This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

\setcopyright

ifaamas \acmConference[AAMAS ’24]Proc. of the 23rd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2024)May 6 – 10, 2024 Auckland, New ZealandN. Alechina, V. Dignum, M. Dastani, J.S. Sichman (eds.) \copyrightyear2024 \acmYear2024 \acmDOI \acmPrice \acmSubmissionID33 \affiliation \institutionThe University of Tokyo \cityTokyo \countryJapan \affiliation \institutionThe University of Tokyo \cityTokyo \countryJapan

On the Transit Obfuscation Problem

Abstract.

Concealing an intermediate point on a route or visible from a route is an important goal in some transportation and surveillance scenarios. This paper studies the Transit Obfuscation Problem, the problem of traveling from some start location to an end location while ”covering” a specific transit point that needs to be concealed from adversaries. We propose the notion of transit anonymity, a quantitative guarantee of the anonymity of a specific transit point, even with a powerful adversary with full knowledge of the path planning algorithm. We propose and evaluate planning/search algorithms that satisfy this anonymity criterion.

Key words and phrases:
obfuscation, deceptive planning, planning

1. Introduction

In applications such as sensitive cargo transportation or surveillance, it is sometimes necessary to route an agent from a start point to a goal while concealing the location of a transit point, which is either on the route or visible from the route, from adversaries. For example, in a cargo transport application, if a depot or drop location is located somewhere on the route, it is essential to prevent potential adversaries from deducing the transit point location to minimize the risk of theft or interception. In a surveillance application, it is important to be able to conceal which specific location a surveillance agent is targeting on its route.

Obfuscating an agent’s true intention has been previously studied in various fields, including path planning, robotics, and game theory Chakraborti et al. (2019). Previous work has primarily focused on the Goal Obfuscation Problem, which aims to prevent observers from deducing the agent’s actual goal, and has numerous applications, e.g., creating realistic non-player characters (NPCs) capable of deceiving humans Dias et al. (2013), or ensuring secure escorting of a VIP to a hidden location Keren et al. (2016).

Concealing non-goal locations is also important for customer privacy protection in real-world situations. For example, Enayati et al. (2022) considers a scenario where an UAV delivers packages to a private location and returns to the starting point. Chen et al. (2012) notes that some public transportation systems track the stations where each customer boards and leaves, and those systems potentially reveal the location of homes or workplaces, which are the transit points on the round-trip paths. However, Enayati et al. (2022) is limited to path planning in two-dimensional coordinates with the constraint that the start and goal locations are the same, and Chen et al. (2012) focuses on not path planning but anonymizing the collected sequential data.

In this paper, we study the Transit Obfuscation Problem, where given a graph, start location, end location, a target transit point, and a visibility function for an agent, the task is to generate a route from the start to the end location such that the agent’s visibility function covers the target, but the target location is concealed from adversaries. We assume a strong adversary that has full knowledge of the agent’s path, as well as full knowledge of the domain as well the internal decision-making process of the agent (i.e., the adversary has full access to the agent’s code).

We introduce the notion of (k,,m)(k,\ell,m)-Anonymity, which quantifies the level of concealment achieved by a path planner. If a path planner satisfies (k,,m)(k,\ell,m)-Anonymity, there exist at least kk transit points resulting in the same path up to the first mm steps, while the deviation among these candidate points is \geq\ell. Thus, (k,,)(k,\ell,\infty)-Anonymity is a guarantee that even with full knowledge of the agent’s path and code, an adversary can not distinguish the true target transit point among kk possible candidates which are at least \ell apart from each other. We analyze some theoretical properties of (k,,m)(k,\ell,m)-Anonymity and propose a graph partitioning-based approach to generating paths that guarantee (k,,m)(k,\ell,m)-Anonymity.

The rest of the paper is structured as follows. First, we define the Transit Obfuscation Problem (TOP) with respect to a path-planning problem with a transit point and visibility constraints (Section 2) Next, in Section 3, we define (k,,m)k,\ell,m)-Anonymity for the TOP and analyze its theoretical properties. We also define some metrics for evaluating the tradeoffs between privacy and path costs for the TOP. Then, in Section 4, we propose a partitioning-based search algorithm for the TOP which guarantees anonymity even when when the adversary knows the complete path, i.e., (k,,)(k,\ell,\infty)-Anonymity. Section 5 proposes algorithms which guarantees anonymity for up to m<m<\infty steps. In Section 6, we experimentally evaluate our search algorithms on some standard benchmark game map instances. Section 7 discusses related work. Section 8 concludes with a discussion and directions for future work. Our code is available at: https://github.com/Koukyosyumei/TOP.

2. Transit Obfuscation Problem

A path-planning domain with visibility constraints is denoted by a triple 𝒟=𝒩,,𝒯,c,v\mathcal{D}=\langle\mathcal{N},\mathcal{E},\mathscr{T},c,v\rangle, where

  • 𝒩\mathcal{N} is a non-empty set of nodes;

  • 𝒯𝒩\mathscr{T}\subseteq\mathcal{N} is a set of transit candidates;

  • 𝒩×𝒩\mathcal{E}\subseteq\mathcal{N}\times\mathcal{N} is a set of edges between nodes;

  • c:R0+c:\mathcal{E}\rightarrow R^{+}_{0} is a function that returns the non-negative cost of an edge between two nodes.

  • v:𝒩2𝒩v:\mathcal{N}\rightarrow 2^{\mathcal{N}} is a visibility function that returns the set of visible nodes from a given node.

The cost of the shortest path (a.k.a minimum cost path) between node a𝒩a\in\mathcal{N} and node b𝒩b\in\mathcal{N} is denoted by d(a,b)d(a,b). For simplicity, we assume that EE does not contain self-loop edges, i.e., d(a,b)=d(a,b)=\infty if a=ba=b. A path π\pi in a path-planning domain 𝒟\mathcal{D} is a sequence of nodes π=n1,n2,,n|π|\pi=n_{1},n_{2},...,n_{|\pi|} such that i{1,,|π|1}(ni,ni+1)\forall{i\in\{1,...,|\pi|-1\}}\hskip 5.0pt(n_{i},n_{i+1})\in\mathcal{E}, where |π||\pi| represents the length of π\pi. We also denote the subsequence of π\pi till mm-th node as π|m\pi|_{m}, i.e., π|m=n1,n2,,nm\pi|_{m}=n_{1},n_{2},...,n_{m}. For convenience, we assume that π|m=π\pi|_{m}=\pi if m>|π|m>|\pi|. The binary operator \circ represents the concatenation of two paths. Specifically, when πa=a1,a2,,a|πa|\pi_{a}=a_{1},a_{2},...,a_{|\pi_{a}|}, πb=b1,b2,,b|πb|\pi_{b}=b_{1},b_{2},...,b_{|\pi_{b}|}, and a|πa|=b1a_{|\pi_{a}|}=b_{1}, we have that π=πaπb=a1,a2,,a|πa|,b2,,b|πb|\pi=\pi_{a}\circ\pi_{b}=a_{1},a_{2},...,a_{|\pi_{a}|},b_{2},...,b_{|\pi_{b}|}. We also introduce \scalerel\operatorname*{\scalerel*{\|}{\sum}} notation, where \scalereli=1xπi=π1π2πx\operatorname*{\scalerel*{\|}{\sum}}^{x}_{i=1}\pi_{i}=\pi_{1}\circ\pi_{2}\circ...\circ\pi_{x}. The cost of π\pi is the sum of the costs of each edge in π\pi, given by cost(π)=i=2|π|c(πi1,πi)cost(\pi)=\sum^{|\pi|}_{i=2}c(\pi_{i-1},\pi_{i}), where πi\pi_{i} is the ii-th node in π\pi. We say that π\pi covers node n𝒩n\in\mathcal{N} if there exists an index ii such that nv(πi)n\in v(\pi_{i}).

A path-planning problem with visibility constraints and a transit point (PPVT) is represented by a tuple 𝒟,s,g,t\langle\mathcal{D},s,g,t\rangle, where 𝒟=𝒩,𝒯,,c,v\mathcal{D}=\langle\mathcal{N},\mathscr{T},\mathcal{E},c,v\rangle is a domain, s𝒩s\in\mathcal{N} is the start node, g𝒩g\in\mathcal{N} is the goal node, t𝒯t\in\mathscr{T} is the transit point that must be covered. The solution to a PPVT is a path π\pi such that π1=s\pi_{1}=s, π|π|=g\pi_{|\pi|}=g, and i{1,2,,|π|},tv(πi)\exists{i\in\{1,2,...,|\pi|\},\hskip 5.0ptt\in v(\pi_{i})}.

A path planner 𝒜\mathcal{A} takes as input a PPVT and returns a feasible path π\pi for that problem, i.e., 𝒜(𝒟,s,g,t)=π\mathcal{A}(\langle\mathcal{D},s,g,t\rangle)=\pi. 𝒜\mathcal{A} returns Failure when it cannot find a feasible path. For convenience, we define Failure such that it is not equal to itself, i.e., Failure \neq Failure.

We assume that there is an adversary who seeks to deduce the actual transit point t𝒯t\in\mathscr{T} by observing the trajectory of the agent.

A Transit Obfuscation Problem (TOP) is a tuple 𝒟,s,g,𝒪\langle\mathcal{D},s,g,\mathscr{O}\rangle, where 𝒪\mathscr{O} describes what the adversary can observe.

We make the following assumptions about the abilities of the adversarial observer (similar to the set of assumptions by  Kulkarni et al. (2018)):

  • Complete Knowledge about the Domain and Transit Candidates: The adversary has complete knowledge about the domain 𝒟\mathcal{D}.

  • Full Access to the Planner: The adversary has full access to and thoroughly understands the agent’s planning algorithm.

  • Independence of Inputs: The adversary can execute the agent’s planner with arbitrary input tuples at any time.

  • Observability of Path: The adversary can immediately observe the path executed by the agent so far.

  • Semi-Honest Adversary: The adversary is passive, and it does not disturb the action of the agent or gain any additional information beyond what has been specified above.

These are challenging assumptions when trying to conceal the transit point, as the adversary has full information about the mechanism of the path planning algorithm, as well as the ability to rerun/simulate the algorithm many times in order to gain information that might reveal the transit point. When t=gt=g, and vv is the identity function (the only node visible from a node is itself), this special case of the TOP is similar to the Goal Obfuscation Problem Kulkarni et al. (2018, 2019). Unlike the Goal Obfuscation Problem, where the final node of the path always reveals the actual goal, in the TOP, when tgt\neq g, it is possible to have a path where an adversary cannot deduce the actual transit point even after observing the entire trajectory. For example, in Fig. 1, an agent travels from ss to gg while covering one of 𝒯={t1,t2,t3,t4}\mathscr{T}=\{t_{1},t_{2},t_{3},t_{4}\}, where black cells are obstacles. Then, if the agent can see nodes within a radius of one, any feasible path covers all of 𝒯\mathscr{T} so that an observer cannot infer the true transit point.

Refer to caption
Figure 1. Let nodes within a radius of one be visible. Then, it is not possible for an observer to determine which of t1,t2,t3,t4{t_{1},t_{2},t_{3},t_{4}} is the true transit point.

3. (k,,m)(k,\ell,m)-Anonymity

Next, we formally define the conditions when a path is anonymized for a transit point, what inputs are anonymizable, and what planners can achieve anonymization.

3.1. Definitions of (k,,m)(k,\ell,m)-Anonymity

In order for a transit point tt to remain private up to the first mm steps, even if the adversary has the capabilities enumerated above, it must not be possible to uniquely identify tt by executing the planner (possibly many times) and observing the output(s) as well as the internal state of the planner.

This is possible if the route output by a planner is indistinguishable for multiple transit candidate points, including the actual transit point tt. For example, if the set of transit candidates 𝒯={t1,t2}\mathscr{T}=\{t_{1},t_{2}\}, and 𝒜(𝒟,s,g,t1)=𝒜(𝒟,s,g,t2)=π1,2\mathcal{A}(\langle\mathcal{D},s,g,t_{1}\rangle)=\mathcal{A}(\langle\mathcal{D},s,g,t_{2}\rangle)=\pi_{1,2}, it is indeterminate which of t1t_{1} or t2t_{2} is the true transit point tt.

In addition, it is often desirable for the transit candidates to be spread out. For example, if all the transit candidates are close to each other, the adversary may be able to cost-effectively block access to all transit candidates (preventing the agent from covering the transit point). Therefore, it is desirable to be able to disperse the indistinguishable transit candidates in the search space.

Based on this idea, we first define (k,,m)(k,\ell,m)-Anonymized Paths.

Definition 0 ((k,,m)(k,\ell,m)-Anonymized Path).

Let k>0k\in\mathbb{Z}_{>0}, 0\ell\in\mathbb{R}_{\geq 0} and m>0m\in\mathbb{Z}_{>0}. We say that 𝒜(𝒟,s,g,t)\mathcal{A}(\langle\mathcal{D},s,g,t\rangle), a path planned by 𝒜\mathcal{A} from ss to gg covering tt, where sts\neq t and gtg\neq t, is a (k,,m)(k,\ell,m)-Anonymized Path with respect to tt if there exists a set T{t|t𝒯 and 𝒜(𝒟,s,g,t)|m=𝒜(𝒟,s,g,t)|m}T\subseteq\{t^{\prime}|t^{\prime}\in\mathscr{T}\text{ and }\mathcal{A}(\langle\mathcal{D},s,g,t\rangle)|_{m}=\mathcal{A}(\langle\mathcal{D},s,g,t^{\prime}\rangle)|_{m}\} satisfying |T|k|T|\geq k and min(i,j)T×Td(i,j)\min_{(i,j)\in T\times T}d(i,j)\geq\ell.

In other words, a path is (k,,m)(k,\ell,m)-Anonymized when there are at least kk transit candidates that result in the same path up to the first mm nodes from ss to gg covering tt, and the distance between any pair of nodes within that set is equal to or greater than \ell. When m=m=\infty, the adversary cannot determine which of those transit candidates is the true tt even after observing the entire path.

Second, we define a (k,,m)(k,\ell,m)-Anonymizable Tuple.

Definition 0 ((k,,m)(k,\ell,m)-Anonymizable Tuple).

Let k>0k\in\mathbb{Z}_{>0} and 0\ell\in\mathbb{R}_{\geq 0}. Given a domain 𝒟\mathcal{D}, we say that the tuple 𝒟,s,g,t\langle\mathcal{D},s,g,t\rangle, where s𝒩s\in\mathcal{N}, g𝒩g\in\mathcal{N}, t𝒯t\in\mathscr{T}, sts\neq t, and gtg\neq t, is a (k,,m)(k,\ell,m)-Anonymizable Tuple if there exists a path planner 𝒜\mathcal{A} such that there exists a set T{t|t𝒯 and 𝒜(𝒟,s,g,t)|m=𝒜(𝒟,s,g,t)|m}T\subseteq\{t^{\prime}|t^{\prime}\in\mathscr{T}\text{ and }\mathcal{A}(\langle\mathcal{D},s,g,t\rangle)|_{m}=\mathcal{A}(\langle\mathcal{D},s,g,t^{\prime}\rangle)|_{m}\} satisfying |T|k|T|\geq k and min(i,j)T×Td(i,j)\min_{(i,j)\in T\times T}d(i,j)\geq\ell.

The input tuple is (k,,m)(k,\ell,m)-Anonymizable when at least one planner can output a (k,,m)(k,\ell,m)-Anonymized Path for this input. Since kk is a positive integer, a tuple 𝒟,s,g,t\langle\mathcal{D},s,g,t\rangle is not (k,,m)(k,\ell,m)-Anonymizable Tuple for any kk if there exists no path from ss to gg covering tt.

Based on the above definitions, we define (k,,m)(k,\ell,m)-Anonymity of a path planner 𝒜\mathcal{A} as follows.

Definition 0 ((k,,m)(k,\ell,m)-Anonymity).

A path planner 𝒜\mathcal{A} satisfies (k,,m)(k,\ell,m)-Anonymity for a domain 𝒟\mathcal{D} if 𝒜\mathcal{A} returns a (k,,m)(k,\ell,m)-Anonymized Path for all (k,,m)(k,\ell,m)-Anonymizable Tuples in 𝒟\mathcal{D}.

A path planner with (k,,m)(k,\ell,m)-Anonymity is guaranteed to return anonymized paths for all anonymizable tuples in 𝒟\mathcal{D}.

We also consider the anonymity of the planner for fixed source and goal locations and define (k,,m,δ)(k,\ell,m,\delta)-Local Anonymity as follows:

Definition 0 ((k,,m,δ)(k,\ell,m,\delta)-Local Anonymity).

Let xx be the number of (k,,m)(k,\ell,m)-Anonymizable Tuples in the domain 𝒟\mathcal{D} with a fixed source ss and goal gg. We say that 𝒜\mathcal{A} satisfies (k,,m,δ)(k,\ell,m,\delta)-Local Anonymity for 𝒟,s,g\langle\mathcal{D},s,g\rangle if 𝒜\mathcal{A} returns (k,,m)(k,\ell,m)-Anonymized Paths for δx\delta x or more (k,,m)(k,\ell,m)-Anonymizable Tuples in 𝒟\mathcal{D} with ss and gg.

A planner 𝒜\mathcal{A} satisfying (k,,m)(k,\ell,m)-Anonymity in 𝒟\mathcal{D} satisfies (k,,m,1)(k,\ell,m,1)-Local Anonymity for any combination of a start ss and a goal gg.

3.2. Properties of (k,,m)(k,\ell,m)-Anonymity

We have identified several important properties about (k,,m)(k,\ell,m) - Anonymity: equivalence conditions for (k,,m)(k,\ell,m) - Anonymizable Tuples and Anonymized Paths, path-extensibility, and existence guarantee of a planner achieving (k,,m)(k,\ell,m)-Anonymity. All omitted proofs, as well as some additional properties can be found in Supp. LABEL:supp:proof:sec3 Takahashi and Fukunaga (2024).

First, the following proposition indicates the necessary and sufficient conditions for a path to be a (k,,)(k,\ell,\infty)-Anonymized Path.

Proposition 0 (3C Condition for Output Path).

A path π\pi = 𝒜(𝒟,s,g,t)\mathcal{A}(\langle\mathcal{D},s,g,t\rangle) is (k,,)(k,\ell,\infty)-Anonymized Path iff there exists a set of nodes T𝒯T\subseteq\mathscr{T} satisfying all of the following:

  1. (1)

    Cardinality: |T|k|T|\geq k

  2. (2)

    Cost: min(i,j)T×Td(i,j)\min_{(i,j)\in T\times T}d(i,j)\geq\ell

  3. (3)

    Coverage: π\pi covers all nodes in TT, and 𝒜\mathcal{A} returns π\pi whenever the transit point belongs to TT.

The similar necessary and sufficient conditions for an input tuple to be (k,,)(k,\ell,\infty)-Anonymizable are in Supp. LABEL:supp:additional-properties Takahashi and Fukunaga (2024).

Next, the coverage condition of Prop. 5 leads to the computational complexity of planning a (k,,)(k,\ell,\infty)-Anonymized Path.

Theorem 6 ( Complexity).

Finding a (k,,m)(k,\ell,m)-Anonymized Path for the given tuple is NP-Hard.

Proof of Theorem 6.

Finding a path that covers all nodes in the given set of nodes is a generalization of WRP, which is NP-Hard Seiref et al. (2020) (see Sec. 4.3) ∎

If the domain consists of an undirected graph, we can ensure the existence of a path planner that satisfies (k,,m)(k,\ell,m)-Anonymity.

Theorem 7 (Existence of a Satisfying Path Planner).

If every edge in the domain 𝒟\mathcal{D} is undirected, meaning that (i,j)𝒩×𝒩,(i,j)(j,i)\forall(i,j)\in\mathcal{N}\times\mathcal{N},\hskip 5.0pt(i,j)\in\mathcal{E}\Rightarrow(j,i)\in\mathcal{E}, there exists a path planner 𝒜\mathcal{A} that satisfies (k,,m)(k,\ell,m)-Anonymity for any given kk, \ell and mm.

To prove this, we use the Lemma below which states that extending a (k,,m)(k,\ell,m)-Anonymized Path preserves the same level of anonymity.

Lemma 0 (Path-Extension).

Let π=A(𝒟,s,g,t)\pi=A(\langle\mathcal{D},s,g,t\rangle) be a (k,,m)(k,\ell,m)-Anonymized Path with respect to tt, πss\pi_{s^{\prime}\to s} be a path, constructed independently of tt, from ss^{\prime} to ss, and πgg\pi_{g\to g^{\prime}} be an arbitrary path from gg to gg^{\prime}. Then, πssππgg\pi_{s^{\prime}\to s}\circ\pi\circ\pi_{g\to g^{\prime}} is also a (k,,m)(k,\ell,m)-Anonymized Path with respect to tt.

Proof of Theorem 7.

Let T^s,g={tt𝒯,D,s,g,t\hat{T}_{s,g}=\{t\mid t\in\mathscr{T},\langle D,s,g,t\rangle is (k,,m)(k,\ell,m) -Anonymizable Tuple}={t1,t2,,tx}\}=\{t_{1},t_{2},...,t_{x}\}, and π^sgti\hat{\pi}^{t_{i}}_{s\to g} be the (k,,m)(k,\ell,m)-Anonymized Path for D,s,g,ti\langle D,s,g,t_{i}\rangle. If |T^s,g|1|\hat{T}_{s,g}|\geq 1 and all edges in 𝒟\mathcal{D} are undirected, there exists πgs\pi_{g\to s}, a path from gg to ss. By Lemma 8, we have that π^sg=(\scalereli=1x1π^sgtiπgs)π^sgtx\hat{\pi}_{s\to g}=(\operatorname*{\scalerel*{\|}{\sum}}^{x-1}_{i=1}\hat{\pi}^{t_{i}}_{s\to g}\circ\pi_{g\to s})\circ\hat{\pi}^{t_{x}}_{s\to g} is a (k,,m)(k,\ell,m)-Anonymized Path with respect to all transit nodes in T^s,g\hat{T}_{s,g}.

Now, consider a path planner 𝒜\mathcal{A} such that 𝒜(D,s,g,t)=π^sg\mathcal{A}(\langle D,s,g,t\rangle)=\hat{\pi}_{s\to g} if |T^s,g|1|\hat{T}_{s,g}|\geq 1 and 𝒜(D,s,g,t)=\mathcal{A}(\langle D,s,g,t\rangle)= Failure otherwise. It is evident that 𝒜\mathcal{A} satisfies (k,,m)(k,\ell,m)-Anonymity: ∎

Although Theorem. 7 guarantees that there exists a path planner with (k,,m)(k,\ell,m)-Anonymity for any undirected graph, such a guarantee is not possible when the edges are directed. A counterexample is shown in the left-side of Fig. 2, where there are two possible paths from ss to gg; πa=(s,t1,t2,t3,g)\pi_{a}=(s,t_{1},t_{2},t_{3},g) or πb=(s,t1,t4,t5,g)\pi_{b}=(s,t_{1},t_{4},t_{5},g). Thus, if we assume that the costs of edges are all one, all input tuples are (3,1,)(3,1,\infty)-Anonymizable Tuples. Let πi=𝒜(𝒟,s,g,ti)\pi_{i}=\mathcal{A}(\langle\mathcal{D},s,g,t_{i}\rangle). Clearly, any path planner 𝒜\mathcal{A} should satisfy πa=π2=π3\pi_{a}=\pi_{2}=\pi_{3} and πb=π4=π5\pi_{b}=\pi_{4}=\pi_{5}. Then, if πa=π1\pi_{a}=\pi_{1}, πa\pi_{a} is a (3,1,)(3,1,\infty)-Anonymized Path but πb\pi_{b} is not a (3,1,)(3,1,\infty)-Anonymized Path. Likewise, if πb=π1\pi_{b}=\pi_{1}, πb\pi_{b} is a (3,1,)(3,1,\infty)-Anonymized Path but πa\pi_{a} is not a (3,1,)(3,1,\infty)-Anonymized Path. On the other hand, if all edges are undirected, we can construct a (3,1,)(3,1,\infty)-Anonymized Path from πa\pi_{a} and πb\pi_{b} by concatenating them.

Refer to caption
Figure 2. Directed vs. Undirected: While all tuples are (3,1,)(3,1,\infty)-Anonymizable Tuples, planning (3,1,)(3,1,\infty)-Anonymized Path for every transit point is impossible in the directed (left) case.

4. PbP: Partitioning-based Planner for (k,,)(k,\ell,\infty)-Anonymity

We now propose an algorithm for (k,,)(k,\ell,\infty)-Anonymity. First, note that if we disregard path cost, then in principle, a relatively straightforward approach to achieve (k,,)(k,\ell,\infty)-Anonymity would be to return some path which covers all transit candidates. However, a practical algorithm for Transit Obfuscation needs to effectively trade off the privacy objective vs. path costs, on average, overall (s,g,t)(s,g,t) tuples of interest. We first propose objectives that express this tradeoff and then propose a partitioning-based algorithm which seeks a solution which optimizes this objective. Proofs are in Supp. LABEL:supp:proof:sec4 Takahashi and Fukunaga (2024).

4.1. Objectives

We define two metrics, Anonymized Path Ratio (APR) and Mean Anonymization Cost (MAC), to evaluate the performance of planners that satisfy (k,,m)(k,\ell,m)-Anonymity. Let 𝒯+\mathscr{T}_{+} be the set {t|t𝒯,𝒜(𝒟,s,g,t) is a (k,,m)-Anonymized Path}\{t|t\in\mathscr{T},\mathcal{A}(\langle\mathcal{D},s,g,t\rangle)\text{ is a $(k,\ell,m)$-Anonymized Path}\} for the fixed 𝒟\mathcal{D}, ss, and gg. APR is defined as follows:

Definition 0 (Anonymized Path Ratio (APR)).
APR(𝒜,D,s,g)=|𝒯+|#Coverable Transit Nodes\hbox{APR}(\mathcal{A},D,s,g)=\frac{|\mathscr{T}_{+}|}{\hbox{\#Coverable Transit Nodes}}

where #Coverable Transit Nodes denotes the number of transit nodes within 𝒯\mathscr{T} such that there exists a path from ss to gg covering t𝒯t\in\mathscr{T}. APR is equivalent to the lower bound of δ\delta, and a larger APR is desirable.

Next, inspired by deception cost Price et al. (2023), a metric for goal obfuscation, we define the MAC metric:

Definition 0 (Mean Anonymization Cost (MAC)).
MAC(𝒜,D,s,g)=t𝒯+cost(𝒜(𝒟,s,g,t))cost(πt)|𝒯+|cost(πt))\hbox{MAC}(\mathcal{A},D,s,g)=\sum_{t\in\mathscr{T}_{+}}\frac{cost(\mathcal{A}(\langle\mathcal{D},s,g,t\rangle))-cost(\pi^{t*})}{|\mathscr{T}_{+}|\hskip 5.0ptcost(\pi^{t*}))}

where πt\pi^{t*} is the shortest path from ss to gg covering tt. MAC shows the cost of anonymizing the transit points.

4.2. Pbp: Partitioning-based Planner

Algorithm 1 Partitioning-based Planner (Pbp)
1:Tuple 𝒟,s,g,t\langle\mathcal{D},s,g,t\rangle and privacy parameters (k,)(k,\ell)
2:a path π\pi from ss to gg covering tt
3:/* Pre-Processing independent of tt*/
4:Generate a partition of 𝒯\mathscr{T}, T1,T2,,TΦT_{1},T_{2},...,T_{\Phi} such that ϕ=1ΦTϕ=𝒯\bigcup^{\Phi}_{\phi=1}T_{\phi}=\mathscr{T}, any TϕT_{\phi} except TΦT_{\Phi} meets all conditions of Prop. 5, and any pair are disjoint.
5:/* End of Pre-Processing */
6:if tt belongs to TΦT_{\Phi} then return Failure
7:TT\leftarrow the partition that contains tt
8:πT\pi^{*}_{T}\leftarrow shortest path from ss to gg while covering TT
9:return πT\pi^{*}_{T}

We now propose the Partitioning-based Planner (Pbp), a practical algorithm that seeks to achieve (k,,)(k,\ell,\infty)-Anonymity while optimizing the above objectives.

Pbp is composed of two phases: (1) the Partitioning/Pre-Processing phase and (2) the path query phase. In the Partitioning/Pre-Processing phase, the algorithm searches for a partition of all transit candidates, denoted as T1,T2,,TΦT_{1},T_{2},...,T_{\Phi}, such that (a) each subset except the final TΦT_{\Phi} satisfies the 3C Conditions described in Prop. 5, ensuring that each subset covers the required nodes to achieve the desired level of anonymity, and (b) the objectives are optimized. The set TΦT_{\Phi} consists of transit candidates that the planner cannot anonymize. This phase only needs to be executed once for each domain.

In the path query phase, given a specific ss, gg, and tt, the algorithm finds the shortest path π\pi from the source node ss to the goal node gg while covering all the nodes assigned to the subset (computed above in the Partitioning phase) that includes the target node tt.

By utilizing this approach, Pbp can effectively plan a (k,,)(k,\ell,\infty)-Anonymized Path, ensuring the privacy requirements are met while efficiently navigating from the source to the destination. If the obtained partition is perfect, Pbp satisfies (k,,)(k,\ell,\infty)-Anonymity.

Theorem 11 (Completeness).

Let all edges in 𝒟\mathcal{D} be undirected. Then, if ϕ=1Φ1|Tϕ|\sum^{\Phi-1}_{\phi=1}|T_{\phi}| is maximized for any pair of ss and gg, Alg. 1 satisfies (k,,)(k,\ell,\infty)-Anonymity.

4.3. WRP With Targets (WRPT)

A key building block for the Pbp algorithm is a search algorithm for finding the minimum cost path π\pi from ss to gg, which covers all of the nodes in a set of nodes. We call this the Watchman Route Problem with Targets (WRPT). The WRPT corresponds to the subproblem solved by the path query phase of Pbp in Alg. 1, line 8. The WRPT is also used in the Partitioning phase when evaluating candidate partitionings (Alg. 2, line 20).

The WRPT is a variant of the Watchman Route Problem (WRP) Skyler et al. (2022), The differences between the WRP and WRPT are: (1) WRP does not have a specified goal node, while the WRPT has a specific goal gg, and (2) the objective of the WRP is to cover all nodes in the graph, while the WRPT seeks to cover some subset ψ\psi of nodes in the graph. Since WRP was shown to be NP-Hard Skyler et al. (2022), the WRPT is clearly NP-Hard. Recent work has studied heuristic search-based algorithms to solve WRP  Skyler et al. (2022).

Following Skyler et al. (2022), we use an A* search for the WRPT. We define a state for the search as a tuple n,𝒰\langle n,\mathcal{U}\rangle, where n𝒩n\in\mathcal{N} represents the current location, and 𝒰𝒩\mathcal{U}\subseteq\mathcal{N} represents the set of uncovered nodes. The initial state is s,ψv(s)\langle s,\psi\setminus v(s)\rangle, and the final is g,\langle g,\emptyset\rangle. Expanding a state n,𝒰\langle n,\mathcal{U}\rangle involves moving from nn to one of its neighboring nodes nn^{\prime} and updating the set of uncovered nodes 𝒰\mathcal{U} to 𝒰v(n)\mathcal{U}\setminus v(n^{\prime}). The cost of this expansion equals c(n,n)c(n,n^{\prime}).

To make the search more efficient, we propose Tunnel Heuristic, which is based on the Singleton Heuristic for the WRP Skyler et al. (2022). The Tunnel Heuristic value htunnelh_{tunnel} is computed as follows:

htunnel(n,𝒰)\displaystyle h_{tunnel}(\langle n,\mathcal{U}\rangle) ={(maxu𝒰minqv1(u)d(n,q))+(minu𝒰minqv1(u)d(q,g))if 𝒰d(n,g)otherwise\displaystyle=\begin{cases}(\max\limits_{u\in\mathcal{U}}\min\limits_{q\in v^{-1}(u)}d(n,q))\\ +(\min\limits_{u\in\mathcal{U}}\min\limits_{q\in v^{-1}(u)}d(q,g))&\text{if $\mathcal{U}\neq\emptyset$}\\ d(n,g)&\text{otherwise}\end{cases}

where the function v1(n):𝒩2𝒩v^{-1}(n):\mathcal{N}\to 2^{\mathcal{N}} takes a node and returns the set of nodes from which nn is observable. The heuristic htunnelh_{tunnel} is admissible since the agent must travel to one of the nodes in v1(u)v^{-1}(u) to observe an uncovered node uu and then proceed to the goal gg after covering all nodes in 𝒰\mathcal{U}.

4.4. Searching for a Partitioning

Alg. 1 requires an algorithm that generates a partition of the set of nodes. Let Ψ+Ψ\Psi_{+}\subseteq\Psi be the largest subset of Ψ\Psi whose elements all satisfy the conditions of Prop. 5. We denote the sum of the cardinalities of the subsets in Ψ+\Psi_{+} as |ap||ap|, and the MAC corresponding to Ψ+\Psi_{+} as macmac. Specifically, macmac is ψΨ+ac(ψ)/|ap|\sum_{\psi\in\Psi_{+}}ac(\psi)/|ap|, where ac(ψ)=kψ(πψπk)/(πk)ac(\psi)=\sum_{k\in\psi}(\pi^{*}_{\psi}-\pi^{k*})/(\pi^{k*}), where πk\pi^{k*} denotes the minimal cost path from ss to gg covering kk, and πψ\pi^{*}_{\psi} denotes the minimal cost path from ss to gg while covering all nodes within ψ\psi, i.e., the solution to a WRPT which covers ψ\psi. We seek a partitioning which first prioritizes maximizing |ap||ap|, then minimizes macmac, i.e., a partitioning which anonymizes as many transit nodes as possible while minimizing the average cost of the anonymized paths.

Algorithm 2 Merge-BB Partitioning
1:Tuple 𝒟,s,g,t\langle\mathcal{D},s,g,t\rangle and privacy parameters (k,)(k,\ell)
2:The best partition Ψ\Psi^{*} of 𝒯\mathscr{T}
3:|ap|0|ap|^{*}\leftarrow 0, macmac^{*}\leftarrow\infty, Ψ=\Psi^{*}=\emptyset
4:function Merge_BB_Search(Ψ\Psi)
5:     Ψ+{ψ|ψΨ\Psi_{+}\leftarrow\{\psi|\psi\in\Psi s.t. ψ\psi satisfies all conditions of Prop. 5 }\}
6:     |ap|ψΨ+|ψ||ap|\leftarrow\sum_{\psi\in\Psi_{+}}|\psi|, macψΨ+ac(ψ)/|ap|mac\leftarrow\sum_{\psi\in\Psi_{+}}ac(\psi)/|ap|
7:     if (|ap|>|ap||ap|>|ap|^{*}) or (|ap|=|ap||ap|=|ap|^{*} and mac<macmac<mac^{*}then
8:         |ap||ap||ap|^{*}\leftarrow|ap|, macmacmac^{*}\leftarrow mac, ΨΨ\Psi^{*}\leftarrow\Psi      
9:     if (|Ψ|=1|\Psi|=1) or (|ap|=ψΨ|ψ||ap|=\sum_{\psi\in\Psi}|\psi|) or (|ap|=ψΨ|ψ||ap|^{*}=\sum_{\psi\in\Psi}|\psi| and macmacmac\geq mac^{*}then return True      
10:     for (i,j)MergeOrder(Ψ)(i,j)\in MergeOrder(\Psi) do
11:         if Prunable(ψi,ψj\psi_{i},\psi_{j}then Continue          
12:          πψiψj\pi^{*}_{\psi_{i}\cup\psi_{j}}\leftarrow shortest path from ss to gg, covering ψiψj\psi_{i}\cup\psi_{j}
13:         if πψi\pi^{*}_{\psi_{i}} is not found then Continue          
14:         ΨΨ{ψi,ψj}{ψiψj}\Psi^{\prime}\leftarrow\Psi\setminus\{\psi_{i},\psi_{j}\}\cup\{\psi_{i}\cup\psi_{j}\}
15:         Merge_BB_Search(Ψ\Psi^{\prime})      
16:
17:for i𝒯i\in\mathscr{T} do
18:     if uv(i)\exists u\in v(i) uu is reachable from ss and uv(i)\exists u\in v(i) gg is reachable from uu then
19:         ψi{i}\psi_{i}\leftarrow\{i\}
20:         πψi\pi^{*}_{\psi_{i}}\leftarrow shortest path from ss to gg, covering tt      
21:Merge_BB_Search({ψ1,ψ2,}\{\psi_{1},\psi_{2},...\})
22:return Ψ+{ΨΨ+}\Psi^{*}_{+}\cup\{\bigcup\Psi^{*}\setminus\Psi^{*}_{+}\}

4.4.1. Merge-based Branch-and-Bound

One practical partitioning algorithm is Merge-based Branch-and-Bound Partitioning (Merge-BB). It initially assigns each node to its own separate partition. It removes any node without a valid path from ss to gg while covering that node. This pruning step involves calculating all pair-wise shortest paths on the node set NN, which can be done efficiently within a reasonable amount of time. The algorithm then performs a recursive branch-and-bound search which considers all possible combinations of merges of these partitions.

The termination condition for this recursive search is implemented in Line 9: Return True when (1) the partition Ψ\Psi contains only one subset, or (2) |ap||ap| reaches the upper bound, or (3) the current best partition Ψ\Psi^{*} has an optimal |ap||ap|, and the macmac of Ψ\Psi is not better than macmac^{*}. The third termination condition is based on the observation that the cost of the optimal path covering all nodes in the union of ψi\psi_{i} and ψj\psi_{j} is always equal to or greater than both of the costs of the optimal paths covering all nodes in ψi\psi_{i} and ψj\psi_{j}.

Alg. 2 explores all potential merges and returns a partition that maximizes the number of anonymized transit points while minimizing the average cost of anonymized paths.

Proposition 0 (Optimality).

Alg. 1 using Alg 2 achieves the largest APR and also has the minimum MAC among planners with the largest APR for any combination of 𝒟\mathcal{D}, ss, and gg.

Since Theorem 7 tells that there exists a planner satisfying (k,,)(k,\ell,\infty)-Anonymity for an undirected graph, which means that it can anonymize all (k,,)(k,\ell,\infty) - Transit Anonymizable Tuples, combining Theorem 11 and Prop. 12 immediately yields the guarantee that Alg. 1 with Alg. 2 satisfies (k,,)(k,\ell,\infty)-Anonymity.

We also implemented the following enhancements.

Merge Ordering Strategies

The order in which partitions are merged in Alg. 2 by the recursive enumeration is determined by a call to the MergeOrder function in line 10, which returns the list of all pairs of candidate subsets to merge, sorted according to some merge ordering criterion. One simple strategy is Random, which simply returns a randomly shuffled list of the pairs of partitions. Another ordering strategy, CostAsc, sorts the pairs to be merged in ascending order of a heuristic cost function. We use max(cost(πψi),cost(πψj))×(|ψi|+|ψj|)max(cost(\pi_{\psi_{i}}),cost(\pi_{\psi_{j}}))\times(|\psi_{i}|+|\psi_{j}|) as the cost of a pair (ψi,ψj)(\psi_{i},\psi_{j}), where the first term is the lower bound of the covering path of the merged partition, and the second term is the number of transit candidates assigned to the merged partition. CostAsc helps the planner find a better solution earlier, leading to more upper/lower bound-based pruning.

Pruning Criteria

To determine whether we need to try merging (ψi,ψj)(\psi_{i},\psi_{j}), Alg. 2, line 11 calls Prunable (Alg.3). If both ψi\psi_{i} and ψj\psi_{j} already satisfy all the conditions stated in Thm.5, the merge is pruned because it would increase the cost of a path covering all the nodes within the set (Alg. 3, Line 2). Furthermore, suppose we have already found a satisfactory solution for anonymizing all possible tuples. In that case, we can establish an upper bound for the path cost covering the union of ψi\psi_{i} and ψj\psi_{j} to surpass the current best satisfying solution and prune based on this bound (Alg. 3, Line 3). Specifically, we denote ac^\hat{ac} as the upper bound for the cost that πψiψj\pi_{\psi_{i}\cup\psi_{j}} must meet to improve upon the best acac^{*}, and it is calculated as |ap|mac|ap|mac+ac(πψi)+ac(πψj)|ap|^{*}mac^{*}-|ap|mac+ac(\pi_{\psi_{i}})+ac(\pi_{\psi_{j}}). To estimate the cost of a path that covers all the nodes within the union of ψi\psi_{i} and ψj\psi_{j}, we use max(cost(πψi),cost(πψj))\max(cost(\pi^{*}_{\psi_{i}}),cost(\pi^{*}_{\psi_{j}})), which is the lower-bound of cost(ππiπj)cost(\pi^{*}_{\pi_{i}\cup\pi_{j}}). Finally, we check the minimum distance between a node in ψi\psi_{i} and ψj\psi_{j}. If that distance is less than \ell, we prune this merge, as any set containing the union of ψi\psi_{i} and ψj\psi_{j} would also violate this condition (Alg. 3, Line 7).

Algorithm 3 Prunable
1:if Both ψi\psi_{i} and ψj\psi_{j} meets all conditions in Prop. 5 then
2:     return True
3:if min(x,y)ψi×ψjd(x,y)<\min_{(x,y)\in\psi_{i}\times\psi_{j}}d(x,y)<\ell then return True
4:if |ap|=ψΨ|ψ||ap|^{*}=\sum_{\psi\in\Psi}|\psi| then
5:     ac^=|ap|mac|ap|mac+ac(πψi)+ac(πψj)\hat{ac}=|ap|^{*}mac^{*}-|ap|mac+ac(\pi_{\psi_{i}})+ac(\pi_{\psi_{j}})
6:     ac¯=kψiψjmax(cost(πψi),cost(πψj))cost(πk)cost(πk)\bar{ac}=\sum_{k\in\psi_{i}\cup\psi_{j}}\frac{\max(cost(\pi^{*}_{\psi_{i}}),cost(\pi^{*}_{\psi_{j}}))-cost(\pi^{k*})}{cost(\pi^{k*})}
7:     if ac¯ac^\bar{ac}\geq\hat{ac} then return True      
8:return False

5. Planners for mm-bounded (k,l,m)(k,l,m)-Anonymity

We now propose three planners that output (k,,m)(k,\ell,m)-Anonymized Paths with m<m<\infty, which means that the adversary cannot identify which node is the transit point until observing more than mm nodes. If mm is less than the length of the output path, the adversary might be able to identify the true transit point after obtaining the m+1m+1st and later nodes. Proofs for this section can be found in Supp. LABEL:supp:proof:sec5 Takahashi and Fukunaga (2024).

Random-Walk-based Planner (Rbp)

The first algorithm is a Random-Walk-based Planner (Rbp), which randomly selects the path’s first mm nodes. Specifically, the planner selects the ii-th node (2im2\leq i\leq m) of the path randomly from the neighbors of the (i1)(i-1)-th node, where π1=s\pi_{1}=s. Subsequently, the planner guides the agent’s movement from πm\pi_{m} to tt and finally to gg utilizing the shortest paths available. π|m\pi|_{m} is the same for all transit candidates, and the planner outputs Failure if there is no feasible path. This planner archives (k,,m)(k,\ell,m)-Anonymity with finite mm for undirected graphs.

Proposition 0.

If all edges in \mathcal{E} are undirected, Random-Walk-based Planner satisfies (k,,m)(k,\ell,m)-Anonymity with m<m<\infty.

mm-Pbp

The second planner is mm-Pbp, which is an extension of Pbp. mm-Pbp returns πPbp|mπua\pi_{Pbp}|_{m}\circ\pi_{ua}^{*}, where πPbp|m\pi_{Pbp}|_{m} is the output path up to the mm-th node planned by Pbp, and πua\pi_{ua}^{*} is the unanonymized shortest path from the last node of πPbp|m\pi_{Pbp}|_{m} to the goal while covering tt if πPbp|m\pi_{Pbp}|_{m} does not cover tt. The anonymity of mm-Pbp relies on the anonymity of Pbp.

Proposition 0.

If Pbp satisfies (k,,)(k,\ell,\infty)-Anonymity for the given domain 𝒟\mathcal{D}, mm-Pbp satisfies (k,,m)(k,\ell,m)-Anonymity for that domain 𝒟\mathcal{D}.

Clustering-based Planner (Cbp)

The third mm-bounded planner is a Clustering-based Planner (Cbp), which first applies kk-means-like clustering to the transit candidates and then returns the concatenation of paths from ss to the centroid of the cluster corresponding to tt and from the centroid to gg. Following Wasserman and Faust (1994), we call a node σ𝒩\sigma\in\mathcal{N} that minimizes the maximum distance to cover a node within a set of nodes 𝒰𝒩\mathcal{U}\subseteq\mathcal{N} the centroid of 𝒰\mathcal{U}, i.e., σ=argminn𝒩maxu𝒰minwv1(u)d(n,w)\sigma=\mathop{\rm arg\leavevmode\nobreak\ min}_{n\in\mathcal{N}}\max_{u\in\mathcal{U}}\min_{w\in v^{-1}(u)}d(n,w). Like kk-means clustering Ahmed et al. (2020), Cbp iteratively updates the assignment of each transit candidate to minimize the distance between each candidate and the centroid of their respective cluster. After the assignments stabilize, Cbp repeatedly merges a cluster with cardinality less than kk with the nearest cluster until each cluster has kk or more nodes. Here, we use the shortest distance from the centroid of the ii-th cluster to the centroid of the jj-th cluster as the distance from the ii-th cluster to the jj-th cluster. Then, Cbp checks |πsσt||\pi_{s\to\sigma_{t}}|, the length of the shortest path from ss to the centroid of the cluster containing the true transit node tt. If it exceeds mm, Cbp assigns the first mm nodes from πsσt\pi_{s\to\sigma_{t}}, as π1\pi^{1}. Otherwise, Cbp appends a randomly generated path as padding (Line 12-15 in Algorithm 4) and assigns the extended path to π1\pi^{1}. Finally, Cbp computes π2\pi^{2}, the shortest path from the last node of π1\pi^{1} to gg, covering tt, and returns π1π2\pi^{1}\circ\pi^{2}. The sequence of the first mm nodes of the output paths planned by Cbp is the same for all transit points belonging to the same cluster. Cbp satisfies the following.

Proposition 0.

Let all edges in 𝒟\mathcal{D} be undirected. If for any t𝒯t\in\mathscr{T}, there exists a path from ss to gg while covering tt, Cbp satisfies (k,0,m)(k,0,m)-Anonymity.

Algorithm 4 Clustering-based Planner (Cbp)
1:Randomly assign the transit candidates to [|𝒯|/k][|\mathscr{T}|/k] clusters s.t. the number of nodes in each cluster is equal to or more than kk
2:while True do
3:     for each transit candidate ti𝒯t_{i}\in\mathscr{T} do
4:         Compute the distance to each centroid
5:         Assign tit_{i} to the cluster with the nearest centroid.      
6:     for each cluster do
7:         Recompute the centroid for each cluster;      
8:     if the assignment does not change then Break      
9:while There exists a cluster consisting of less than kk nodes do
10:     for each cluster consisting of less than kk nodes do
11:         Assign all elements of this cluster to the nearest cluster      
12:σt\sigma_{t}\leftarrow the centroid of the cluster containing tt
13:πsσt\pi^{*}_{s\to\sigma_{t}}\leftarrow the shortest path from ss to σt\sigma_{t}
14:if |πsσt|m|\pi^{*}_{s\to\sigma_{t}}|\geq m then π1πsσt|m\pi^{1}\leftarrow\pi^{*}_{s\to\sigma_{t}}|_{m}
15:else
16:     r=sr=s, πsr=s\pi_{s\to r}=s
17:     while |πsr|+|πrσt|<m|\pi_{s\to r}|+|\pi^{*}_{r\to\sigma_{t}}|<m do
18:         rr\leftarrow Randomly pick the neighbour of rr
19:         Append rr to the tail of πsr\pi_{s\to r}      
20:     π1πsrπrσt\pi^{1}\leftarrow\pi_{s\to r}\circ\pi^{*}_{r\to\sigma_{t}}
21:π2\pi^{2}\leftarrow shortest path from π|π1|1\pi^{1}_{|\pi^{1}|} to gg while covering tt
22:return π1π2\pi^{1}\circ\pi^{2}

6. Experiments

Benchmarks and Settings

We evaluate the performance of Pbp on six 2D grid world benchmark instances from the Moving AI pathfinding benchmark set Sturtevant (2012): den101d, den201d, lak102d, lak510d, orz000d, and orz201d. We randomly select 5 pairs of start and goal points for each benchmark. The number of transit candidates, |𝒯||\mathscr{T}|, is 8, 12, and 16, and we randomly select 𝒯\mathscr{T} from 𝒩\mathcal{N} for each problem. We use a visibility function where nodes within a range less than or equal to distance rr are covered (for rr =0,2,10). All experiments used 4-way unit cost movement.

All algorithms were implemented in C++, and experiments were run on an Intel(R) Xeon(R) CPU E5-2650 v2 @ 2.60GHz and 125GB of RAM, running Ubuntu 22.04.2 LTS. A time limit of 300 seconds/instance was used.

6.1. Evaluation of Pbp with m=m=\infty

We evaluate Pbp using Merge-BB and DF-BB partitioning strategies, two merge orders (Random and CostAsc), and two WRTP heuristics: the blind heuristic (equivalent to breadth-first search) and the Tunnel heuristic. We also evaluate two baseline partitioning strategies:

Baseline #1: Naive

This generates a partitioning by randomly splitting the transit candidates into pairs of 2 nodes. This approach satisfies (2,1,2,1,\infty)-Anonymity for this class of undirected grid maps.

Baseline #2: Depth-First Branch-and-Bound (DF-BB) partitioning

The DF-BB partitioning strategy starts with all nodes unassigned and then constructs a partitioning by assigning one unassigned node to an existing subset of Φ\Phi or a new subset (details in Supp. LABEL:supp:dfbb  Takahashi and Fukunaga (2024)).

For the privacy parameters, we set kk to 2 and 3 and \ell to 1 and 10.

Results
Table 1. Comparison of each combination of partitioning, MergeOrder, and heuristic functions on coverage, the number of evaluated partitions, and the total execution time. Merge-BB with CostAsc using Tunnel achieved the best performance.
|𝒯||\mathscr{T}| 8 12 16 8 12 16 8 12 16 8 12 16
Planner
MergeOrder
Heuristic Coverage [%]
Total Time [s]
APR (higher=better) MAC (lower=better)
Naive Blind n/a n/a n/a <1 <1 - 1.00 1.00 1.00 0.714 0.434 0.582
Tunnel n/a n/a n/a <1 <1 - 1.00 1.00 1.00 0.714 0.434 0.582
DF-BB Blind 77 0 0 19 - - 1.00 0.672 0.439 0.232 - -
Tunnel 100 20 0 2 92 - 1.00 0.828 0.558 0.229 - -
Merge-BB Random Blind 74 7 0 35 185 - 1.00 1.00 1.00 0.232 0.418 0.561
Tunnel 100 27 0 3 13 - 1.00 1.00 1.00 0.229 0.287 0.452
CostAsc Blind 77 7 0 10 80 - 1.00 1.00 1.00 0.231 0.222 0.223
Tunnel 100 47 0 1 5 - 1.00 1.00 1.00 0.229 0.190 0.205

Tab. 1 shows the performance of the Partitioning-based Planner when k=2,=1k=2,\ell=1. We report coverage, APR, MAC, and execution time. Coverage is the percentage of problems on which Pbp completed the search (found the optimal solution and proved its optimality) within the time limit. We report mean MAC for the configurations which found satisfying solutions (ARP=1) for all instances within the time limit. Total Time denotes the average execution time for the instances where Merge-BB with the blind heuristic completed the search for |𝒯||\mathscr{T}| of 8 and 12.

Tab. 2 shows the mean and standard deviation of the MAC of Merge-BB divided by the MAC of Naive, showing over 50% improvement of Merge-BB with CostAsc.

From Tab. 1-2, we observe that: (1) Pbp (Merge-BB) consistently results in better MAC than the Naive baseline, showing that searching for an optimal partition achieves significantly better path costs than a naive partitioning. (2) Merge-BB has significantly higher coverage than DF-BB, showing that the merge-based approach is a more efficient strategy. (3) Overall, combining Merge-BB, CostAsc, and Tunnel gives the best performance.

Refer to caption
Figure 3. Convergence of ARP and MAC. Mege-BB with CostAsc shows the best performance.

Fig. 3 depicts the changes over time in ARP and MAC when k=2k=2, =1\ell=1. All combinations use htunnelh_{tunnel}. Mege-BB archives higher APR faster, and CostAsc can find solutions with lower MAC earlier.

Refer to caption
Figure 4. Impact of kk, \ell, and radius rr. Larger kk and \ell increase MAC. The impact of rr is not monotonic.

Fig. 4 shows MAC for each combination of (k,,m)(k,\ell,m) and radius rr when using Merge-BB with CostAsc and htunnelh_{tunnel}. Larger kk and \ell result in worse MAC. The correlation between MAC and rr is not monotonic since larger rr allows the agent to cover nodes with less movement, decreasing both the numerator and denominator of MAC.

Refer to caption
Figure 5. Example of (2,1,)(2,1,\infty)-Anonnymized Paths.

FIg. 5 shows an example of optimal (2, 1, \infty)-Anonnymized Paths in den101 obtained by Pbp (Merge-BB). The cyan (S) and green (G) cells are the source and goal, respectively. The transit candidate belonging to the same subset (141\sim 4) has the same color, while its corresponding path is colored in a lighter color. More qualitative examples can be found in Supp. LABEL:supp:additional-results.

Table 2. Ratio of Merge-BB’s MAC to Naive’s MAC. Merge-BB reduces the MAC of a satisfying solution by more than 50%.
MergeOrder Heuristic |𝒯|=8|\mathscr{T}|=8 |𝒯|=12|\mathscr{T}|=12 |𝒯|=16|\mathscr{T}|=16
Random Blind
0.425
(±0.227)
0.679
(±0.380)
0.937
(±0.716)
Tunnel
0.423
(±0.226)
0.462
(±0.347)
0.706
(±0.723)
CostAsc Blind
0.435
(±0.237)
0.350
(±0.160)
0.378
(±0.189)
Tunnel
0.423
(±0.226)
0.313
(±0.140)
0.349
(±0.188)

6.2. Evaluation with bounded mm

We compared the three mm-bounded anonymity planners, mm-Pbp, Rbp, and Cbp, for various values of mm and kk. For each problem, we set mm such that m/|π|m/|\pi^{*}| is [0.1, 0.3, 0.5, 1.0, 5.0, 10.0], where π\pi^{*} is the length of the shortest path for that problem. kk is [2, 3, 5]. The remaining parameters are kept constant: =1\ell=1, |𝒯|=8|\mathscr{T}|=8, and the heuristic function is htunnelh_{tunnel}.

Fig. 6 shows that as mm increases, the MAC of Rbp and Cbp exhibits exponentia growth (y-axis is log scale), while mm-Pbp’s performance converges towards that of Pbp. mm-Pbp aims to cover all nodes within the same partition, while Cbp strives to move towards the centroid of the cluster. Thus, when mm is small enough that Cbp doesn’t require appending a random-walking path, the MAC of Cbp surpasses that of mm-Pbp. However, mm-Pbp exhibits superior performance compared to the other methods for larger values of mm.

Tab. 3 shows the execution time of each planner. Cbp is clearly faster than mm-Pbp. Larger mm makes Cbp faster because the path after the mm-th node tends to be shorter, reducing the runtime of the search performed by Line 21 in Alg. 4. However, this effect decreases if mm is too large for Cbp to need additional time to append random nodes.

Table 3. Comparison of the runtime ([s]) for each planner. Rbp and Cbp show better scalability compared to mm-Pbp.
m/|π|m/|\pi^{*}| 0.1 0.3 0.5 1.0 5.0 10.0
Rbp 0.006 0.006 0.006 0.006 0.006 0.006
Cbp 0.098 0.085 0.046 0.009 0.006 0.006
mm-Pbp 63.985 63.985 63.985 63.985 63.985 63.985
Refer to caption
Figure 6. Impact of kk and mm on MAC. While MAC of Rbp increases linearly with respect to mm, MAC of mm-Pbp converges to MAC of Pbp.

7. Related Work

kk-Anonymity

kk-anonymity is a fundamental concept in data privacy and anonymization that aims to safeguard individual identities in a dataset while preserving its utility Sweeney (2002); Terzi et al. (2015). kk-anonymity seeks to render each record in a dataset indistinguishable from at least kk-1 other records, i.e., each individual’s data is grouped with a minimum of kk-1 other individuals with similar attributes. This grouping makes it challenging to identify a specific individual within the group.

Obfuscation

Some existing methods for goal obfuscation leverage concepts similar to kk-anonymity. For instance, Kulkarni et al. (2018, 2019) define a secure path as one where kk different goals result in the same path, thereby making it difficult for an observer to discern the true purpose among these kk nodes. Another example is Dissimulation proposed in Masters and Sardina (2017), where the true goal is considered to be obfuscated if there exist other nodes that look like the goal equally or more than the real goal. While our work refrains from making any assumptions regarding how the observer deduces the agent’s intention, some studies  (Masters and Sardina, 2017; Luo et al., 2019; Lewis and Miller, 2023; Savas et al., 2022) model the inference process of the observer and devise obfuscation techniques tailored to these models. However, approaches based on such models do not provide a guarantee of security against adversaries who do not adhere to the model assumptions.

8. Conclusion

This paper introduced the Transit Obfuscation Problem and proposed novel techniques to address this challenge. We introduced (k,,m)(k,\ell,m)-Anonymity as a measure of concealment achieved by a path planner. We proposed a Pbp, a partitioning based algorithm to achieve (k,,)(k,\ell,\infty)-Anonymity, and evaluated its performance on 2D grid maps with obstacles. We showed that Pbp with a merge-based branch-and-bound strategy significantly outperforms baseline partitioning approaches.

Although we showed that Merge-BB with the APR and MAC objectives is a viable approach to partitioning, a complete branch-and-bound search to find and prove the optimality of a solution poses a scalability challenge. For example, although our current implementation of Pbp can find solutions for |𝒯|=16|\mathscr{T}|=16 (Tab. 1), it can not complete the search and prove optimality within the 300 sec. limit. Search algorithms finding good partitionings quickly without an optimality guarantee (e.g., local search/metaheuristics) are a direction for future work.

We also investigated algorithms for mm-bounded anonymity (m<m<\infty). We showed that while mm-Pbp yielded the best MAC scores, Cbp offers fairly good MAC scores but runs much faster. Future work will investigate additional approaches to trading off scalability vs. solution quality.

Finally, while this work focused on a single agent and single adversary in a static environment, an extension of our proposed techniques to more complex scenarios, such as multi-agent systems and dynamic environments, is another direction for future work.

References

  • (1)
  • Ahmed et al. (2020) Mohiuddin Ahmed, Raihan Seraj, and Syed Mohammed Shamsul Islam. 2020. The k-means algorithm: A comprehensive survey and performance evaluation. Electronics 9, 8 (2020), 1295.
  • Chakraborti et al. (2019) Tathagata Chakraborti, Anagha Kulkarni, Sarath Sreedharan, David E Smith, and Subbarao Kambhampati. 2019. Explicability? legibility? predictability? transparency? privacy? security? the emerging landscape of interpretable agent behavior. In Proceedings of the international conference on automated planning and scheduling, Vol. 29. 86–96.
  • Chen et al. (2012) Rui Chen, Benjamin CM Fung, Bipin C Desai, and Nériah M Sossou. 2012. Differentially private transit data publication: a case study on the montreal transportation system. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. 213–221.
  • Dias et al. (2013) Joao Dias, Ruth Aylett, Ana Paiva, and Henrique Reis. 2013. The great deceivers: Virtual agents and believable lies. In Proceedings of the Annual Meeting of the Cognitive Science Society, Vol. 35.
  • Enayati et al. (2022) Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, and Hossein Pishro-Nik. 2022. Privacy-Preserving Path-Planning for UAVs. In 2022 International Symposium on Networks, Computers and Communications (ISNCC). 1–6. https://doi.org/10.1109/ISNCC55209.2022.9851770
  • Keren et al. (2016) Sarah Keren, Avigdor Gal, and Erez Karpas. 2016. Privacy Preserving Plans in Partially Observable Environments.. In IJCAI. 3170–3176.
  • Kulkarni et al. (2018) Anagha Kulkarni, Matthew Klenk, Shantanu Rane, and Hamed Soroush. 2018. Resource bounded secure goal obfuscation. In AAAI Fall Symposium on Integrating Planning, Diagnosis and Causal Reasoning.
  • Kulkarni et al. (2019) Anagha Kulkarni, Siddharth Srivastava, and Subbarao Kambhampati. 2019. A unified framework for planning in adversarial and cooperative environments. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 33. 2479–2487.
  • Lewis and Miller (2023) Alan Lewis and Tim Miller. 2023. Deceptive Reinforcement Learning in Model-Free Domains. arXiv preprint arXiv:2303.10838 (2023).
  • Luo et al. (2019) Junren Luo, Wanpeng Zhang, Fengtao Xiang, and Su Jiongming. 2019. Intention Obfuscated Adversarial Deceptive Path Recommendation for UGV Patrol Maneuver. 206–211. https://doi.org/10.1109/IHMSC.2019.00055
  • Masters and Sardina (2017) Peta Masters and Sebastian Sardina. 2017. Deceptive Path-Planning.. In IJCAI. 4368–4375.
  • Price et al. (2023) Adrian Price, Ramon Fraga Pereira, Peta Masters, and Mor Vered. 2023. Domain-Independent Deceptive Planning. In Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems. 95–103.
  • Savas et al. (2022) Yagiz Savas, Christos K Verginis, and Ufuk Topcu. 2022. Deceptive decision-making under uncertainty. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 36. 5332–5340.
  • Seiref et al. (2020) Shawn Seiref, Tamir Jaffey, Margarita Lopatin, and Ariel Felner. 2020. Solving the watchman route problem on a grid with heuristic search. In Proceedings of the international conference on automated planning and scheduling, Vol. 30. 249–257.
  • Skyler et al. (2022) Shawn Skyler, Dor Atzmon, Tamir Yaffe, and Ariel Felner. 2022. Solving the Watchman Route Problem with Heuristic Search. J. Artif. Intell. Res. 75 (2022), 747–793. https://doi.org/10.1613/jair.1.13685
  • Sturtevant (2012) N. Sturtevant. 2012. Benchmarks for Grid-Based Pathfinding. Transactions on Computational Intelligence and AI in Games 4, 2 (2012), 144 – 148. http://web.cs.du.edu/~sturtevant/papers/benchmarks.pdf
  • Sweeney (2002) Latanya Sweeney. 2002. k-anonymity: A model for protecting privacy. International journal of uncertainty, fuzziness and knowledge-based systems 10, 05 (2002), 557–570.
  • Takahashi and Fukunaga (2024) Hideaki Takahashi and Alex Fukunaga. 2024. Supplementary Material for ”On the Transit Obfuscation Problem. arXiv preprint (2024).
  • Terzi et al. (2015) Duygu Sinanc Terzi, Ramazan Terzi, and Seref Sagiroglu. 2015. A survey on security and privacy issues in big data. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 202–207.
  • Wasserman and Faust (1994) Stanley Wasserman and Katherine Faust. 1994. Social network analysis: Methods and applications. (1994).