Connected Vehicles: A Privacy Analysis

Just as the world of consumer devices was forever changed by the introduction of computer controlled solutions, the introduction of the engine control unit (ECU) gave rise to the automobile’s transformation from a transportation product to a technology platform. A modern car is capable of processing, analysing and transmitting data in ways that could not have been foreseen only a few years ago. These cars often incorporate telematics systems, which are used to provide navigation and internet connectivity over cellular networks, as well as data-recording devices for insurance and product development purposes. We examine the telematics system of a production vehicle, and aim to ascertain some of the associated privacy-related threats. We also consider how this analysis might underpin further research.

[1]  Jean-Pierre Hubaux,et al.  Privacy is dead, long live privacy , 2016, Commun. ACM.

[2]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[3]  Michael Segal,et al.  Breaching the privacy of connected vehicles network , 2019, Telecommun. Syst..

[4]  Tim Ring,et al.  Connected cars - the next targe tfor hackers , 2015, Netw. Secur..

[5]  Zinaida Benenson,et al.  Android and iOS users' differences concerning security and privacy , 2013, CHI Extended Abstracts.

[6]  Baijian Yang,et al.  Internet of things: Survey on security , 2017, Inf. Secur. J. A Glob. Perspect..

[7]  Minho Kim,et al.  Preserving Location Privacy of Connected Vehicles With Highly Accurate Location Updates , 2017, IEEE Communications Letters.

[8]  Mohd Murtadha Mohamad,et al.  A Survey of Security and Privacy in Connected Vehicles , 2015 .

[9]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[10]  Dorothy J. Glancy Privacy in Autonomous Vehicles , 2012 .

[11]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[12]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[13]  Edward Shih-Tse Wang,et al.  Perceived quality factors of location-based apps on trust, perceived privacy risk, and continuous usage intention , 2017, Behav. Inf. Technol..

[14]  Mario Gerla,et al.  Internet of Vehicles and Autonomous Connected Car - Privacy and Security Issues , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[15]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[16]  L. Jean Camp Respecting people and respecting privacy , 2015, Commun. ACM.

[17]  Klaus McDonald-Maier,et al.  Intelligent intrusion detection in external communication systems for autonomous vehicles , 2018 .

[18]  Frank Leymann,et al.  The Connected Car in the Cloud: A Platform for Prototyping Telematics Services , 2015, IEEE Software.