This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Evaluating Trajectory Privacy in Autonomous Vehicular Communications
Technical Paper
2019-01-0487
ISSN: 0148-7191, e-ISSN: 2688-3627
This content contains downloadable datasets
Annotation ability available
Sector:
Language:
English
Abstract
Autonomous vehicles might one day be able to implement privacy preserving driving patterns which humans may find too difficult to implement. In order to measure the difference between location privacy achieved by humans versus location privacy achieved by autonomous vehicles, this paper measures privacy as trajectory anonymity, as opposed to single location privacy or continuous privacy. This paper evaluates how trajectory privacy for randomized driving patterns could be twice as effective for autonomous vehicles using diverted paths compared to Google Map API generated shortest paths. The result shows vehicles mobility patterns could impact trajectory and location privacy. Moreover, the results show that the proposed metric outperforms both K-anonymity and KDT-anonymity.
Recommended Content
Technical Paper | Autonomous Quadcopter for Building Construction Monitoring |
Classroom Training | Overview of the Role of Connected and Autonomous Vehicles in Smart Cities |
Technical Paper | Secure Vehicular Communication Using Blockchain Technology |
Authors
Topic
Citation
Banihani, A., Zaiter, A., Corser, G., Fu, H. et al., "Evaluating Trajectory Privacy in Autonomous Vehicular Communications," SAE Technical Paper 2019-01-0487, 2019, https://doi.org/10.4271/2019-01-0487.Data Sets - Support Documents
Title | Description | Download |
---|---|---|
Unnamed Dataset 1 |
Also In
References
- Shokri , R. , Freudiger , J. , and Hubaux , J.-P. 2010
- Chow , C.-Y. and Mokbel , M.F. Trajectory Privacy in Location-Based Services and Data Publication ACM Sigkdd Explorations Newsletter 13 1 19 29 2011
- Levinson , J. , Askeland J. , Becker J. , Dolson J. et al. Towards Fully Autonomous Driving: Systems and Algorithms Intelligent Vehicles Symposium (IV), 2011 IEEE 2011 163 168
- Xue , A.Y. , Zhang , R. , Zheng , Y. , Xie , X. et al. Destination Prediction by Sub-Trajectory Synthesis and Privacy Protection against Such Prediction Data Engineering (ICDE), 2013 IEEE 29th International Conference on 2013 254 265
- Corser , G.P. , Fu , H. , and Banihani , A. Evaluating Location Privacy in Vehicular Communications and Applications IEEE Transactions on Intelligent Transportation Systems 17 9 2658 2667 2016
- Banihani , A. , Alzahrani , A. , Alharthi , R. , Fu , H. et al. T-PAAD: Trajectory Privacy Attack on Autonomous Driving 2018 IEEE Conference on Communications and Network Security (CNS) 2018 1 2
- Weerasinghe , H. , Fu , H. , and Leng , S. Anonymous Service Access for Vehicular Ad Hoc Networks Information Assurance and Security (IAS), 2010 Sixth International Conference on 2010 173 178
- You , T.-H. , Peng , W.-C. , and Lee , W.-C. Protecting Moving Trajectories with Dummies Mobile Data Management, 2007 International Conference on 2007 278 282
- Mokbel , M.F. , Chow , C.-Y. , and Aref , W.G. The New Casper: Query Processing for Location Services without Compromising Privacy Proceedings of the 32nd International Conference on Very large Data Bases 2006 763 774
- Palanisamy , B. and Liu , L. Mobimix: Protecting Location Privacy with Mix-Zones over Road Networks Data Engineering (ICDE), 2011 IEEE 27th International Conference on 2011 494 505
- Meyerowitz , J. and Choudhury , R.R. Hiding Stars with Fireworks: Location Privacy through Camouflage Proceedings of the 15th Annual International Conference on Mobile Computing and Networking 2009 345 356
- Dadras , S. and Winstead , C. 2017
- Dadras , S. , Gerdes , R.M. , and Sharma , R. Vehicular Platooning in an Adversarial Environment Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security 2015 167 178