Enhancing Security and Privacy in Traffic-Monitoring Systems

Intelligent transportation systems increasingly depend on probe vehicles to monitor traffic: they can automatically report position, travel time, traffic incidents, and road surface problems to a telematics service provider. This kind of traffic-monitoring system could provide good coverage and timely information on many more roadways than is possible with a fixed infrastructure such as cameras and loop detectors. This approach also promises significant reductions in infrastructure cost because the system can exploit the sensing, computing, and communications devices already installed in many modern vehicles. This architecture separates data from identities by splitting communication from data analysis. Data suppression techniques can help prevent data mining algorithms from reconstructing private information from anonymous database samples

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  B D Greenshields,et al.  A study of traffic capacity , 1935 .

[3]  Vijayalakshmi Atluri,et al.  Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets , 2004, SAC '04.

[4]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[5]  Martin A. Ferman,et al.  A simulation evaluation of a real-time traffic information system using probe vehicles , 2003, Proceedings of the 2003 IEEE International Conference on Intelligent Transportation Systems.

[6]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[7]  Anil K. Jain,et al.  Algorithms for Clustering Data , 1988 .

[8]  Randall Cayford,et al.  OPERATIONAL PARAMETERS AFFECTING THE USE OF ANONYMOUS CELL PHONE TRACKING FOR GENERATING TRAFFIC INFORMATION , 2003 .

[9]  Marco Gruteser,et al.  On the Anonymity of Periodic Location Samples , 2005, SPC.

[10]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[11]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[12]  Domenico Beneventano,et al.  Consistency Checking in Complex Object Database Schemata with Integrity Constraints , 1995, DBPL.

[13]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[14]  Tetsuhiro Ishizaka,et al.  EVALUATION OF PROBE VEHICLE SYSTEM BY USING MICRO SIMULATION MODEL AND COST ANALYSIS , 2005 .

[15]  Marco Gruteser,et al.  Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.

[16]  Thad Starner,et al.  Using GPS to learn significant locations and predict movement across multiple users , 2003, Personal and Ubiquitous Computing.