Breaching the privacy of connected vehicles network

Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e. usage based insurance, entertainment services, navigation etc. The main objective of this work is to show that by analyzing the information about a driver which is provided to the usage based insurance companies, it is possible to get additional private data, even if the basic data in first look, seems not so harmful. In this work, we present an analysis of a novel approach for reconstructing driver’s path from other driving attributes, such as cornering events, average speed and total driving time. We show that, in some cases, it is possible to reconstruct the driver’s path, while not knowing the target point of the trip.

[1]  Vangelis Metsis,et al.  IoT Middleware: A Survey on Issues and Enabling Technologies , 2017, IEEE Internet of Things Journal.

[2]  Erhan Akin,et al.  Estimating driving behavior by a smartphone , 2012, 2012 IEEE Intelligent Vehicles Symposium.

[3]  Xing Xie,et al.  T-drive: driving directions based on taxi trajectories , 2010, GIS '10.

[4]  Isaac Skog,et al.  Detection of Dangerous Cornering in GNSS-Data-Driven Insurance Telematics , 2015, IEEE Transactions on Intelligent Transportation Systems.

[5]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[6]  Mohsen Guizani,et al.  Software-Defined Networking for RSU Clouds in Support of the Internet of Vehicles , 2015, IEEE Internet of Things Journal.

[7]  Xing Xie,et al.  GeoLife2.0: A Location-Based Social Networking Service , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[8]  Qi Li,et al.  Privacy Information Security Classification Study in Internet of Things , 2014, 2014 International Conference on Identification, Information and Knowledge in the Internet of Things.

[9]  Alexandre M. Bayen,et al.  The Path Inference Filter: Model-Based Low-Latency Map Matching of Probe Vehicle Data , 2011, IEEE transactions on intelligent transportation systems (Print).

[10]  Mohan M. Trivedi,et al.  Driving style recognition using a smartphone as a sensor platform , 2011, 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).

[11]  Kato Mivule,et al.  A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Using Machine Learning Classification as a Gauge , 2013, Complex Adaptive Systems.

[12]  Rinku Dewri,et al.  Inferring trip destinations from driving habits data , 2013, WPES.

[13]  Dong-Hee Shin,et al.  Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk , 2010, Int. J. Mob. Commun..

[14]  Chalermpol Saiprasert,et al.  Smartphone Enabled Dangerous Driving Report System , 2013, 2013 46th Hawaii International Conference on System Sciences.

[15]  Dong-Hee Shin,et al.  The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..

[16]  Joel J. P. C. Rodrigues,et al.  Enabling Technologies for the Internet of Health Things , 2018, IEEE Access.

[17]  Vicenç Torra,et al.  Data privacy , 2014, Advanced Research in Data Privacy.

[18]  Benjamin C. M. Fung,et al.  Anonymizing sequential releases , 2006, KDD '06.

[19]  Lior Rokach,et al.  Limiting disclosure of sensitive data in sequential releases of databases , 2012, Inf. Sci..

[20]  Isaac Skog,et al.  Insurance Telematics: Opportunities and Challenges with the Smartphone Solution , 2014, IEEE Intelligent Transportation Systems Magazine.

[21]  Javier E. Meseguer,et al.  DrivingStyles: A smartphone application to assess driver behavior , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[22]  Takahiro Hara,et al.  IEEE Access Special Section Editorial: Emergent Topics for Mobile and Ubiquitous Systems in Smartphone, IOT, and Cloud Computing ERA , 2017, IEEE Access.

[23]  Shridatt Sugrim,et al.  Elastic pathing: your speed is enough to track you , 2013, UbiComp.