Putting the User in Control of the Intelligent Transportation System

Intelligent Transportation Systems ITS demonstrate innovative services for different modes of transport and traffic management. They enable users to be better informed and make safer, coordinated, and smarter use of transport networks. However, for such systems to be effective, security and privacy considerations have to be enforced. GPS data can lead to accurate traffic models, but such data can also be used by malicious advisories to gain knowledge about the whereabouts of users. In this paper, we propose a model and related constructs for users to define sharing policies for the data they contribute. The model allows entities to define data sharing policies associated with personal information captured by an ITS application. While ITS applications need to use specific data under various quality and context-based constraints, the user-oriented security policies could specify additional usage constraints, and our solution is an approach to mediate between these two sides. Secondly, we propose an algorithm to manage the trust level in the data contributed by users. The solution is based on the quality parameters of the information disseminated in the system, e.g. spatial whereabouts and timestamp for the transmitted data regarding various events happening in the system, combined with the reputation specific to the sources that transmit data. We evaluate a pilot security implementation of the model under real-world assumptions.

[1]  Michael Krause,et al.  Challenges in Modelling and Using Quality of Context (QoC) , 2005, MATA.

[2]  Stephen J. Maybank,et al.  The ADVISOR Visual Surveillance System , 2004 .

[3]  Deborah Estrin,et al.  Personal data vaults: a locus of control for personal data streams , 2010, CoNEXT.

[4]  Claudio Soriente,et al.  Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI) , 2013, IEEE Transactions on Information Forensics and Security.

[5]  A. Festag,et al.  Security Architecture for Vehicular Communication , 2007 .

[6]  Yuan-Kai Wang,et al.  Context awareness and adaptation in mobile learning , 2004, The 2nd IEEE International Workshop on Wireless and Mobile Technologies in Education, 2004. Proceedings..

[7]  Candelaria Hernández-Goya,et al.  Flexible authentication in vehicular ad hoc networks , 2009, 2009 15th Asia-Pacific Conference on Communications.

[8]  Wei Cheng,et al.  ARTSense: Anonymous reputation and trust in participatory sensing , 2013, 2013 Proceedings IEEE INFOCOM.

[9]  Ciprian Dobre,et al.  A Transportation Control System for Urban Environments , 2012, 2012 Third International Conference on Emerging Intelligent Data and Web Technologies.

[10]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[11]  Qinghua Li,et al.  Providing privacy-aware incentives for mobile sensing , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[12]  Patrick Weber,et al.  OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.

[13]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[14]  Tassos Dimitriou,et al.  A platform for privacy protection of data requesters and data providers in mobile sensing , 2015, Comput. Commun..

[15]  Xi Fang,et al.  Truthful incentive mechanisms for k-anonymity location privacy , 2013, 2013 Proceedings IEEE INFOCOM.

[16]  Wim Lamotte,et al.  WiFiPi: Involuntary tracking of visitors at mass events , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[17]  Yueh-Min Huang,et al.  A novel secure communication scheme in vehicular ad hoc networks , 2008, Comput. Commun..

[18]  S. J Maybank,et al.  Special Issue on Visual Surveillance , 2004 .