Abstract
By enabling vehicles to exchange information with infrastructure and other vehicles, connected vehicles enable new safety applications and services. Because this technology relies on vehicles to broadcast their location in clear text, it also raises location privacy concerns. In this chapter, we discuss the connected-car ecosystem and its underlying privacy threats. We further present the privacy protection approach of short-term identifiers, called pseudonyms, that is currently foreseen for emerging standards in car-to-X communication. To that end, we discuss the pseudonym lifecycle and analyze the trade-off between dependability and privacy requirements. We give examples of other privacy protection approaches for pay-as-you-drive insurance, sharing of trip data, and electric vehicle charging. We conclude the chapter by an outlook on open challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Norbert Bissmeyer et al. “Assessment of Node Trustworthiness in VANETs Using Data Plausibility Checks with Particle Filters”. In: Nov 2012. https://doi.org/10.1109/VNC.2012.6407448
D. Cagara, B. Scheuermann, and A. L. C. Bazzan. “Traffic Optimization on Islands”. In: 2015 IEEE Vehicular Networking Conference (VNC) Dec. 2015, pp. 175–182. https://doi.org/10.1109/VNC.2015.7385574
John Douceur. “The Sybil Attack”. In: Iptps ’01: First International Workshop on Peer-to-Peer Systems Springer, 2002, pp. 251–260.
Marie Douriez et al. “Anonymizing NYC Taxi Data: Does It Matter?” In: Proc. of IEEE Intl. Conf. on Data Science and Advanced Analytics (DSAA ’16) Montreal, Canada, Oct. 2016.
Karim Emara, Wolfgang Woerndl, and Johann Schlichter. “CAPS: Context-Aware Privacy Scheme for VANET Safety Applications”. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks WiSec ’15. New York, NY USA: ACM, 2015, 21:1–21:12. ISBN: 978-1-4503-3623-9. https://doi.org/10.1145/2766498.2766500
Erika McCallister Tim Grance, and Karen Scarfone. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) Special Publication SP 800-122. NIST, 2010. URL: https://doi.org/10.6028/NIST.SP.800-122
ETSI. Intelligent Transport Systems (ITS); Security; ITS Communications Se- curity Architecture and Security Management TS 102 940. 2012.
ETSI. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service EN 302 637–2. 2013.
ETSI. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service EN 302 637–3. 2013.
Marouane Fazouane et al. “Formal Verification of Privacy Properties in Electric Vehicle Charging”. In: Engineering Secure Software and Systems Springer Cham, Mar 4, 2015, pp. 17–33. https://doi.org/10.1007/9783319156187_2
David Förster, Frank Kargl, and Hans Löhr. “A Framework for Evaluating Pseudonym Strategies in Vehicular Ad-Hoc Networks”. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Net- works WiSec ’15. New York, NY USA: ACM, 2015, 19:1–19:6. ISBN: 978-1-4503-3623-9. https://doi.org/10.1145/2766498.2766520
J. Freudiger et al. “Mix-Zones for Location Privacy in Vehicular Networks”. In: Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. To do so, vehicles need to periodically broadcast safety messages providing preciseposition information …2007.
Ryan M. Gerdes et al. “Device Identification via Analog Signal Fingerprint- ing: A Matched Filter Approach.” In: NDSS 2006.
M. Gerlach and F. Guttler “Privacy in VANETs Using Changing Pseudonyms Ideal and Real”. In: Vehicular Technology Conference 2007. VTC2007- Spring. IEEE 65th Apr 2007, pp. 2521–2525. https://doi.org/10.1109/VETECS2007.519
Philippe Golle and Kurt Partridge. “On the Anonymity of Home/Work Loca- tion Pairs”. In: Pervasive Computing Springer Berlin, Heidelberg, May 11, 2009, pp. 390–397. https://doi.org/10.1007/9783642015168_26
Marco Gruteser and Dirk Grunwald. “Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking”. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services MobiSys ’03. New York, NY USA: ACM, 2003, pp. 31–42. https://doi.org/10.1145/1066116.1189037
H. Hartenstein and L. P. Laberteaux. “A Tutorial Survey on Vehicular Ad Hoc Networks”. In: IEEE Communications Magazine 46.6 (June 2008), pp. 164–171. ISSN: 0163-6804. https://doi.org/10.1109/MCOM.2008.4539481
Hannes Hartenstein and Kenneth Laberteaux, eds. VANET Vehicular Applica- tions and Inter-Networking Technologies 1 edition. Chichester U.K: Wiley Feb 15, 2010. 466 pp. ISBN: 978-0-470-74056-9.
Christina Höfer et al. “POPCORN: Privacy-Preserving Charging for Emobility”. In: Proceedings of the 2013 ACM Workshop on Security Privacy & Dependability for Cyber Vehicles CyCAR ’13. New York, NY USA: ACM, 2013, pp. 37–48. ISBN: 978-1-4503-2487-8. https://doi.org/101145/25179682517971
Baik Hoh et al. “Enhancing Security and Privacy in Traffic-Monitoring Systems”. In: IEEE Pervasive Computing 5.4 (Oct. 2006), pp. 38–46. ISSN: 1536-1268. https://doi.org/10.1109/MPRV.2006.69
“IEEE Standard for Wireless Access in Vehicular Environments Security Ser vices for Applications and Management Messages”. In: IEEE Std 1609.2-2016 (2016), pp. 1–289. https://doi.org/10.1109/IEEESTD.2016.7426684
Frank Kargl, Florian Schaub, and Stefan Dietzel. “Mandatory Enforcement of Privacy Policies Using Trusted Computing Principles”. In: Intelligent Information Privacy Management Symposium (Privacy 2010) Stanford University USA: AAAI, Mar 2010.
Frank Kargl et al. “Enforcing Privacy Policies in Cooperative Intelligent Transportation Systems”. In: ACM 15th Annual International Conference on Mobile Computing and Networking (ACM Mobicom 2009) Poster Session Beijing, China, Sept. 2009.
S. Lefevre et al. “Impact of V2X Privacy Strategies on Intersection Collision Avoidance Systems”. In: 2013 IEEE Vehicular Networking Conference Dec. 2013, pp. 71–78. https://doi.org/10.1109/VNC.2013.6737592
Maija Palmer. TomTom Sorry for Selling Driver Data to Police Financial Times. 2011. URL: https://wwwft.com/content/3f80e432719911e09b7a00144feabdc0 (visited on 01/09/2017).
Min Mun et al. “PDVLoc: A Personal Data Vault for Controlled Location Data Sharing”. In: ACM Transactions on Sensor Networks 10.4 (2014).
On the Protection of Natural Persons with Regard to the Processing of Per sonal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation) 2016.
Balaji Palanisamy and Liu Ling. “Attack-Resilient Mix-Zones over Road Networks: Architecture and Algorithms”. In: IEEE Transactions on Mobile Computing 14.3 (2015), pp. 495–508.
Fayola Peters et al. “Balancing Privacy and Utility in Cross-Company De- fect Prediction”. In: IEEE Transactions on Software Engineering 39.8 (2013), pp. 1054–1068.
J. Petit et al. “Pseudonym Schemes in Vehicular Networks: A Survey”. In: IEEE Communications Surveys Tutorials PP.99 (2014), pp. 1–1. ISSN: 1553-877X. https://doi.org/10.1109/COMST.2014.2345420
Jonathan Petit, Michael Feiri, and Frank Kargl. “Revisiting Attacker Model for Smart Vehicles”. In: Sept. 2014. https://doi.org/10.1109/WIVEC.2014.6953258
Jonathan Petit et al. “Connected Vehicles: Surveillance Threat and Mitigation”. In: Black Hat Europe Nov 2015.
Regulation (EU) 2015/758 of the European Parliament and of the Council of 29 April 2015 Concerning Type-Approval Requirements for the Deployment of the eCall in-Vehicle System Based on the 112 Service and Amending Directive 2007/46/EC 2015.
Road Vehicles – Vehicle to Grid Communication Interface ISO 15118. ISO/IEC.
Carsten Rolfes et al. PRESERVE Deliverable 3.2: FOT Trial 2 Results July 31, 2015. URL: https://www.preserve-project.eu/deliverables
SAE. Dedicated Short Range Communications (DSRC) Message Set Dictionary Standard J2735. SAE, 2016.
F Schaub, Zhendong Ma, and F Kargl. “Privacy Requirements in Vehicular Communication Systems”. In: International Conference on Computational Science and Engineering, 2009. CSE ’09 Vol. 3. Aug. 2009, pp. 139–145. https://doi.org/10.1109/CSE.2009.135
E. Schoch, F. Kargl, and M. Weber. “Communication Patterns in VANETs”. In: IEEE Communications Magazine 46.11 (Nov 2008), pp. 119–125. ISSN: 0163-6804. https://doi.org/10.1109/MCOM.2008.4689254
Elmar Schoch et al. “Impact of Pseudonym Changes on Geographic Routing in VANETs”. In: Security and Privacy in Ad-Hoc and Sensor Networks Springer Berlin, Heidelberg, Sept. 20, 2006, pp. 43–57. https://doi.org/101007/11964254_6
C. Troncoso et al. “PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance”. In: IEEE Transactions on Dependable and Secure Computing 8.5 (Sept. 2011), pp. 742–755. ISSN: 1545-5971. https://doi.org/10.1109/TDSC.2010.71
Carmela Troncoso et al. “Pripayd: Privacy Friendly Pay-as-You-Drive Insur ance”. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society WPES ’07. New York, NY USA: ACM, 2007, pp. 99–107. ISBN: 978-1-59593-883-1. https://doi.org/10.1145/1314333.1314353
Björn Wiedersheim et al. “Privacy in InterVehicular Networks: Why Sim- ple Pseudonym Change Is Not Enough”. In: Wireless On-Demand Network Systems and Services (WONS), 2010 Seventh International Conference on IEEE, 2010, pp. 176–183.
Fangfang Zheng and Henk Van Zuylen. “Urban Link Travel Time Estimation Based on Sparse Probe Vehicle Data”. In: Transportation Research Part C: Emerging Technologies 31 (June 2013), pp. 145–157.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Petit, J., Dietzel, S., Kargl, F. (2018). Privacy of Connected Vehicles. In: Gkoulalas-Divanis, A., Bettini, C. (eds) Handbook of Mobile Data Privacy . Springer, Cham. https://doi.org/10.1007/978-3-319-98161-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-98161-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98160-4
Online ISBN: 978-3-319-98161-1
eBook Packages: Computer ScienceComputer Science (R0)