[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3131944.3133938acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Privacy Risks in Vehicle Grids and Autonomous Cars

Published: 20 October 2017 Publication History

Abstract

Traditionally, the vehicle has been the extension of the manual ambulatory system, docile to the drivers' commands. Recent advances in communications, controls and embedded systems have changed this model, paving the way to the Intelligent Vehicle Grid. The car is now a formidable sensor platform, absorbing information from the environment, from other cars (and from the driver) and feeding it to other cars and infrastructure to assist in safe navigation, pollution control and traffic management. The next step in this evolution is just around the corner: the Internet of Autonomous Vehicles. Like other important instantiations of the Internet of Things (e.g., the smart building, etc), the Internet of Vehicles will not only upload data to the Internet with V2I. It will also use V2V communications, storage, intelligence, and learning capabilities to anticipate the customers' intentions and learn from other peers. V2I and V2V are essential to the autonomous vehicle, but carry the risk of attacks. This paper will address the privacy attacks to which vehicles are exposed when they upload private data to Internet Servers. It will also outline efficient methods to preserve privacy.

References

[1]
Cynthia Dwork. 2006. Differential Privacy Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10--14, 2006, Proceedings, Part II (Lecture Notes in Computer Science), Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.), Vol. Vol. 4052. Springer, 1--12.
[2]
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006 a. Our Data, Ourselves: Privacy Via Distributed Noise Generation EUROCRYPT.
[3]
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006 b. Calibrating Noise to Sensitivity in Private Data Analysis TCC.
[4]
Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407.
[5]
James Alan Fox and Paul E Tracy. 1986. Randomized response: a method for sensitive surveys. Beverly Hills California Sage Publications.
[6]
Mevlut Turker Garip, Peter Reiher, and Mario Gerla. 2016. Ghost: Concealing vehicular botnet communication in the VANET control channel 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, Cyprus, September 5--9, 2016, Mario Gerla, George C. Hadjichristofi, and Mohsen Guizani (Eds.). IEEE, 1--6.
[7]
Bernard G Greenberg, Abdel-Latif A Abul-Ela, Walt R Simmons, and Daniel G Horvitz. 1969. The unrelated question randomized response model: Theoretical framework. J. Amer. Statist. Assoc. Vol. 64, 326 (1969), 520--539.
[8]
Ilias Leontiadis, Gustavo Marfia, David Mack, Giovanni Pau, Cecilia Mascolo, and Mario Gerla. 2011. On the Effectiveness of an Opportunistic Traffic Management System for Vehicular Networks. IEEE Trans. Intelligent Transportation Systems, Vol. 12, 4 (2011), 1537--1548.
[9]
Ajit C. Tamhane. 1981. Randomized Response Techniques for Multiple Sensitive Attributes. J. Amer. Statist. Assoc. Vol. 76, 376 (1981), 916--923.
[10]
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y. Zhao. 2016. Defending against Sybil Devices in Crowdsourced Mapping Services Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016, Singapore, June 26-30, 2016, Rajesh Krishna Balan, Archan Misra, Sharad Agarwal, and Cecilia Mascolo (Eds.). ACM, 179--191.
[11]
Stanley L Warner. 1965. Randomized response: A survey technique for eliminating evasive answer bias. J. Amer. Statist. Assoc. Vol. 60, 309 (1965), 63--69.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CarSys '17: Proceedings of the 2nd ACM International Workshop on Smart, Autonomous, and Connected Vehicular Systems and Services
October 2017
94 pages
ISBN:9781450351461
DOI:10.1145/3131944
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. autonomous vehicles
  2. connected vehicles
  3. internet of vehicles
  4. vehicle privacy

Qualifiers

  • Research-article

Conference

MobiCom '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 8 of 20 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)32
  • Downloads (Last 6 weeks)2
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Measurement‐Based Analysis of Large SystemsDependable Computing10.1002/9781119743453.ch13(667-743)Online publication date: 26-Apr-2024
  • (2022)Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problemsFuture Generation Computer Systems10.1016/j.future.2022.03.036134(187-203)Online publication date: Sep-2022
  • (2022)Automated city shuttlesComputers and Security10.1016/j.cose.2022.102904122:COnline publication date: 1-Nov-2022
  • (2020)Resistance of IoT Sensors against DDoS Attack in Smart Home EnvironmentSensors10.3390/s2018529820:18(5298)Online publication date: 16-Sep-2020
  • (2018)Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN.2018.00066(586-597)Online publication date: Jun-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media