely for retrieving relevant data and managing data accessibility, without recording the raw data.

We consider NN vehicle participants and a joint dataset D={D1,D2,,Dn}D=\{D_{1},D_{2},\ldots,D_{n}\}. For any vehicle vreqviv_{\text{req}}\in v_{i} that participates in the request for data sharing, its local dataset DiDD_{i}\in D, which contains the historical trajectory Xτ×n×2X\in\mathbb{R}^{\tau\times n\times 2} of all observations at time step observations at time step 𝒯\mathcal{T}:

X=[𝒫(1),𝒫(2),,𝒫(𝒯)]X=\left[\mathcal{P}^{(1)},\mathcal{P}^{(2)},\cdots,\mathcal{P}^{\left(\mathcal{T}\right)}\right] (1)

where 𝒫(t)=[[x0t,y0t],[x1t,y1t],,[xnt,ynt]]n×2\mathcal{P}^{(t)}=\left[\left[x_{0}^{t},y_{0}^{t}\right],\left[x_{1}^{t},y_{1}^{t}\right],\ldots,\left[x_{n}^{t},y_{n}^{t}\right]\right]\in\mathbb{R}^{n\times 2} are the coordinates of all observations at time tt and nn is the number of observations. We employ a coordinate system based on the measured relative values of the self-vehicle with reference to [45]. And the output 𝒴T×n×2\mathcal{Y}^{\prime}\in\mathbb{R}^{T\times n\times 2}, which predicts the future positions of all observations from time step 𝒯+1\mathcal{T}+1 to 𝒯+𝒯f\mathcal{T}+\mathcal{T}_{f}:

𝒴=[𝒫(𝒯+1),𝒫(𝒯+2),,𝒫(𝒯+𝒯f)]\mathcal{Y}^{\prime}=\left[\mathcal{P}^{\left(\mathcal{T}+1\right)},\mathcal{P}^{\left(\mathcal{T}+2\right)},\cdots,\mathcal{P}^{\left(\mathcal{T}+\mathcal{T}_{f}\right)}\right] (2)

where 𝒯f\mathcal{T}_{f} is the predicted range.

Refer to caption
Figure 1: Architecture of secure data sharing solution.

III-B Our Proposed Architecture And Workflow

To improve computational and storage efficiency while facing limited resources, and to ensure secure and robust vehicle interactions, we implement a graph-based approach for model training and data sharing. Initially, vehicles must undergo authentication to become legitimate nodes in the permissioned blockchain, obtaining certificates for participating in V2V data sharing, and enabling them to download the global model locally for training purposes. Subsequently, vehicles transmit data sharing requests to nearby super nodes (such as MBS and RSU) for processing. Upon verifying their public keys, the super nodes commence the collection of weighted graph models perturbed with differential privacy noise from vehicles within the community for federated learning training. Participating vehicles compute reputation values based on the original data to assess the quality of their trajectory data. These values are recorded as shared transactions and in the local models of other participating vehicles within each vehicle’s local Directed Acyclic Graph (DAG). To mitigate the global aggregation latency and optimize the aggregation results, we use the PPO algorithm to group vehicles based on the reputation evaluation mechanism. Therefore, the high-quality vehicle clusters receive priority in deep aggregation. The super nodes collaborate to train the global model MM through asynchronous FL and broadcast the results to all committee nodes, which are charged with driving the consensus process for the permissioned blockchain. The committee nodes collect the transactions into blocks and verify the blocks to further add them to the permissioned blockchain. The vehicles optimize their local models by integrating the global model, thereby achieving increased accuracy in predicting trajectories. Fig. 2 shows the working mechanism of our scheme.

Refer to caption
Figure 2: Working mechanisms for the proposed methodology.

IV Reputation-Based Hybrid Blockchain For Data Sharing

Considering resource constraints and privacy concerns of vehicle users, we propose a data sharing scheme, which involves the collaborative learning of a federated graph neural network model across decentralized parties to share well-trained model parameters instead of raw data.

IV-A Graph-Based Trajectory Modeling

Our approach transforms object trajectories into weighted graphs for interaction modeling. Referring to the trajectory prediction model GRIP++[45], each object trajectory is organized as a 3D array, computed for improved speed to enhance prediction accuracy. We use undirected graphs G={V,E}G=\{V,E\} to depict the interactions between objects. The input data is processed by graph convolution network (GCN). Graph operations handle spatial interactions and temporal convolution captures time-based features. Both the encoder and decoder used for the trajectory prediction model are two-layer GRU (Gated Recurrent Unit) networks. Based on this, G={V,E}G=\{V,E\} is converted into a weighted graph of vehicle trajectories. The set of nodes VV is defined as V={viti=1,,n,t=1,,𝒯}V=\left\{v_{it}\mid i=1,\cdots,n,t=1,\cdots,\mathcal{T}\right\}, with nn denoting the total number of objects observed in the scene. Each node vitv_{it} contains its own weights winw_{i}^{n}. The weights wvitw_{v_{it}} are determined based on the similarity of trajectories between vehicles, including direction, speed, and tilt angle, as described in the following subsection. Subsequently, GG is serialized into ordered vectors that are then mapped onto linear vectors. These maps are combined to form a global vehicle network graph 𝒢={G1G2,,Gn}\mathcal{G}=\left\{G_{1}\cup G_{2},\dots,\cup G_{n}\right\}. For the overall graph 𝒢={𝒱,}\mathcal{G}=\{\mathcal{V},\mathcal{E}\}, the number of representative vertices is denoted as kk. Afterwards, the size of the normalization property of the vertices will be kk and the size of the normalization property of the edges will be k×(k1)/2k\times(k-1)/2. Eventually, the normalized vector Seq=𝒱={𝒱1,,𝒱k}Seq=\mathcal{V}\cup\mathcal{E}=\left\{\mathcal{V}_{1},\ldots,\mathcal{V}_{k}\right\}\cup{1,2,,k(k1)/2}\left\{\mathcal{E}_{1},\mathcal{E}_{2},\ldots,\mathcal{E}_{k(k-1)/2}\right\}.

After that, we use cosine similarity as a distance function to compare vehicle matrices sequentially in temporal order, and confidence levels above 80% will fail validation, as well as new weighted graphs added in future moments with confidence levels above a preset threshold will fail validation. By using weighted graphs and the PPO algorithm, the set of vehicles {V1,,Vn}\left\{V_{1},\ldots,V_{n}\right\} is divided into high and low reputation groups. Through this differential privacy federation learning mechanism, instead of sharing local vehicle model parameters, the shared graph neural network model is used to retrieve and compare confidence levels thus filtering out the series of graphs with high trustworthiness as well as low similarity, which prevents the model parameters from leaking the vehicle trajectory information and improves the efficiency of the next global aggregation.

IV-B Differential Privacy-Enhanced Data Sharing

Our objective is to develop a secure mechanism for data sharing in trajectory prediction scenarios that intelligently facilitates data sharing among distributed multi-users while effectively safeguarding data privacy. Our approach involves considering 𝒩\mathcal{N} parties or data holders, along with a joint data set 𝔻\mathbb{D}. For each party PiP_{i}, there exists a local data set 𝔻i\mathbb{D}_{i} in 𝔻\mathbb{D}. All 𝒩\mathcal{N} parties unanimously agree to share data without compromising confidential information. Let R={r1,r2,,rm}R=\left\{r_{1},r_{2},\ldots,r_{m}\right\} represent requests for data sharing. Requesters submit queries rir_{i}, and we provide computed results rather than raw data to fulfill sharing requirements. Finally, the trained global model MM is returned to the committee node. Recipients can leverage the received global aggregation model to respond to data sharing requests locally.

Considering the large size and sensitivity of the data, inspired by previous work[46], we utilize the blockchain for data retrieval, while the actual data remains stored on local vehicles. We combine graph neural networks and differential privacy for quality verification. Using a graph representation of the raw data improves computational and storage efficiency under resource constraints, preserving more structural and contextual information for validation while also preventing privacy leakage. Once new data providers join, their uniqueness (vehicle ID) is recorded on the blockchain, alongside an overview of their data, including trajectory data, vehicle types, and data sizes. All data profiles from multiple participants are recorded as transactions and verified by blockchain nodes using Merkle trees[47]. Each data sharing event is also stored as a transaction on the blockchain. All participants (denoted as {P1,P2,,Pn}\left\{P_{1},P_{2},\ldots,P_{n}\right\}) are selected through multi-party searches in the blockchain and are divided into communities based on their reputation values. These communities consist of members with similar data quality. Given the limited communication resources of IoT devices, the retrieval process should also consider the matrix cosine similarity between the two participants. When a user submits a request to share data with a nearby node PiP_{i}, all nodes within the identical community as PiP_{i} broadcast this request to other vehicles that are observing the target during that timestamp to commence the retrieval process. The process is recursively executed until all trajectory graphs for that timestamp have been executed. At the end of the retrieval process, we will procure a collection of vehicles PsP_{s}\subseteq\mathbb{P} that pertain to the request. These vehicles exhibit structural stability, the absence of anomalous data, and minimized redundancy in trajectory graphs within the community, addressing the constraints posed by limited communication resources. To ensure privacy protection for the shared model, we employ differential privacy for each local model mim_{i} using the Laplace mechanism. Here, we add calibrated noise with sensitivity ss to the local data to train m^i\hat{m}_{i}, expressed as:

m^i=mi+Laplace(s/ϵ),\hat{m}_{i}=m_{i}+Laplace(s/\epsilon), (3)

where ϵ\epsilon denotes the privacy budget. Subsequently, participant PiP_{i} transmits the model m^i\hat{m}_{i} as a blockchain transaction broadcast to other participants for federated learning. Upon receiving m^i\hat{m}_{i}, participant Pi+1P_{i+1} trains a new local data model m^i+1\hat{m}_{i+1} based on the received m^i\hat{m}_{i} and its local data, and subsequently broadcasts m^i+1\hat{m}_{i+1} to other participants. This iterative process continues among participants. Finally, a global model MM is generated, given by ={m^1m^2m^n}\mathcal{M}=\left\{\hat{m}_{1}\cup\hat{m}_{2}\ldots\cup\hat{m}_{n}\right\}.

Refer to caption
Figure 3: Reputation-Aware Data Sharing Mechanism

IV-C Trajectory Similarity-Based Reputation-Aware Data Sharing

The use of Mean Absolute Error (MAE) as an evaluation metric may not be practical in real-world trajectory prediction scenarios. We employ a novel evaluation metric: the reputation value derived from trajectory similarity among vehicles. The locally collected vehicle data is spatially correlated and exhibits a spatial extent. Incorporating trajectory similarity into reputation calculations when sharing data between vehicles enables location awareness and enhances data relevance. The more similar the trajectories, the more relevant the shared data from the data provider, resulting in improved quality, accuracy, and reliability of the shared data. Trajectory coefficients of a vehicle are represented as v={v=\{velocity, position, orientation}\}. The weights of each coefficient in vv are ρ1\rho_{1}, ρ2\rho_{2}, and ρ3\rho_{3}, and ρ1+ρ2+ρ3=1\rho_{1}+\rho_{2}+\rho_{3}=1. The similarity between two trajectory segments, 𝒥i\mathcal{J}_{i} and 𝒥j\mathcal{J}_{j}, of vehicles ii and jj, can be expressed as 𝒮(𝒥i,𝒥j)\mathcal{SIM}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right). This is calculated using the Eq.(4),

𝒮(𝒥i,𝒥j)=1𝒟𝒮𝒮(𝒥i,𝒥j)\mathcal{SIM}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right)=1-\mathcal{DISS}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right) (4)

The normalized dissimilarity for LiL_{i} and LjL_{j}, denoted as 𝒟𝒮𝒮(𝒥i,𝒥j)\mathcal{DISS}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right), is used to calculate this similarity, as Eq.(5),

𝒟𝒮𝒮(𝒥i,𝒥j)=\displaystyle\mathcal{DISS}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right)= ρ1velocity(𝒥i,𝒥j)+ρ2position(𝒥i,𝒥j)\displaystyle\rho_{1}\operatorname{velocity}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right)+\rho_{2}\operatorname{position}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right) (5)
+ρ3orientation(𝒥i,𝒥j).\displaystyle+\rho_{3}\operatorname{orientation}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right).

We assert that 𝒟𝒮𝒮(𝒥i,𝒥j)\mathcal{DISS}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right) relies on the disparity in velocity, position, and orientation of the two trajectory segments. The velocity difference between the two segments of the trajectory is given by

velocity(𝒥i,𝒥j)=|Wave(𝒥i)Wave(𝒥j)|max[W(𝒥i),W(𝒥j)]\operatorname{velocity}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right)=\frac{\left|W_{\mathrm{ave}}\left(\mathcal{J}_{i}\right)-W_{\mathrm{ave}}\left(\mathcal{J}_{j}\right)\right|}{\max\left[W\left(\mathcal{J}_{i}\right),W\left(\mathcal{J}_{j}\right)\right]} (6)

where W(𝒥i)W\left(\mathcal{J}_{i}\right) and W(𝒥j)W\left(\mathcal{J}_{j}\right) are the velocities of vehicles ii and jj during their trajectory segments, respectively. Wave (𝒥i)W_{\text{ave }}\left(\mathcal{J}_{i}\right) and Wave (𝒥j)W_{\text{ave }}\left(\mathcal{J}_{j}\right) are the average velocities of these two vehicles. The position(𝒥i,𝒥j)\left(\mathcal{J}_{i},\mathcal{J}_{j}\right) shows the variance in the position between the trajectory segments. The number of sampled points for 𝒥i\mathcal{J}_{i} and 𝒥j\mathcal{J}_{j} during the time window TT are denoted as ee and kk, respectively. The set of sampled points in temporal order are {Pi1,Pi2,,Pie}\left\{P_{i1},P_{i2},\ldots,P_{ie}\right\} and {Pj1,Pj2,,Pjk}\left\{P_{j1},P_{j2},\ldots,P_{jk}\right\}. We employ the Longest Common Sequence (LCS) method to measure the similarity of trajectory segments. For trajectory segments 𝒥i\mathcal{J}_{i} and 𝒥j\mathcal{J}_{j}, the LCS is described as LCS(𝒥i,𝒥j)={Pie=\operatorname{LCS}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right)=\left\{P_{ie}=\right.Pjke=k}\left.P_{jk}\mid e=k\right\}, where e{1,2,,E},k{1,2,,K}e\in\{1,2,\ldots,E\},k\in\{1,2,\ldots,K\}. Therefore, the equation for the difference in position between the trajectory segment position(𝒥i,𝒥j)\left(\mathcal{J}_{i},\mathcal{J}_{j}\right) is provided as follows:

position(𝒥i,𝒥j)=max(e,k)num[LCS(𝒥i,𝒥j)]max(e,k)\operatorname{position}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right)=\frac{\max(e,k)-\operatorname{num}\left[\operatorname{LCS}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right)\right]}{\max(e,k)} (7)

where num[LCS(𝒥i,𝒥j)]\operatorname{num}\left[\operatorname{LCS}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right)\right] is the number of points in the LCS of the trajectory segments 𝒥i\mathcal{J}_{i} and 𝒥j\mathcal{J}_{j}. The directory difference between the two trajectory segments is the angle between the two trajectory segments. Here, we employ φ\varphi as the angle between the trajectories 𝒥i\mathcal{J}_{i} and 𝒥j\mathcal{J}_{j} to represent the direction. More precisely,

orientation(𝒥i,𝒥j)={sinφ2,0<φπ212+|sin(φ+π2)|2,π2<φπ\operatorname{orientation}\left(\mathcal{J}_{i},\mathcal{J}_{j}\right)=\left\{\begin{array}[]{l}\frac{\sin\varphi}{2},0<\varphi\leq\frac{\pi}{2}\\ \frac{1}{2}+\frac{\left|\sin\left(\varphi+\frac{\pi}{2}\right)\right|}{2},\frac{\pi}{2}<\varphi\leq\pi\end{array}\right. (8)

1) Local Opinions for Subjective Logic

In the case of two vehicles, the reputation between viv_{i} and vjv_{j} can be formally described as a local opinion vector ωij:={rij,dij,uij}\omega_{i\rightarrow j}:=\left\{r_{i\rightarrow j},d_{i\rightarrow j},u_{i\rightarrow j}\right\}, where rijr_{i\rightarrow j}, dijd_{i\rightarrow j}, and uiju_{i\rightarrow j} denote trust, distrust, and uncertainty, respectively. rij+dij+uij=1r_{i\rightarrow j}+d_{i\rightarrow j}+u_{i\rightarrow j}=1, and rijr_{i\rightarrow j},dijd_{i\rightarrow j},uij[0,1]u_{i\rightarrow j}\in[0,1]. Here,

{rij=(1uij)αα+βdij=(1uij)βα+βuij=1sij\left\{\begin{array}[]{l}r_{i\rightarrow j}=\left(1-u_{i\rightarrow j}\right)\frac{\alpha}{\alpha+\beta}\\ d_{i\rightarrow j}=\left(1-u_{i\rightarrow j}\right)\frac{\beta}{\alpha+\beta}\\ u_{i\rightarrow j}=1-s_{i\rightarrow j}\end{array}\right. (9)

where β\beta represents the number of negative events, and α\alpha represents the number of positive events. The uncertainty of the local opinion vector uiju_{i\rightarrow j} depends on the quality of communication between vehicles ii and jj, and the communication quality sijs_{i\rightarrow j} is the probability of successful transmission of packets of data sharing requests during communication. According to ωij\omega_{i\rightarrow j}, the reputation value ij\mathcal{R}_{i\rightarrow j} denotes the expected belief of viv_{i} in providing true relevant data to vjv_{j}, which can be expressed as

ij=rij+γuij\mathcal{R}_{i\rightarrow j}=r_{i\rightarrow j}+\gamma u_{i\rightarrow j} (10)

The constant γ\gamma is assigned by the vehicle and measures how much uncertainty affects the reputation of the vehicle. It is recommended to initially set γ\gamma to 0.5.

2) Combine Local Opinions With Suggested Opinions

Subjective opinions of neighboring vehicles should be taken into account when considering the requesting vehicle. We combine the subjective opinions of different recommenders into a single opinion, named according to the weight of each opinion. These opinions are combined to form the following common opinion ωxjrec:=\omega_{x\rightarrow j}^{\mathrm{rec}}:={rxjrec,dxjrec,uxjrec}\left\{r_{x\rightarrow j}^{\mathrm{rec}},d_{x\rightarrow j}^{\mathrm{rec}},u_{x\rightarrow j}^{\mathrm{rec}}\right\}, as follows,

{rxjrec=1xXδxjxXδxjbxjdxjrec=1xXδxjxXδxjdxjuxjrec=1xXδxjxXδxjuxj\left\{\begin{array}[]{l}r_{x\rightarrow j}^{\mathrm{rec}}=\frac{1}{\sum_{x\in X}\delta_{x\rightarrow j}}\sum_{x\in X}\delta_{x\rightarrow j}b_{x\rightarrow j}\\ d_{x\rightarrow j}^{\mathrm{rec}}=\frac{1}{\sum_{x\in X}\delta_{x\rightarrow j}}\sum_{x\in X}\delta_{x\rightarrow j}d_{x\rightarrow j}\\ u_{x\rightarrow j}^{\mathrm{rec}}=\frac{1}{\sum_{x\in X}\delta_{x\rightarrow j}}\sum_{x\in X}\delta_{x\rightarrow j}u_{x\rightarrow j}\end{array}\right. (11)

where xXx\in X represents the set of neighboring vehicles that interact with vjv_{j}. The data requestor has a local opinion after receiving the shared data from the data provider. In order to avoid spoofing, this local opinion should still be taken into account when forming the final opinion. The final opinion formation for ωxjfinal :={rxjfinal ,dxjfinal ,uxjfinal }\omega_{x\rightarrow j}^{\text{final }}:=\left\{r_{x\rightarrow j}^{\text{final }},d_{x\rightarrow j}^{\text{final }},u_{x\rightarrow j}^{\text{final }}\right\}, where rxjfinalr_{x\rightarrow j}^{\mathrm{final\ }}, dxjfinald_{x\rightarrow j}^{\mathrm{final\ }} and uxjfinalu_{x\rightarrow j}^{\mathrm{final\ }} are calculated as

{rijfinal =rijuxjrec +rxjrec uijuij+uxjrec uxjrec uijdijfinal =dijuxjrec +dxjrec uijuij+uxjrecuxjrec uijuijfinal =uxjrec uijuij+uxjrecuxjrec uij.\left\{\begin{array}[]{l}r_{i\rightarrow j}^{\text{final }}=\frac{r_{i\rightarrow j}u_{x\rightarrow j}^{\text{rec }}+r_{x\rightarrow j}^{\text{rec }}u_{i\rightarrow j}}{u_{i\rightarrow j}+u_{x\rightarrow j}^{\text{rec }}-u_{x\rightarrow j}^{\text{rec }}u_{i\rightarrow j}}\\ d_{i\rightarrow j}^{\text{final }}=\frac{d_{i\rightarrow j}u_{x\rightarrow j}^{\text{rec }}+d_{x\rightarrow j}^{\text{rec }}u_{i\rightarrow j}}{u_{i\rightarrow j}+u_{x\rightarrow j}^{\mathrm{rec}}-u_{x\rightarrow j}^{\text{rec }}u_{i\rightarrow j}}\\ u_{i\rightarrow j}^{\text{final }}=\frac{u_{x\rightarrow j}^{\text{rec }}u_{i\rightarrow j}}{u_{i\rightarrow j}+u_{x\rightarrow j}^{\mathrm{rec}}-u_{x\rightarrow j}^{\text{rec }}u_{i\rightarrow j}}.\end{array}\right. (12)

So the final reputation of viv_{i} to vjv_{j} is

ijfinal =rijfinal +γuijfinal .\mathcal{R}_{i\rightarrow j}^{\text{final }}=r_{i\rightarrow j}^{\text{final }}+\gamma u_{i\rightarrow j}^{\text{final }}. (13)

Reputation values are incorporated into the DAG as training model parameters. The DAG comprises nodes of both data sharing events and training model parameters, which are connected by edge connections established through approval relationships between transactions. These connections facilitate nodes to be connected to each other. Vehicles store DAGs locally and update asynchronously to achieve consistency with other vehicles. Each vehicle disperses its own latest DAG, which includes transactions and approval relationships, to neighboring vehicles. This scheme propagates updated DAGs and maintains loose consistency among vehicles, resulting in lower computational intensity and increased global robustness. The specific process is shown in Fig. 3.

IV-D Consensus: Proof of Reputation(PoR)

By transforming the data sharing problem into a model sharing problem, the privacy of data holders is enhanced. Moreover, the data model of the graph neural network efficiently provides essential information for new sharing requests, as well as better-preserved vehicle trajectory features during data fusion. However, the use of prevailing consensus mechanisms like Proof-of-Work (PoW) in data sharing may lead to high computational and communication costs. To resolve this matter, implementing the FL Authorised Consensus Proof of Reputation (PoR) protocol is suggested. PoR combines vehicle reputation values with the consensus process, enhancing node computational resources. When data sharing requests occur, consensus committee members are chosen by retrieving the relevant blockchain nodes. The committee oversees the consensus process and acquires knowledge of the data model of the requested data. Asynchronous FL seeks to develop a worldwide information model MM, which delivers an effective response MM(Req) to inquiries concerning data sharing, thereby achieving the intended objective.

Sending consensus messages to only the committee nodes can lower communication overhead. However, reducing the number of nodes increases the challenge of reaching agreement. We offer reputation proof for consensus in data sharing to balance security and overhead. We choose committee leaders based on their reputation scores. As each committee node trains a local data model, it is imperative to verify and measure the quality of the model during the consensus process. Prediction accuracy is deemed essential to evaluate the performance of the trained local models. More precisely, we train the model as a regression task each time during trajectory prediction training. The total loss can be calculated as

Loss =1𝒯t=1𝒯YpredtYGTt\displaystyle=\frac{1}{\mathcal{T}}\sum_{t=1}^{\mathcal{T}}\left\|Y_{pred}^{t}-Y_{GT}^{t}\right\| (14)

where 𝒯\mathcal{T} is the future time step, and YpredtY_{pred}^{t} and YGTtY_{GT}^{t} are the predicted position and ground truth at time step tt, respectively.

For each committee node, a trained global model MM and a local model mim_{i} are obtained after asynchronous training. The committee executes the consensus process, during which committee node PiP_{i} sends its trained model mim_{i} to the next committee node while responding to a data sharing request. The transmission is recorded as a model transaction tmit_{m_{i}} along with its corresponding loss (mim_{i}). PiP_{i} has a pair of public and private keys (PKiPK_{i}, SKiSK_{i}) to encrypt and sign the message. PiP_{i} then sends the encrypted message E(SKi(tm),PKi)E\left(\mathrm{SK}_{i}\left(t_{m}\right),\mathrm{PK}_{i}\right) to the other committee nodes. All model transactions are then collected and stored locally as potential blocks by the committee node PjP_{j}. As part of the training procedure, PjP_{j} validates all transactions it receives by computing the loss defined in Eq.14. Lossu(Pj){Loss}^{u}\left(P_{j}\right), the loss of PjP_{j}, is calculated through the following equation:

Lossu(Pj)=γLoss(Mj)+1niLoss(mi)\operatorname{Loss}^{u}\left(P_{j}\right)=\gamma\cdot\operatorname{Loss}\left(M_{j}\right)+\frac{1}{n}\sum_{i}\operatorname{Loss}\left(m_{i}\right) (15)

where γ\gamma represents a weight parameter indicating the contribution of PjP_{j} to the global model and Loss(Mj){Loss}\left(M_{j}\right) represents the loss of the local training model mjm_{j}, determined by the size of the training data of PjP_{j} and other participants γ=1+|dj|/i|di|\gamma=1+\left|d_{j}\right|/\sum_{i}\left|d_{i}\right|.

IV-E Trajectory Prediction

Using the aforementioned approach, we achieve effective interpretable federal learning for the trajectory prediction task. Specifically, by characterizing the vehicle trajectory data as a normalized weighted graph, the important private parameters are preserved. Preventing data redundancy, we achieve the elimination of vehicles with high similarity in the set of neighboring nodes using a multi-party query approach while protecting privacy. We are well aware that the quality of vehicle improvement data directly affects the results of parameter fusion in the federal learning model, so we introduce a reputation mechanism to solve this problem well by using the reputation values calculated from the private track data of the vehicles that are not eliminated and submit them to the reviewer for further grouping. The grouping method will be further described in section V.

Refer to caption
Figure 4: Reputation-driven PPO vehicle clustering algorithm optimizes asynchronous federated learning to complete global model aggregation and improve vehicle local models.

V Enhanced Asynchronous Federated Learning with PPO Clustering Algorithm Based on Vehicle Reputation

In this subsection, we tackle the challenges of insufficient heterogeneous model aggregation and significant global model update delays in FL by incorporating the proposed reputation evaluation mechanism to design an interpretable asynchronous FL mechanism that utilizes the enhanced PPO algorithm.

V-A Graph Asynchronous Federated Learning for Trajectory Prediction

In IoV, the computational power and dynamic communication conditions of each vehicle result in different learning times. As a result, the slowest participant determines the running time of each learning iteration, while the other participants must wait to keep in sync. Existing work on trajectory prediction using FL essentially uses the synchronous federated algorithm FedAvg[48], which improves data security for multi-client model training. However, synchronous FL leads to increased communication costs and longer waiting times for idle nodes. For tasks with spatial timing dependencies, it can cause training difficulties leading to untimely global aggregation. Several studies have investigated asynchronous learning mechanisms to improve the learning performance[39, 49]. However, implementing these mechanisms for trajectory prediction may lead to suboptimal node selection, as their lack of interpretability can introduce biases in vehicle evaluations. Therefore, this paper proposes a method to predict trajectories via asynchronous FL. It utilizes the proposed reputation evaluation mechanism to group nodes with the PPO algorithm, enabling the asynchronous training of trusted vehicle clusters.

With the filtering and reputation value calculations of the previous section, we obtained a set of vehicles with unique features. Local aggregation on each vehicle viv_{i} is performed asynchronously within the range to enhance the quality of the locally trained model. The vehicles preserve and update the DAG locally to achieve asynchronous consistency with the other vehicle nodes. Asynchronous consensus enables vehicles to reach an agreement based on historical states rather than the current state. Vehicle ii sends updates to its local DAGiDAG_{i} and then transmits the updates to nearby vehicles using a gossip scheme to achieve synchronization. Each vehicle randomly scatters its latest DAGiDAG_{i} to neighboring vehicles. The gossip scheme propagates the DAG updates and maintains loose consistency between vehicles. This approach is less computationally intensive and globally robust. While asynchronous FL has improved aggregation efficiency, the issue of vehicle grouping remains unresolved. Limitations arise from exclusively conducting asynchronous local aggregation on nearby local vehicles to obtain a global model, as it fails to adapt to dynamic traffic conditions and thus cannot effectively optimize local prediction models. Therefore, as illustrated in Fig. 4, we employ the PPO algorithm with an innovative reward feedback mechanism driven by reputation evaluation. This mechanism prioritizes the deep aggregation of high-reputation vehicles, leading to a superior global aggregation model.

V-B Reputation-Based PPO Vehicle Clustering Algorithm

We aim to minimize execution time and enhance model accuracy by precisely categorizing the vehicle nodes according to their reputation values. During the global aggregation phase, the disparate computational resources and fluctuating communication conditions among different vehicles hinder the attainment of efficient execution. Therefore, we propose an approach where participating vehicles within a specific timestamp are selected based on reputation values until each grouping contains no more than nn vehicles. This approach prioritizes the aggregation of trajectory graphs with high reputation representing high data quality and improves the global aggregation.

Unlike conventional reinforcement learning, which evaluates the performance of an agent in a specific slot primarily based on accuracy loss alone, we consider the characteristics of the data during node clustering. For this purpose, we introduce the Reputation of Learning (RoL) to describe the high or low reputation value of vehicle ii in the aggregation process of slot tt as follows,

𝒞rt=iVPσit(wt,𝔡i)=iVPjL(yj1t(xj)),\mathcal{C}_{r}^{t}=\sum_{i\in V_{P}}\sigma_{i}^{t}\left(w^{t},\mathfrak{d}_{i}\right)=\sum_{i\in V_{P}}\sum_{j}L\left(y_{j}-\frac{1}{\mathcal{R}^{t}\left(x_{j}\right)}\right), (16)

where wtw^{t} represents the completed combined model in slot tt, and 𝔡i={(xj,yj)}\mathfrak{d}_{i}=\left\{\left(x_{j},y_{j}\right)\right\} represents the training data of vehicle ii. Furthermore, we define the local learning time cost of vehicle ii in slot tt and the communication cost of vehicle ii as follows,

𝒞at(i)=𝔡iβmξi(t),𝒞ut(i)=|wi|τi,\mathcal{C}_{a}^{t}(i)=\frac{\mathfrak{d}_{i}\cdot\beta_{m}}{\xi_{i}(t)},\mathcal{C}_{u}^{t}(i)=\frac{\left|w_{i}\right|}{\tau_{i}}, (17)

where βm\beta_{m} denotes the necessary CPU cycles to train model mm per iteration. Thus, the function of time consumption is

𝒞et=1|VP|i=1|VP|(𝒞at(i)+𝒞ut(i)).\mathcal{C}_{e}^{t}=\frac{1}{\left|V_{P}\right|}\sum_{i=1}^{\left|V_{P}\right|}\left(\mathcal{C}_{a}^{t}(i)+\mathcal{C}_{u}^{t}(i)\right). (18)

In this way, the total cost of FL in time slot tt can be given by the following equation:

𝒞ft(λt)=𝒞rt+𝒞tet,\mathcal{C}_{f}^{t}\left(\lambda^{t}\right)={\mathcal{C}_{r}^{t}}+\mathcal{C}_{te}^{t}, (19)

where λt=[λit]\lambda^{t}=\left[\lambda_{i}^{t}\right] in the time step tt is an indicator vector for vehicle selection, with λit=1\lambda_{i}^{t}=1 indicating activation and λit=0\lambda_{i}^{t}=0 indicating the opposite. We formulate the combinatorial optimization problem using a Markov Decision Process, which we denote as =(S,V,Pv,Cv)\mathcal{M}=\left(S,V,P_{v},C_{v}\right). The task of node selection can be expressed in the following way:

minλt\displaystyle\min_{\lambda^{t}} 𝒞ft(λt)\displaystyle\mathcal{C}_{f}^{t}\left(\lambda^{t}\right) (20a)
s.t. λit{0,1},i,\displaystyle\lambda_{i}^{t}\in\{0,1\},\quad\forall i, (20b)
|piλi=1(t)pc(t)|r02,\displaystyle\left|p_{i\mid\lambda_{i}=1}(t)-p_{c}(t)\right|\leq r_{0}^{2}, (20c)

where the constraint Eq.20c ensures that the distance between the selected participating vehicles and the computed centroid cannot exceed a finite distance r0r_{0}. We use PPO to solve the problem Eq.20a. The fundamental principle involves updating the system policy with a value function.

Algorithm 1 The PPO Based Node Clustering Algorithm.
  
  Input: initial policy parameters θ0\theta_{0}, initial value function parameters ϕ0\phi_{0}
  for k=0,1,2,k=0,1,2,\ldots do
       Collect set of trajectories 𝒟k={τi}\mathcal{D}_{k}=\left\{\tau_{i}\right\} by running policy πk=π(θk)\pi_{k}=\pi\left(\theta_{k}\right) in the environment.
       Compute rewards-to-go R^t\hat{R}_{t}
       Compute advantage estimates A^t\hat{A}_{t}, (using any method of advantage estimation) based on the current value function VϕkV_{\phi_{k}}
       Update the policy by maximizing the PPO objective:
θk+1=argmaxθ1|𝒟k|Tτ𝒟kt=0Tmin\displaystyle\theta_{k+1}=\arg\max_{\theta}\frac{1}{\left|\mathcal{D}_{k}\right|T}\sum_{\tau\in\mathcal{D}_{k}}\sum_{t=0}^{T}\min
(πθ(atst)πθk(atst)Aπθk(st,at),g(ϵ,Aπθk(st,at)))\displaystyle\left(\frac{\pi_{\theta}\left(a_{t}\mid s_{t}\right)}{\pi_{\theta_{k}}\left(a_{t}\mid s_{t}\right)}A^{\pi_{\theta_{k}}}\left(s_{t},a_{t}\right),g\left(\epsilon,A^{\pi_{\theta_{k}}}\left(s_{t},a_{t}\right)\right)\right)
typically via stochastic gradient ascent with Adam.
       Fit value function by regression on mean-squared error:
ϕk+1=argminϕ1|𝒟k|Tτ𝒟kt=0T(Vϕ(st)R^t)2\phi_{k+1}=\arg\min_{\phi}\frac{1}{\left|\mathcal{D}_{k}\right|T}\sum_{\tau\in\mathcal{D}_{k}}\sum_{t=0}^{T}\left(V_{\phi}\left(s_{t}\right)-\hat{R}_{t}\right)^{2}
typically via some gradient descent algorithm.
  end for

We utilize PPO to ascertain the optimal resolution for vehicle reputation categorization in asynchronous FL. PPO operates on a well-defined Markov decision process =(S,V,Pv,Cv)\mathcal{M}=\left(S,V,P_{v},C_{v}\right). At each time slot tt in FL, the system state is represented by st={𝝉(t),𝝃(t),𝜸(t),𝝀(t1)}s_{t}=\{\boldsymbol{\tau}(t),\boldsymbol{\xi}(t),\boldsymbol{\gamma}(t),\boldsymbol{\lambda}(t-1)\}. Here, 𝝉(t)\boldsymbol{\tau}(t) denotes the wireless data rate between vehicles, 𝝃(t)\boldsymbol{\xi}(t) represents the available computing resources of the vehicles, 𝜸(t)\boldsymbol{\gamma}(t) indicates the reputation of the vehicles, and 𝝀(t1)\boldsymbol{\lambda}(t-1) signifies the selection state of the vehicles. The action taken at time slot tt, denoted by λt=(λ1t,λ2t,,λnt)\lambda^{t}=\left(\lambda_{1}^{t},\lambda_{2}^{t},\ldots,\lambda_{n}^{t}\right), corresponds to a vehicle selection decision and can be framed as a 0-1 problem. Specifically, λit=1\lambda_{i}^{t}=1 when vehicle ii is selected as a node with a high reputation value, otherwise λit=0\lambda_{i}^{t}=0. Our improvement is mainly in the reward function. Specifically, we customize the reward function to add 1 to the reward value for choosing a vehicle with a high reputation value, subtract 1 from the reward value for choosing a low reputation value, subtract 10 from the reward value for choosing a low reputation value for 5 consecutive times, and end the round; if the number of vehicles chosen with a high reputation value reaches the threshold, then 20 points are rewarded; and end the round. The system assesses the impact of an action using a reward function called RR. At iteration tt, the agent carrying out the task of selecting the vehicle reputation takes action λt\lambda_{t} while in state sts_{t}. Subsequently, the action is appraised via the established reward function in the ensuing manner:

R(st,λt)=\displaystyle R\left(s_{t},\lambda_{t}\right)=- 1|i=1nλi|i=1n𝒞itλit\displaystyle\frac{1}{\left|\sum_{i=1}^{n}\lambda_{i}\right|}\sum_{i=1}^{n}\mathcal{C}_{i}^{t}\cdot\lambda_{i}^{t} (21)
=1|i=1nλi|\displaystyle=-\frac{1}{\left|\sum_{i=1}^{n}\lambda_{i}\right|} (i=1nλi(𝔡iβmξi(t)+|wi|τi)\displaystyle\left(\sum_{i=1}^{n}\lambda_{i}\left(\frac{\mathfrak{d}_{i}\cdot\beta_{m}}{\xi_{i}(t)}+\frac{\left|w_{i}\right|}{\tau_{i}}\right)\right.
+i=1nλiσit(wt,𝔡i))\displaystyle\left.+\sum_{i=1}^{n}\lambda_{i}\sigma_{i}^{t}\left(w^{t},\mathfrak{d}_{i}\right)\right)

The reward function R(st,λt)R\left(s_{t},\lambda_{t}\right) assesses the standing of taking action λt\lambda_{t} at time interval tt. The overall cumulative reward can be presented as:

𝔼[t=0T1γR(st,λt)]\mathbb{E}\left[\sum_{t=0}^{T-1}\gamma R\left(s_{t},\lambda_{t}\right)\right] (22)

where γ(0,1]\gamma\in(0,1] is the reward discount factor.

For the PPO algorithm, the objective is to determine the value of lambda that maximizes reputation accumulation, as shown in the following Eq.23.

λ=argmax𝔼[t=0T1γR(st,λt)]\lambda=\arg\max\mathbb{E}\left[\sum_{t=0}^{T-1}\gamma R\left(s_{t},\lambda_{t}\right)\right] (23)

Through algorithm 1, the corresponding groups with high and low reputations can be obtained. Next, the vehicle feature parameters of each group are combined, followed by global fusion, with priority given to the high reputation group for deep aggregation.

TABLE I: Dataset profile.
Attributes ApolloScape NGSIM
Frequency of sample 2 Hz (downsampled) 5 Hz
Total number of vehicles 5156 11 779
Total frames 5593 (downsampled) 30 476
Train len/pred len 3 s/3 s 3 s/5 s

VI EXPERIMENTS

In this section, we initially present the renowned datasets used in the experiment, followed by the description of evaluation metrics. Subsequently, we explicate the impact of adjusting diverse model components on the prediction effect and compare the current approach to previous ones. We investigate the impact of various iterations of the model on convergence and the influence of varying quantities of bad nodes on model forecasts. We run our scheme on a desktop running Ubuntu 20.04 with 2.30GHz Intel(R) Xeon(R) E5-2686 v4 CPU, 64GB Memory, and a NVIDIA 3090 Ti Graphics Card.

Refer to caption
Figure 5: The datasets used in the experiments: The vehicle trajectory data in the NGSIM dataset are collected by multiple digital cameras and include different traffic conditions such as light, moderate, and heavy congestion on real highways. Overhead views of the two study areas, US-101 highway [50] and I-80 highway [51], are shown in Fig. (a) and (b), respectively, obtained from Google Maps. The ApolloScape trajectory dataset [52] consists of data collected by a vehicle named ”Apollo acquisition car” during rush hours in urban areas. Our proposed approach is validated in these two different traffic environments.

VI-A Datasets

We evaluated our proposed method RAFLTP on well-known real-world datasets: NGSIM[51, 50], and ApolloScape Trajectory dataset[52], as shown in Fig. 5. The basic info is listed in Table I. NGSIM contains two road segment datasets, US-101 and I-80. Referring to the method[53, 54, 19] for data segmentation of the training set and testing set, a quarter of each of the three road condition data is selected as the test set. Each trajectory is segmented into 8 s, the first 3 s are used as training data, and the last 5 s are used as training labels. The ApolloScape Trajectory dataset was gathered in an urban area during rush hour by a vehicle called the Apollo acquisition car. The data primarily comprises vehicle trajectories that are based on object detection and tracking algorithms. During the initial phase, we adopt GRIP++[45] to select 20%\% of the sequences for validation purposes, while the remaining 80%\% is utilized as the training set.

VI-B Metrics

This subsection highlights several established metrics that demonstrate the validity and merits of the proposed methodology. Specifically, we adopt the Root Mean Square Error (RMSE), Average Displacement Error (ADE), and Final Displacement Error (FDE) to evaluate the performance with reference to Social-GAN[55].

Refer to caption
Figure 6: The influence of different components.

VI-C Ablation study

To demonstrate the advantage of the proposed approach, several subsequent ablation experiments were performed in this subsection.

Refer to caption
Figure 7: Average accumulated episode reward of the PPO algorithm during training on different datasets.
Refer to caption
Figure 8: Average accumulated episode reward of the DQN algorithm during training on different datasets.

VI-C1 The influence of different components

To test the effectiveness of the various components in our framework, we conducted ablation experiments on the ApolloScape Trajectory dataset consisting of five variants: basic encoder–decoder network (GRU based), w/o RL, w/o differential privacy, w/o Asynchronous FL (AFL), priority aggregation of low reputation vehicles (Low-R) and our complete methodology. From Fig. 6, it is evident that the basic encoder-decoder network exhibits the highest error, primarily due to its limited consideration of vehicle interactions. However, with the incorporation of GRIP-based model enhancements under our proposed method, the ADE shows a substantial reduction. Furthermore, we observe that the impact of our method on ADE is most pronounced when the reputation-based PPO module is absent. This underscores the significance of our reputation-based PPO node grouping approach in trajectory prediction. By dynamically aggregating data from high-quality vehicle data providers using learnable weights, we effectively enhance prediction accuracy.

Additionally, the influence of the differential privacy module is apparent, as it enforces constraints to filter out abnormal and redundant data, resulting in more robust and secure model aggregation. It’s noteworthy that the absence of FL leads to lower prediction accuracy compared to the full model. This emphasizes the effectiveness of reputation-based grouping aggregation in alleviating the challenges associated with heterogeneous data fusion and enhancing trajectory prediction accuracy. Moreover, if we choose to prioritize the aggregation of vehicles with low reputation values, it will rather reduce the trajectory prediction accuracy.

VI-C2 The influence of DRL Methods

We compare the learning results of the PPO algorithm and the DQN algorithm in the NGSIM and ApolloScape datasets. All algorithms take the same number of network layers, neurons, and training parameters. Fig. 7 and Fig. 8 demonstrate that the PPO algorithm is more stable and adaptable to changes in both datasets, converging quickly after positive feedback. Additionally, it was found through testing that the training time of the PPO algorithm is 34.5% faster than that of the DQN algorithm.

Refer to caption
Figure 9: The impact of Bad Nodes on ADE w/o Differential Privacy
Refer to caption
Figure 10: Impact of Bad Nodes on ADE: Our Model (Blue Solid Line) vs. w/o Reinforcement Learning (Orange Solid Line) vs. w/o FL Module (Red Solid Line)

VI-C3 The influence of bad nodes

To analyze the impact of bad nodes on different modules within the overall framework, we examined how different components of the proposed solution affect the ADE under different amounts of bad nodes. We randomly selected a certain number of data providers at each iteration and manipulated their data to introduce anomalies. As shown in Fig. 9 and Fig. 10, an increase in the number of bad nodes significantly degrades performance. Interestingly, in Fig. 9, the w/o differential privacy leads to different effects of ADE with different amounts of bad nodes. Surprisingly, a higher number of bad nodes results in a lower ADE. This can be attributed to the reinforcement learning-based grouping of vehicles according to their reputation scores, which directs low-quality data providers to a shallow aggregation group and subsequently improves prediction accuracy.

In Fig. 10, we can clearly observe the importance of the differential privacy module in safeguarding the model from bad nodes. The number of bad nodes has no discernible effect on the ADE of trajectory prediction, confirming the efficiency of the differential privacy module in constraining the data structures shared by the data providers. This effectively limits the impact of anomalous data nodes and redundant nodes on prediction accuracy.

Refer to caption
Figure 11: Effect of Differential Privacy module invocation frequency on ADE.
Refer to caption
Figure 12: Effect of global aggregation frequency on ADE.

VI-C4 Frequency of aggregation

To explore the impact of different local and global aggregation frequencies on prediction accuracy and the influence of invoking the differential privacy module at different frequencies, we designed different combinations of aggregation and invocation frequencies. As depicted in Fig. 11, higher local and global aggregation frequencies lead to faster convergence and improved prediction accuracy. Similarly, Fig. 12 shows that higher invocation frequencies of the differential privacy module also lead to improved prediction accuracy. Taken together, these results underscore the effectiveness of our proposed solution in improving prediction accuracy.

VI-C5 Impact of Private Budget

To explore the impact of differential privacy hyperparameters on prediction accuracy while striking a balance between data utility and privacy, we investigate privacy budget ϵ\epsilon from 0.1 to 1.0 across different datasets. As shown in Fig. 13, in the ApolloScape dataset, ϵ<0.3\epsilon<0.3 significantly affects data utility due to excessive noise, with stability observed from ϵ=\epsilon= 0.3 onwards. However, excessively large values of ϵ\epsilon compromise privacy protection. Therefore, ϵ=\epsilon= 0.3 strikes a good balance between data privacy and utility. In the NGSIM dataset, due to the increase in the number of vehicles, maintaining a balance between privacy budget and utility requires ϵ=0.4\epsilon=0.4.

Refer to caption
Figure 13: Impact of Private Budget ϵ\epsilon on ADE in different datasets.
Refer to caption
Figure 14: Impact of reputation quantization mechanism.

VI-C6 Impact of Reputation Quantization Mechanism

To demonstrate the superiority of our proposed interpretable reputation reward mechanism as a quantitative metric for optimizing federated learning, we conducted ablation experiments on the NGSIM dataset. Specifically, we replaced our AFL algorithm with the traditional synchronous FL (SFL) scheme FedAVG [48] and used RMSE as the trajectory prediction loss for uploading local parameters to the server for vehicle grouping. As depicted in Fig. 14, the traditional SFL scheme yielded inferior prediction results compared to the AFL scheme. In dynamic trajectory prediction scenarios, waiting for inefficient vehicle nodes to complete local model aggregation inevitably leads to suboptimal global model outcomes. Additionally, substituting RMSE for reputation values for reinforcement learning-based vehicle grouping resulted in a reduction in trajectory prediction accuracy. This is because loss functions provide an incomplete assessment of the impact of vehicle nodes on both local and global aspects. In dynamic traffic environments, vehicles continuously influence each other, leading to unavoidable biases in trajectory prediction. Discarding vehicle nodes solely based on significant biases and rewarding vehicles that consistently exhibit smooth and straight trajectories would be unfair. In contrast, our proposed vehicle reputation quantification mechanism focuses on the quality of vehicle data and the similarity of local trajectories. It facilitates deep aggregation of clusters of vehicles with high-quality data and similar trajectory model structure, thereby yielding a global model with enhanced guidance value.

Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Refer to caption
(d)
Refer to caption
(e)
Figure 15: Visualization of predicted trajectories under mild, moderate, and congested traffic scenarios, where the circled vehicles are those that GRIP++ tries to predict, the purple solid line is the observed history, the red solid line is the future ground truth, the blue dashed line is the prediction result of our model (5 seconds), the green dashed line is the GRIP++ prediction (5 seconds). (a) only one vehicle; (b) two vehicles with few interactions; (c) three vehicles with more interactions; (d) five vehicles with some interactions in which a vehicle would conduct lane changing; (e) heavy traffic.

VI-D Comparison analysis

With regard to the latest findings in DGInet[56], we have compared our model with seven baseline methods consisting of state-of-the-art trajectory prediction methods:

  1. 1.

    Encoder–Decoder[8]: This approach employs an enc-dec architecture based on LSTM.

  2. 2.

    CS-LSTM[19]: This approach combines CNN and LSTM to extract spatio-temporal features.

  3. 3.

    TraPHic[57]: This approach employs spatial attention pooling in combination with CNNs and LSTMs to predict the trajectory.

  4. 4.

    Social-GAN[55]: It employs the encoder-decoder architecture as a generator and subsequently trains an additional encoder to serve as a discriminator for trajectory prediction.

  5. 5.

    GRIP[7]: This method uses graph convolution for trajectory prediction. The resulting features from the enc-dec network facilitate trajectory prediction.

  6. 6.

    Spectral[8]: The approach forecasts both paths and actions and utilizes an additional network founded on spectral clustering to adapt the LSTM-based enc-dec network.

  7. 7.

    DGInet[56]: This approach combines a semi-global graph mechanism with a convolutional graph network based on M-products for predicting trajectories.

In Table II, we compare the ADE and FDE of our predicted trajectory with the previous methods. Unfortunately, our solution did not achieve state-of-the-art results. However, compared to the GRIP method, we managed to reduce the ADE by 11.2% and the FDE by 10.2% on the ApolloScape dataset, surpassing even the Spectral result. It’s important to note that our approaches, like GRIP and DGInet, predict trajectories for all vehicles in a traffic scenario, as opposed to Spectral, which predicts only a single vehicle’s trajectory. Fortunately, our approach, which enhances the security and robustness of data sharing among vehicles in a distributed trajectory prediction scenario, aligns more closely with real-world traffic situations and stands out as a unique contribution.

TABLE II: AVERAGE PERFORMANCE COMPARISON.
Method ApolloScape (3s) NGSIM (5s)
ADE FDE ADE FDE
Enc-Dec(LSTM) 2.24 8.25 6.86 10.02
CS-LSTM 2.14 11.69 7.25 10.05
TraPHic 1.28 11.67 5.63 9.91
Social-GAN 3.98 6.75 5.65 10.29
GRIP 1.25 2.34 1.61 3.16
Spectral 1.12 2.05 0.40 1.08
RAFLTP (Ours) 1.11 2.01 0.98 2.04
DGInet 0.99 1.74 0.37 1.01

VI-E Visualization of Prediction Results

In Fig. 15, we use the NGSIM datasets to show several prediction results under different traffic conditions, where the circled vehicles are those that GRIP++ tries to predict, the purple solid line is the observed history, the red solid line is the future ground truth, the blue dashed line is the prediction result of our model (5 seconds), the green dashed line is the GRIP++ prediction (5 seconds). The range from -90 to 90 feet is the observation range. After observing the 3-second historical trajectories, our model predicts the trajectories over the 5-second horizon in the future. As can be seen in Fig. 15, in various scenarios, when feeding the model with identical historical trajectories, our proposed model (blue dashed line) shows a closer match with the actual trajectories represented by the red solid line compared to GRIP++ (green dashed line), especially at the endpoints of the dashed lines. This further substantiates the superior predictive performance of our approach over GRIP++.

VI-F Computation time

The computational efficiency of the algorithm is a critical performance metric for autonomous vehicles. The computation time of our proposed approach is reported in Table III, implemented using PyTorch. We evaluate the prediction time for 1000 vehicles with batch sizes of 128 and 1, respectively. Our trajectory prediction model is an enhancement based on GRIP++. Although our computational time exhibits a delay compared to the GRIP++ model, it remains acceptable compared to other methods. Despite the latency incurred by our approach, it provides data privacy protection and higher prediction accuracy in return. Notably, our proposed PPO method for grouping vehicles operates on the server. The pre-trained PPO grouping model is deployed on the server, requiring only periodic experience replay[58] and asynchronous updates, without impacting the prediction efficiency of the vehicles themselves.

TABLE III: Computation time.
Scheme Predicted # Times (s) batch size 128 Times (s) batch size 1
CS-LSTM 1000 0.29 35.13
GRIP 1000 0.05 6.33
GRIP++ 1000 0.02 1.62
Spectral 1000 1.10 120.20
DGInet 1000 0.07 6.42
RAFLTP (Ours) 1000 0.38 5.278

VII CONCLUSION

This paper presents an innovative framework to address the distributed trajectory prediction problem. Within this framework, we leverage graph neural network tools and propose an asynchronous federated learning-based data sharing approach with an interpretable reputation quantization mechanism. Data providers share data structures under differential privacy constraints to ensure security. We implement PPO to categorize vehicles based on reputation levels, thereby optimizing the efficiency of FL aggregation. Experimental results demonstrate that the proposed data sharing scheme is more tolerant of bad nodes, enhances the security of the distributed trajectory prediction task, and significantly improves prediction accuracy. In future research, we plan to focus on integration with 6G networks and further enhancing efficiency.

References

  • [1] K. Yu, L. Lin, M. Alazab, L. Tan, and B. Gu, “Deep Learning-Based Traffic Safety Solution for a Mixture of Autonomous and Manual Vehicles in a 5G-Enabled Intelligent Transportation System,” IEEE Trans. Intell. Transport. Syst., vol. 22, no. 7, pp. 4337–4347, Jul. 2021.
  • [2] Z. Xiao, J. Shu, H. Jiang, G. Min, H. Chen, and Z. Han, “Perception Task Offloading With Collaborative Computation for Autonomous Driving,” IEEE J. Select. Areas Commun., vol. 41, no. 2, pp. 457–473, Feb. 2023.
  • [3] J. Wang, X. Yuan, Z. Liu, W. Tan, X. Zhang, and Y. Wang, “Adaptive dynamic path planning method for autonomous vehicle under various road friction and speeds,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 10, pp. 10 977–10 987, 2023.
  • [4] Z. Peng, Y. Jiang, and J. Wang, “Event-Triggered Dynamic Surface Control of an Underactuated Autonomous Surface Vehicle for Target Enclosing,” IEEE Trans. Ind. Electron., vol. 68, no. 4, pp. 3402–3412, Apr. 2021.
  • [5] H. Xu, W. Liu, M. Jin, and Y. Tian, “Positioning and contour extraction of autonomous vehicles based on enhanced doa estimation by large-scale arrays,” IEEE Internet of Things Journal, vol. 10, no. 13, pp. 11 792–11 803, 2023.
  • [6] Y. Huang, J. Du, Z. Yang, Z. Zhou, L. Zhang, and H. Chen, “A Survey on Trajectory-Prediction Methods for Autonomous Driving,” IEEE Trans. Intell. Veh., vol. 7, no. 3, pp. 652–674, Sep. 2022.
  • [7] X. Li, X. Ying, and M. C. Chuah, “GRIP: Graph-based Interaction-aware Trajectory Prediction,” in 2019 IEEE Intelligent Transportation Systems Conference (ITSC).   Auckland, New Zealand: IEEE, Oct. 2019, pp. 3960–3966.
  • [8] R. Chandra, T. Guan, S. Panuganti, T. Mittal, U. Bhattacharya, A. Bera, and D. Manocha, “Forecasting trajectory and behavior of road-agents using spectral clustering in graph-lstms,” IEEE Robotics and Automation Letters, vol. 5, no. 3, pp. 4882–4890, 2020.
  • [9] Q. Li, Z. Wen, Z. Wu, S. Hu, N. Wang, Y. Li, X. Liu, and B. He, “A Survey on Federated Learning Systems: Vision, Hype and Reality for Data Privacy and Protection,” IEEE Trans. Knowl. Data Eng., vol. 35, no. 4, pp. 3347–3366, Apr. 2023.
  • [10] Z. Peng, J. Xu, X. Chu, S. Gao, Y. Yao, R. Gu, and Y. Tang, “VFChain: Enabling Verifiable and Auditable Federated Learning via Blockchain Systems,” IEEE Trans. Netw. Sci. Eng., vol. 9, no. 1, pp. 173–186, Jan. 2022.
  • [11] S. Shen, Y. Han, X. Wang, and Y. Wang, “Computation offloading with multiple agents in edge-computing–supported iot,” ACM Trans. Sen. Netw., vol. 16, no. 1, dec 2019. [Online]. Available: https://doi.org/10.1145/3372025
  • [12] X. Wang, R. Li, C. Wang, X. Li, T. Taleb, and V. C. M. Leung, “Attention-weighted federated deep reinforcement learning for device-to-device assisted heterogeneous collaborative edge caching,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 1, pp. 154–169, 2021.
  • [13] P. Zhang, C. Wang, C. Jiang, and Z. Han, “Deep reinforcement learning assisted federated learning algorithm for data management of iiot,” IEEE Transactions on Industrial Informatics, vol. 17, no. 12, pp. 8475–8484, 2021.
  • [14] M. Zhou, Y. Yu, and X. Qu, “Development of an efficient driving strategy for connected and automated vehicles at signalized intersections: A reinforcement learning approach,” IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 1, pp. 433–443, 2020.
  • [15] T. M. Ho, K.-K. Nguyen, and M. Cheriet, “Federated deep reinforcement learning for task scheduling in heterogeneous autonomous robotic system,” IEEE Transactions on Automation Science and Engineering, vol. 21, no. 1, pp. 528–540, 2024.
  • [16] J. Schulman, F. Wolski, P. Dhariwal, A. Radford, and O. Klimov, “Proximal policy optimization algorithms,” 2017.
  • [17] D. Yuan, X. Chang, P.-Y. Huang, Q. Liu, and Z. He, “Self-supervised deep correlation tracking,” IEEE Transactions on Image Processing, vol. 30, pp. 976–985, 2021.
  • [18] Y. Wang, W. Yang, D. Li, and J. Q. Zhang, “An rfs time-frequency model for decomposing chirp modes with dynamic cross, appearance, and disappearance,” IEEE Transactions on Aerospace and Electronic Systems, vol. 59, no. 4, pp. 4525–4539, 2023.
  • [19] N. Deo and M. M. Trivedi, “Convolutional social pooling for vehicle trajectory prediction,” in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2018, pp. 1549–15 498.
  • [20] A. Mohamed, K. Qian, M. Elhoseiny, and C. Claudel, “Social-stgcnn: A social spatio-temporal graph convolutional neural network for human trajectory prediction,” in 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2020, pp. 14 412–14 420.
  • [21] A. Monti, A. Bertugli, S. Calderara, and R. Cucchiara, “Dag-net: Double attentive graph neural network for trajectory forecasting,” 2020.
  • [22] Y. Ma, X. Zhu, S. Zhang, R. Yang, W. Wang, and D. Manocha, “Trafficpredict: Trajectory prediction for heterogeneous traffic-agents,” 2019.
  • [23] F.-C. Chou, T.-H. Lin, H. Cui, V. Radosavljevic, T. Nguyen, T.-K. Huang, M. Niedoba, J. Schneider, and N. Djuric, “Predicting motion of vulnerable road users using high-definition maps and efficient convnets,” 2020.
  • [24] Z. Lv, J. Lloret, and H. Song, “Guest editorial software defined internet of vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 6, pp. 3504–3510, 2021.
  • [25] J. Contreras-Castillo, S. Zeadally, and J. A. Guerrero-Ibañez, “Internet of vehicles: Architecture, protocols, and security,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3701–3709, 2018.
  • [26] Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. M. Leung, “Blockchain-based decentralized trust management in vehicular networks,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1495–1505, 2019.
  • [27] E. M. Ghourab, M. Azab, and N. Ezzeldin, “Blockchain-guided dynamic best-relay selection for trustworthy vehicular communication,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 8, pp. 13 678–13 693, 2022.
  • [28] M. K. Jabbar and H. Trabelsi, “A novelty of hypergraph clustering model (hgcm) for urban scenario in vanet,” IEEE Access, vol. 10, pp. 66 672–66 693, 2022.
  • [29] C. Lai, K. Zhang, N. Cheng, H. Li, and X. Shen, “Sirc: A secure incentive scheme for reliable cooperative downloading in highway vanets,” IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 6, pp. 1559–1574, 2017.
  • [30] X. Huang, R. Yu, J. Kang, and Y. Zhang, “Distributed reputation management for secure and efficient vehicular edge computing and networks,” IEEE Access, vol. 5, pp. 25 408–25 420, 2017.
  • [31] J. Oluoch, “A distributed reputation scheme for situation awareness in vehicular ad hoc networks (vanets),” in 2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 2016, pp. 63–67.
  • [32] J. Ni, A. Zhang, X. Lin, and X. S. Shen, “Security, privacy, and fairness in fog-based vehicular crowdsensing,” IEEE Communications Magazine, vol. 55, no. 6, pp. 146–152, 2017.
  • [33] M. Raya, P. Papadimitratos, V. D. Gligor, and J.-P. Hubaux, “On data-centric trust establishment in ephemeral ad hoc networks,” in IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, 2008, pp. 1238–1246.
  • [34] Z. Li and C. T. Chigan, “On joint privacy and reputation assurance for vehicular ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 10, pp. 2334–2344, 2014.
  • [35] M. B. Mollah, J. Zhao, D. Niyato, Y. L. Guan, C. Yuen, S. Sun, K.-Y. Lam, and L. H. Koh, “Blockchain for the internet of vehicles towards intelligent transportation systems: A survey,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4157–4185, 2021.
  • [36] J. Konečný, H. B. McMahan, F. X. Yu, P. Richtárik, A. T. Suresh, and D. Bacon, “Federated learning: Strategies for improving communication efficiency,” 2017.
  • [37] S. Samarakoon, M. Bennis, W. Saad, and M. Debbah, “Federated learning for ultra-reliable low-latency v2v communications,” in 2018 IEEE Global Communications Conference (GLOBECOM), 2018, pp. 1–7.
  • [38] M. Han, K. Xu, S. Ma, A. Li, and H. Jiang, “Federated learning-based trajectory prediction model with privacy preserving for intelligent vehicle,” Int J of Intelligent Sys, vol. 37, no. 12, pp. 10 861–10 879, Dec. 2022.
  • [39] H. R. Feyzmahdavian, A. Aytekin, and M. Johansson, “An asynchronous mini-batch algorithm for regularized stochastic optimization,” IEEE Transactions on Automatic Control, vol. 61, no. 12, pp. 3740–3754, 2016.
  • [40] L. T. Phong, Y. Aono, T. Hayashi, L. Wang, and S. Moriai, “Privacy-preserving deep learning via additively homomorphic encryption,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1333–1345, 2018.
  • [41] C. Dwork, “Differential privacy,” in Proceedings of the 33rd International Conference on Automata, Languages and Programming - Volume Part II, ser. ICALP’06.   Berlin, Heidelberg: Springer-Verlag, 2006, p. 1–12. [Online]. Available: https://doi.org/10.1007/11787006_1
  • [42] L. T. Phong, Y. Aono, T. Hayashi, L. Wang, and S. Moriai, “Privacy-preserving deep learning via additively homomorphic encryption,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1333–1345, 2018.
  • [43] A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, “L-diversity: privacy beyond k-anonymity,” in 22nd International Conference on Data Engineering (ICDE’06), 2006, pp. 24–24.
  • [44] T. Zhu, G. Li, W. Zhou, and P. S. Yu, “Differentially private data publishing and analysis: A survey,” IEEE Transactions on Knowledge and Data Engineering, vol. 29, no. 8, pp. 1619–1638, 2017.
  • [45] X. Li, X. Ying, and M. C. Chuah, “Grip++: Enhanced graph-based interaction-aware trajectory prediction for autonomous driving,” 2020.
  • [46] P. Maymounkov and D. Mazières, “Kademlia: A Peer-to-Peer Information System Based on the XOR Metric,” in Peer-to-Peer Systems, G. Goos, J. Hartmanis, J. Van Leeuwen, P. Druschel, F. Kaashoek, and A. Rowstron, Eds.   Berlin, Heidelberg: Springer Berlin Heidelberg, 2002, vol. 2429, pp. 53–65.
  • [47] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in 2016 IEEE Symposium on Security and Privacy (SP), 2016, pp. 839–858.
  • [48] H. B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in International Conference on Artificial Intelligence and Statistics, 2016. [Online]. Available: https://api.semanticscholar.org/CorpusID:14955348
  • [49] S. Ko, K. Lee, H. Cho, Y. Hwang, and H. Jang, “Asynchronous federated learning with directed acyclic graph-based blockchain in edge computing: Overview, design, and challenges,” Expert Systems with Applications, vol. 223, p. 119896, 2023.
  • [50] J. Halkias and J. Colyar, “Us highway 101 dataset,” Federal Highway Administration (FHWA), Tech. Rep. FHWA-HRT-07-030, 2007.
  • [51] ——, “Us highway 80 dataset,” Federal Highway Administration (FHWA), Tech. Rep. FHWA-HRT-07-030, 2007.
  • [52] X. Huang, P. Wang, X. Cheng, D. Zhou, Q. Geng, and R. Yang, “The apolloscape open dataset for autonomous driving and its application,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 42, no. 10, pp. 2702–2719, 2020.
  • [53] N. Deo, A. Rangesh, and M. M. Trivedi, “How Would Surround Vehicles Move? A Unified Framework for Maneuver Classification and Motion Prediction,” IEEE Trans. Intell. Veh., vol. 3, no. 2, pp. 129–140, Jun. 2018.
  • [54] N. Deo and M. M. Trivedi, “Multi-Modal Trajectory Prediction of Surrounding Vehicles with Maneuver based LSTMs,” in 2018 IEEE Intelligent Vehicles Symposium (IV).   Changshu: IEEE, Jun. 2018, pp. 1179–1184.
  • [55] A. Gupta, J. Johnson, L. Fei-Fei, S. Savarese, and A. Alahi, “Social gan: Socially acceptable trajectories with generative adversarial networks,” in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2018, pp. 2255–2264.
  • [56] J. An, W. Liu, Q. Liu, L. Guo, P. Ren, and T. Li, “DGInet: Dynamic graph and interaction-aware convolutional network for vehicle trajectory prediction,” Neural Networks, vol. 151, pp. 336–348, Jul. 2022.
  • [57] R. Chandra, U. Bhattacharya, A. Bera, and D. Manocha, “Traphic: Trajectory prediction in dense and heterogeneous traffic using weighted interactions,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2019.
  • [58] X. Liang, Y. Ma, Y. Feng, and Z. Liu, “Ptr-ppo: Proximal policy optimization with prioritized trajectory replay,” 2021.