[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Realistic Driving Trips For Location Privacy

  • Conference paper
Pervasive Computing (Pervasive 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5538))

Included in the following conference series:

Abstract

Simulated, false location reports can be an effective way to confuse a privacy attacker. When a mobile user must transmit his or her location to a central server, these location reports can be accompanied by false reports that, ideally, cannot be distinguished from the true one. The realism of the false reports is important, because otherwise an attacker could filter out all but the real data. Using our database of GPS tracks from over 250 volunteer drivers, we developed probabilistic models of driving behavior and applied the models to create realistic driving trips. The simulations model realistic start and end points, slightly non-optimal routes, realistic driving speeds, and spatially varying GPS noise.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) Pervasive 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Duckham, M., Kulik, L., Birtley, A.: A Spatiotemporal Model of Strategies and Counter Strategies for Location Privacy Protection. In: Raubal, M., Miller, H.J., Frank, A.U., Goodchild, M.F. (eds.) GIScience 2006. LNCS, vol. 4197, pp. 47–64. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: First ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), pp. 31–42. ACM Press, San Francisco (2003)

    Chapter  Google Scholar 

  4. Gruteser, M., Hoh, B.: On the Anonymity of Periodic Location Samples. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 179–192. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Harri, J., Filali, F., Bonnet, C.: Mobility Models for Vehicular Ad Hoc Networks: A Survey and Taxonomy, Institut Eurecom, Department of Mobile Communications: Sophia-Antipolis, FRANCE (2007)

    Google Scholar 

  6. Hoh, B., et al.: Enhancing Security and Privacy in Traffic-Monitoring Systems. In: IEEE Pervasive Computing Magazine, pp. 38–46. IEEE, Los Alamitos (2006)

    Google Scholar 

  7. http://landcover.usgs.gov/ftpdownload.asp

  8. Hu, P.S., Reuscher, T.R.: Summary of Travel Trends, National Household Travel Survey, U. S. Department of Transportation, U.S. Federal Highway Administration. p. 135 (2001)

    Google Scholar 

  9. Kido, H., Yanagisawa, Y., Satoh, T.: An Anonymous Communication Technique Using Dummies For Location-based Services. In: IEEE International Conference on Pervasive Services 2005 (ICPS 2005), Santorini, Greece, pp. 88–97 (2005)

    Google Scholar 

  10. Krumm, J.: Inference Attacks on Location Tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Krumm, J., Letchner, J., Horvitz, E.: Map Matching with Travel Time Constraints. In: Society of Automotive Engineers (SAE) 2007 World Congress, Detroit, MI USA (2007)

    Google Scholar 

  12. Letchner, J., Krumm, J., Horvitz, E.: Trip Router with Individualized Preferences (TRIP): Incorporating Personalization into Route Planning. In: Eighteenth Conference on Innovative Applications of Artificial Intelligence (IAAI 2006), Boston, Massachusetts USA (2006)

    Google Scholar 

  13. Rish, I.: An Empirical Study of the Naive Bayes Classifier. In: IJCAI 2001 Workshop on Empirical Methods in AI (2001)

    Google Scholar 

  14. Rousseeuw, P.J., Croux, C.: Alternatives to the Median Absolute Deviation. Journal of the Americal Statistical Association 88(424), 1273–1283 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  15. Steffen, M.: A Simple Method for Monotonic Interpolation in One Dimension. Astronomy and Astrophysics 239(II), 443–450 (1990)

    Google Scholar 

  16. van Diggelen, F.: GNSS Accuracy: Lies, Damn Lies, and Statistics. In: GPS World (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Krumm, J. (2009). Realistic Driving Trips For Location Privacy. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds) Pervasive Computing. Pervasive 2009. Lecture Notes in Computer Science, vol 5538. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01516-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01516-8_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01515-1

  • Online ISBN: 978-3-642-01516-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics