Privacy-Preserving Transportation Traffic Measurement in Intelligent Cyber-physical Road Systems

Traffic measurement is a critical function in transportation engineering. We consider privacy-preserving point-to-point traffic measurement in this paper. We measure the number of vehicles traveling from one geographical location to another by taking advantage of capabilities provided by the intelligent cyberphysical road systems (CPRSs) that enable automatic collection of traffic data. The challenge is to allow the collection of aggregate point-to-point data while preserving the privacy of individual vehicles. We propose a novel measurement scheme, which utilizes bit arrays to collect “masked” data and adopts maximum-likelihood estimation (MLE) to obtain the measurement result. Both mathematical proof and simulation demonstrate the practicality and scalability of our scheme.

[1]  A. Boyd The United States department of transportation , 1968 .

[2]  Larry J. LeBlanc,et al.  AN EFFICIENT APPROACH TO SOLVING THE ROAD NETWORK EQUILIBRIUM TRAFFIC ASSIGNMENT PROBLEM. IN: THE AUTOMOBILE , 1975 .

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Adi Shamir,et al.  On the generation of cryptographically strong pseudorandom sequences , 1981, TOCS.

[5]  W. Newey,et al.  Large sample estimation and hypothesis testing , 1986 .

[6]  Josh Benaloh,et al.  One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.

[7]  W. Bryc The Normal Distribution: Characterizations with Applications , 1995 .

[8]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Michael C. Ferris,et al.  Engineering and Economic Applications of Complementarity Problems , 1997, SIAM Rev..

[11]  T. Kuczek,et al.  Annual Average Daily Traffic Prediction Model for County Roads , 1998 .

[12]  William H. K. Lam,et al.  ESTIMATION OF AADT FROM SHORT PERIOD COUNTS IN HONG KONG - A COMPARISON BETWEEN NEURAL NETWORK METHOD AND REGRESSION ANALYSIS , 2000 .

[13]  Albert G. Greenberg,et al.  Fast accurate computation of large-scale IP traffic matrices from link loads , 2003, SIGMETRICS '03.

[14]  Gerry Leversha Statistical inference (2nd edn), by Paul H. Garthwaite, Ian T. Jolliffe and Byron Jones. Pp.328. £40 (hbk). 2002. ISBN 0 19 857226 3 (Oxford University Press). , 2003, The Mathematical Gazette.

[15]  Carsten Lund,et al.  An information-theoretic approach to traffic matrix estimation , 2003, SIGCOMM '03.

[16]  Haijun Huang,et al.  Mathematical and Economic Theory of Road Pricing , 2005 .

[17]  J. Eom,et al.  Improving the Prediction of Annual Average Daily Traffic for Nonfreeway Facilities by Applying a Spatial Statistical Method , 2006 .

[18]  Jin Cao,et al.  A Quasi-Likelihood Approach for Accurate Traffic Matrix Estimation in a High Speed Network , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[19]  Shigang Chen,et al.  Real-Time Detection of Invisible Spreaders , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[20]  Hari Balakrishnan,et al.  Cabernet: vehicular content delivery using WiFi , 2008, MobiCom '08.

[21]  L. Zhang,et al.  A novel scheme for protecting receiver's location privacy in wireless sensor networks , 2008, IEEE Transactions on Wireless Communications.

[22]  Lee D. Han,et al.  AADT prediction using support vector regression with data-dependent parameters , 2009, Expert Syst. Appl..

[23]  Ming Zhang,et al.  Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks , 2009, 2009 17th IEEE International Conference on Network Protocols.

[24]  Jih-Kwon Peir,et al.  Fit a Spread Estimator in Small Memory , 2009, IEEE INFOCOM 2009.

[25]  Yasser L. Morgan,et al.  Notes on DSRC & WAVE Standards Suite: Its Architecture, Design, and Characteristics , 2010, IEEE Communications Surveys & Tutorials.

[26]  Yuguang Fang,et al.  An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[27]  Mario Gerla,et al.  FleaNet: A Virtual Market Place on Vehicular Networks , 2010, IEEE Trans. Veh. Technol..

[28]  Michael Weber,et al.  Measuring long-term location privacy in vehicular communication systems , 2010, Comput. Commun..

[29]  Ming Zhang,et al.  MAC-layer Time Fairness across Multiple Wireless LANs , 2010, 2010 Proceedings IEEE INFOCOM.

[30]  Yafeng Yin,et al.  A decomposition scheme for estimating dynamic origin–destination flows on actuation-controlled signalized arterials , 2010 .

[31]  Yuanlu Bao,et al.  Efficient local AADT estimation via SCAD variable selection based on regression models , 2011, 2011 Chinese Control and Decision Conference (CCDC).

[32]  Jih-Kwon Peir,et al.  Fit a Compact Spread Estimator in Small High-Speed Memory , 2011, IEEE/ACM Transactions on Networking.

[33]  Ming Zhang,et al.  Achieving MAC-Layer Fairness in CSMA/CA Networks , 2011, IEEE/ACM Transactions on Networking.

[34]  Miao Pan,et al.  Cooperative Communication Aware Link Scheduling for Cognitive Vehicular Ad-hoc Networks , 2011 .

[35]  Shigang Chen,et al.  A dynamic Proof of Retrievability (PoR) scheme with O(logn) complexity , 2012, 2012 IEEE International Conference on Communications (ICC).

[36]  Shigang Chen,et al.  Per-Flow Traffic Measurement Through Randomized Counter Sharing , 2012, IEEE/ACM Trans. Netw..

[37]  Miao Pan,et al.  Cooperative Communication Aware Link Scheduling for Cognitive Vehicular Networks , 2012, IEEE Journal on Selected Areas in Communications.

[38]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[39]  Shigang Chen,et al.  Privacy-preserving RFID authentication based on cryptographical encoding , 2012, 2012 Proceedings IEEE INFOCOM.

[40]  Shigang Chen,et al.  Origin-destination flow measurement in high-speed networks , 2012, 2012 Proceedings IEEE INFOCOM.

[41]  Liang Zhang,et al.  End-to-end maxmin fairness in multihop wireless networks: Theory and protocol , 2012, J. Parallel Distributed Comput..

[42]  Shigang Chen,et al.  Traffic Measurement on the Internet , 2012, SpringerBriefs in Computer Science.

[43]  Zhou,et al.  An Efficient Dynamic Proof of Retrievability Scheme , 2013 .

[44]  Yafeng Yin,et al.  Privacy preserving origin-destination flow measurement in vehicular cyber-physical systems , 2013, 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA).

[45]  Ming Zhang,et al.  Spreader Classification Based on Optimal Dynamic Bit Sharing , 2013, IEEE/ACM Transactions on Networking.

[46]  Tobias Jeske Floating Car Data from Smartphones : What Google and Waze Know About You and How Hackers Can Control Traffic , 2013 .

[47]  Xuemin Shen,et al.  Vehicles Meet Infrastructure: Toward Capacity–Cost Tradeoffs for Vehicular Access Networks , 2013, IEEE Transactions on Intelligent Transportation Systems.

[48]  Yafeng Yin,et al.  Privacy-Preserving Point-to-Point Transportation Traffic Measurement through Bit Array Masking in Intelligent Cyber-physical Road Systems , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[49]  Ioannis Tsapakis,et al.  A Bayesian analysis of the effect of estimating annual average daily traffic for heavy-duty trucks using training and validation data-sets , 2013 .

[50]  Min Chen,et al.  Pandaka: A lightweight cipher for RFID systems , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[51]  Shigang Chen,et al.  On Deletion of Outsourced Data in Cloud Computing , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[52]  Shigang Chen,et al.  Two-Party Fine-Grained Assured Deletion of Outsourced Data in Cloud Systems , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.

[53]  Cheng-Zhong Xu,et al.  Enabling Non-repudiable Data Possession Verification in Cloud Storage Systems , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[54]  Yanmin Zhu,et al.  Vehicular Ad Hoc Networks and Trajectory-Based Routing , 2014, AdHocNets 2014.

[55]  Xuemin Shen,et al.  Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.

[56]  Stephen H. Putman Integrated Urban Models Volume 2: New Research and Applications of Optimization and Dynamics (Routledge Revivals) , 2014 .

[57]  Robert L. Wolpert,et al.  Statistical Inference , 2019, Encyclopedia of Social Network Analysis and Mining.

[58]  Shigang Chen,et al.  Estimating the Persistent Spreads in High-Speed Networks , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[59]  Min Chen,et al.  Temporally or Spatially Dispersed Joint RFID Estimation Using Snapshots of Variable Lengths , 2015, MobiHoc.

[60]  Min Chen,et al.  Privacy-Preserving Multi-Point Traffic Volume Measurement Through Vehicle-to-Infrastructure Communications , 2015, IEEE Transactions on Vehicular Technology.

[61]  S. Supriya,et al.  EFFICIENT PRIVACY PRESERVING AUTHENTICATION FOR VEHICULAR AD-HOC NETWORKS , 2015 .

[62]  Rong Du,et al.  Effective Urban Traffic Monitoring by Vehicular Sensor Networks , 2015, IEEE Transactions on Vehicular Technology.

[63]  Min Chen,et al.  Hyper-Compact Virtual Estimators for Big Network Data Based on Register Sharing , 2015, SIGMETRICS.

[64]  Frank Kargl,et al.  Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[65]  Shigang Chen,et al.  Point-to-Point Traffic Volume Measurement through Variable-Length Bit Array Masking in Vehicular Cyber-Physical Systems , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.