Mobile phones as traffic sensors with map matching and privacy considerations

In the recent years, it has become readily more accepted that smart mobile phones with GPS or A-GPS enabled device, or even Cell-ID enabled, among the commuters, can be used as traffic sensor, which complements other traditional sensors. This development is pursued in the efforts of reducing or avoiding traffic jams. Consequently, this paper attempts to find a novel way to map match 2D local map with actual GPS traces from mobile phones. From a number of experiments, it has been found that Virtual Detection Zone method can be used to obtain 100% map matching, as it ensures matching by comparing the GPS data to a set of pre-determined check points (circular VDZ, preferably with a radius of 50–185m). Furthermore, from this study, it is proposed to increase privacy, firstly by using OTP to doubly-lock the sensor's data. Secondly, by ensuring that valid data is only delivered from a significant distance of the user's private locations, and thirdly, by splitting the data to two parts before using OTP.

[1]  ヘイニー,リチャード,ディー. Location sharing and tracking using mobile phones or other wireless devices , 2006 .

[2]  Paulo S. Pagliusi A Contemporary Foreword on GSM Security , 2002, InfraSec.

[3]  Christos Xenakis Security Measures and Weaknesses of the GPRS Security Architecture , 2008, Int. J. Netw. Secur..

[4]  David Bernstein,et al.  Some map matching algorithms for personal navigation assistants , 2000 .

[5]  Peng Hao,et al.  VTL zone-aware path cloaking algorithm , 2011, 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).

[6]  Hui Xiong,et al.  Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking , 2010, IEEE Transactions on Mobile Computing.

[7]  Toshio Fukuda,et al.  Fuzzy learning vector quantization based on particle swarm optimization for artificial odor dicrimination system , 2009 .

[8]  Alexandre M. Bayen,et al.  Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip Lines , 2012, IEEE Transactions on Mobile Computing.

[9]  Siddharth Jain,et al.  Engineering location based pathfinding on Indian road networks over low end mobile phones , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).

[10]  K. Sekiyama,et al.  SELF-ORGANIZING URBAN TRAFFIC CONTROL ARCHITECTURE WITH SWARM-SELF ORGANIZING MAP IN JAKARTA: SIGNAL CONTROL SYSTEM AND SIMULATOR , 2010 .

[11]  Hui Xiong,et al.  Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.

[12]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[13]  James E. Moore,et al.  Use of Los Angeles Freeway Service Patrol Vehicles as Probe Vehicles , 2001 .

[14]  Alexandre M. Bayen,et al.  Evaluation of traffic data obtained via GPS-enabled mobile phones: The Mobile Century field experiment , 2009 .

[15]  Eli Biham,et al.  Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, CRYPTO.

[16]  Ramesh Govindan,et al.  Energy-efficient positioning for smartphones using Cell-ID sequence matching , 2011, MobiSys '11.

[17]  G. Lachapelle,et al.  Phase coherency of CDMA caller location processing based on TCXO frequency reference with intermittent GPS correction , 2005 .

[18]  L. Bharathi Security Enhancement Using Mutual Authentication in Existing CDMA Systems , 2010 .

[19]  Guillaume Leduc,et al.  Road Traffic Data: Collection Methods and Applications , 2008 .

[20]  Sing Yiu Cheung,et al.  Traffic Surveillance by Wireless Sensor Networks: Final Report , 2007 .

[21]  Alexandre M. Bayen,et al.  Virtual trip lines for distributed privacy-preserving traffic monitoring , 2008, MobiSys '08.

[22]  Joongheon Kim,et al.  Energy-efficient rate-adaptive GPS-based positioning for smartphones , 2010, MobiSys '10.

[23]  J. Quirke Security in the GSM system , 2004 .

[24]  D. Mohapatra,et al.  Survey of location based wireless services , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..

[25]  M. Decker,et al.  Location Privacy-An Overview , 2008, 2008 7th International Conference on Mobile Business.

[26]  M. Anwar Ma'sum,et al.  Enhanced adaptive traffic signal control system using camera sensor and embedded system , 2011, 2011 International Symposium on Micro-NanoMechatronics and Human Science.

[27]  Robert B. Noland,et al.  Current map-matching algorithms for transport applications: State-of-the art and future research directions , 2007 .

[28]  Dae Hyun Ryu,et al.  A Security Weakness of the CDMA(Code Division Multiple Access) Cellular Service , 2006 .

[29]  R. Bertini,et al.  Transit Buses as Traffic Probes: Use of Geolocation Data for Empirical Evaluation , 2004 .

[30]  D. Schrank,et al.  2001 Urban Mobility Report , 2001 .

[31]  Washington Y. Ochieng,et al.  Integrity of map-matching algorithms , 2006 .