Skip to main content
Erschienen in: Telecommunication Systems 4/2019

18.01.2019

Breaching the privacy of connected vehicles network

verfasst von: Vladimir Kaplun, Michael Segal

Erschienen in: Telecommunication Systems | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e. usage based insurance, entertainment services, navigation etc. The main objective of this work is to show that by analyzing the information about a driver which is provided to the usage based insurance companies, it is possible to get additional private data, even if the basic data in first look, seems not so harmful. In this work, we present an analysis of a novel approach for reconstructing driver’s path from other driving attributes, such as cornering events, average speed and total driving time. We show that, in some cases, it is possible to reconstruct the driver’s path, while not knowing the target point of the trip.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dewri, R., Annadata, P., Eltarjaman, & W., Thurimella, R. (2013). Inferring trip destinations from driving habits data. In Proceedings of the ACM conference on computer and communications security (pp. 267–272). Dewri, R., Annadata, P., Eltarjaman, & W., Thurimella, R. (2013). Inferring trip destinations from driving habits data. In Proceedings of the ACM conference on computer and communications security (pp. 267–272).
2.
Zurück zum Zitat Xiaofeng, L., Zhaowei, Q., Qi, L., & Pan, H. (2014). Privacy information security classification study in internet of things. In International conference on identification, information and knowledge in the internet of things (pp. 162–165). Xiaofeng, L., Zhaowei, Q., Qi, L., & Pan, H. (2014). Privacy information security classification study in internet of things. In International conference on identification, information and knowledge in the internet of things (pp. 162–165).
3.
Zurück zum Zitat Mivule, K., & Turner, C. (2015). A comparative analysis of data privacy and utility parameter adjustment, using machine learning classification as a gauge. In Procedia computer science (pp. 414–419). Mivule, K., & Turner, C. (2015). A comparative analysis of data privacy and utility parameter adjustment, using machine learning classification as a gauge. In Procedia computer science (pp. 414–419).
4.
Zurück zum Zitat Torra, V., & Navarro-Arribas, G. (2014). Data privacy. Data Mining and Knowledge Discovery, 4, 269–280.CrossRef Torra, V., & Navarro-Arribas, G. (2014). Data privacy. Data Mining and Knowledge Discovery, 4, 269–280.CrossRef
5.
Zurück zum Zitat Sweeney, L. (2002). K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10, 557–570.CrossRef Sweeney, L. (2002). K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10, 557–570.CrossRef
6.
Zurück zum Zitat Wang, K., & Fung B. (2006) Anonymizing sequential release. In Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining (KDD) (pp. 414–423). Wang, K., & Fung B. (2006) Anonymizing sequential release. In Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining (KDD) (pp. 414–423).
7.
Zurück zum Zitat Shmueli, E., Tassa, T., Wasserstein, R., Shapira, B., & Rokach, L. (2012). Limiting disclosure of sensitive data in sequential releases of databases. Information Science, 191, 98–127.CrossRef Shmueli, E., Tassa, T., Wasserstein, R., Shapira, B., & Rokach, L. (2012). Limiting disclosure of sensitive data in sequential releases of databases. Information Science, 191, 98–127.CrossRef
8.
Zurück zum Zitat Handel, P., Skog, I., Wahlstrom, J., Bonawiede, F., Welch, R., Ohlsson, J., et al. (2014). Insurance telematics: Opportunities and challenges with the smartphone solution. IEEE Intelligent Transportation Systems Magazine, 6(4), 57–70.CrossRef Handel, P., Skog, I., Wahlstrom, J., Bonawiede, F., Welch, R., Ohlsson, J., et al. (2014). Insurance telematics: Opportunities and challenges with the smartphone solution. IEEE Intelligent Transportation Systems Magazine, 6(4), 57–70.CrossRef
9.
Zurück zum Zitat Rinku, D., Prasad, A., Wisam, E., Ramakrishna, T. (2013). Inferring trip destinations from driving habits data. In Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society (pp. 267–272). Rinku, D., Prasad, A., Wisam, E., Ramakrishna, T. (2013). Inferring trip destinations from driving habits data. In Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society (pp. 267–272).
11.
Zurück zum Zitat Eren, H., Makinist, S., Akin, E., & Yilmaz, A. (2012). Estimating driving behavior by a smartphone. In International vehicle symposium (pp. 234–239). Eren, H., Makinist, S., Akin, E., & Yilmaz, A. (2012). Estimating driving behavior by a smartphone. In International vehicle symposium (pp. 234–239).
12.
Zurück zum Zitat Saiprasert, C., & Pattara-Atikom, W. (2013). Smartphone enabled dangerous driving report system. In International conference systems science (pp. 1231–1237). Saiprasert, C., & Pattara-Atikom, W. (2013). Smartphone enabled dangerous driving report system. In International conference systems science (pp. 1231–1237).
13.
Zurück zum Zitat Johnson, D., & Trivedi, M. (2011). Driving style recognition using a smartphone as a sensor platform. In IEEE conference intelligent transportation systems (pp. 1609–1615). Johnson, D., & Trivedi, M. (2011). Driving style recognition using a smartphone as a sensor platform. In IEEE conference intelligent transportation systems (pp. 1609–1615).
14.
Zurück zum Zitat Meseguer, J., Calafate, C., Cano, J., & Manzoni, P. (2013). Driving styles: A smartphone application to assess driver behavior. In IEEE symposium computer communication (pp. 535–540). Meseguer, J., Calafate, C., Cano, J., & Manzoni, P. (2013). Driving styles: A smartphone application to assess driver behavior. In IEEE symposium computer communication (pp. 535–540).
15.
Zurück zum Zitat Wahlstrom, J., Skog, I., & Peter, H. (2015). Detection of dangerous cornering in GNSS data driven insurance telematics. IEEE Transactions on Intelligent Transportation Systems, 25(6), 3073–3083.CrossRef Wahlstrom, J., Skog, I., & Peter, H. (2015). Detection of dangerous cornering in GNSS data driven insurance telematics. IEEE Transactions on Intelligent Transportation Systems, 25(6), 3073–3083.CrossRef
16.
Zurück zum Zitat “Rollover data special study final report,” U.S. Department of Transportation, National Highway Traffic Safety Administration. (2011). Technical Report (pp. 1–59). “Rollover data special study final report,” U.S. Department of Transportation, National Highway Traffic Safety Administration. (2011). Technical Report (pp. 1–59).
17.
Zurück zum Zitat Hunter, T., Abbeel, P., & Bayen, M. A. (2013). The path inference filter: model-based low-latency map matching of probe vehicle data. In Algorithmic foundations of robotics X, Proceedings of the 10th workshop on the algorithmic foundations of robotics (pp. 591–607). Hunter, T., Abbeel, P., & Bayen, M. A. (2013). The path inference filter: model-based low-latency map matching of probe vehicle data. In Algorithmic foundations of robotics X, Proceedings of the 10th workshop on the algorithmic foundations of robotics (pp. 591–607).
18.
Zurück zum Zitat Xianyi, G., Firner, B., Sugrim, S., Pendergrast, V. K., Yang, Y., & Lindqvist, J. (2014). Elastic pathing: your speed is enough to track you. In UbiComp’14, Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing (pp. 975–986). Xianyi, G., Firner, B., Sugrim, S., Pendergrast, V. K., Yang, Y., & Lindqvist, J. (2014). Elastic pathing: your speed is enough to track you. In UbiComp’14, Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing (pp. 975–986).
19.
Zurück zum Zitat Eren, H., Makinist, S., Akin, E., & Yilmaz, A. (2012). Estimating driving behavior by a smartphone. In Intelligent vehicles symposium IV (pp. 234–239). Eren, H., Makinist, S., Akin, E., & Yilmaz, A. (2012). Estimating driving behavior by a smartphone. In Intelligent vehicles symposium IV (pp. 234–239).
20.
Zurück zum Zitat Zheng, Y., Chen, Y., Xie, X., & Wei-Ying, M. (2009). GeoLife2.0: A location-based social networking service. In Proceedings of the 10th international conference on mobile data management (pp. 357–358). Zheng, Y., Chen, Y., Xie, X., & Wei-Ying, M. (2009). GeoLife2.0: A location-based social networking service. In Proceedings of the 10th international conference on mobile data management (pp. 357–358).
21.
Zurück zum Zitat Yuan, J., Zheng, Y., Zhang, C., Xie, W., Xie, X., Sun, G., & Huang, Y. (2010). T-drive: Driving directions based on taxi trajectories. In Proceedings of the 18th SIGSPATIAL international conference on advances in geographic information systems (pp. 99–108). Yuan, J., Zheng, Y., Zhang, C., Xie, W., Xie, X., Sun, G., & Huang, Y. (2010). T-drive: Driving directions based on taxi trajectories. In Proceedings of the 18th SIGSPATIAL international conference on advances in geographic information systems (pp. 99–108).
22.
Zurück zum Zitat Shin, D. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428–438.CrossRef Shin, D. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428–438.CrossRef
23.
Zurück zum Zitat Shin, D. (2010). Ubiquitous computing acceptance model: End user concern about security, privacy and risk. International Journal of Mobile Communications, 8(2), 169–186.CrossRef Shin, D. (2010). Ubiquitous computing acceptance model: End user concern about security, privacy and risk. International Journal of Mobile Communications, 8(2), 169–186.CrossRef
24.
Zurück zum Zitat Rodrigues, J., De Rezende Segundo, D., Junqueira, H., Sabino, M., Prince, R., Al-Muhtadi, J., de Albuquerque, V. (2018). Enabling technologies for the internet of health things. IEEE Access, 6, 13129–13141.CrossRef Rodrigues, J., De Rezende Segundo, D., Junqueira, H., Sabino, M., Prince, R., Al-Muhtadi, J., de Albuquerque, V. (2018). Enabling technologies for the internet of health things. IEEE Access, 6, 13129–13141.CrossRef
25.
Zurück zum Zitat Ngu, Anne Hee Hiong, Gutierrez, Mario A., Metsis, Vangelis, Nepal, Surya, & Sheng, Quan Z. (2017). IoT middleware: A survey on issues and enabling technologies. IEEE Internet of Things Journal, 4(1), 1–20.CrossRef Ngu, Anne Hee Hiong, Gutierrez, Mario A., Metsis, Vangelis, Nepal, Surya, & Sheng, Quan Z. (2017). IoT middleware: A survey on issues and enabling technologies. IEEE Internet of Things Journal, 4(1), 1–20.CrossRef
26.
Zurück zum Zitat Salahuddin, M., Al-Fuqaha, A., Guizani, M. (2015). Software-defined networking for RSU clouds in support of the internet of vehicles. IEEE Internet of Things Journal, 2(2), 133–144.CrossRef Salahuddin, M., Al-Fuqaha, A., Guizani, M. (2015). Software-defined networking for RSU clouds in support of the internet of vehicles. IEEE Internet of Things Journal, 2(2), 133–144.CrossRef
27.
Zurück zum Zitat Hara, Takahiro, Sigg, Stephan, Shu, Lei, De Pellegrini, Francesco, & Petrioli, Chiara. (2017). Sanjay Kumar Madria: Special section editorial: Emergent topics for mobile and ubiquitous systems in smartphone, IOT, and cloud computing ERA. IEEE Access, 5, 27827–27830.CrossRef Hara, Takahiro, Sigg, Stephan, Shu, Lei, De Pellegrini, Francesco, & Petrioli, Chiara. (2017). Sanjay Kumar Madria: Special section editorial: Emergent topics for mobile and ubiquitous systems in smartphone, IOT, and cloud computing ERA. IEEE Access, 5, 27827–27830.CrossRef
Metadaten
Titel
Breaching the privacy of connected vehicles network
verfasst von
Vladimir Kaplun
Michael Segal
Publikationsdatum
18.01.2019
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 4/2019
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-018-00544-6

Weitere Artikel der Ausgabe 4/2019

Telecommunication Systems 4/2019 Zur Ausgabe

Neuer Inhalt