Breaching the privacy of connected vehicles network
Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, the...
Gespeichert in:
Veröffentlicht in: | Telecommunication systems 2019-04, Vol.70 (4), p.541-555 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 555 |
---|---|
container_issue | 4 |
container_start_page | 541 |
container_title | Telecommunication systems |
container_volume | 70 |
creator | Kaplun, Vladimir Segal, Michael |
description | Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e. usage based insurance, entertainment services, navigation etc. The main objective of this work is to show that by analyzing the information about a driver which is provided to the usage based insurance companies, it is possible to get additional private data, even if the basic data in first look, seems not so harmful. In this work, we present an analysis of a novel approach for reconstructing driver’s path from other driving attributes, such as cornering events, average speed and total driving time. We show that, in some cases, it is possible to reconstruct the driver’s path, while not knowing the target point of the trip. |
doi_str_mv | 10.1007/s11235-018-00544-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2168403389</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2168403389</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-344981e6ca0ef9df3a57e2c1ff2d677a741b5637226eccedf22e585d6a5a67073</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EEqXwApwicTZ4_ZscoYKCVIkLnC3jrJuUkhQ7Lerb4xIkbpx2pZ1vVjOEXAK7BsbMTQLgQlEGJWVMSUn1EZmAMpxWUsFx3g8nWWp5Ss5SWjF2wKoJEXcRnW_ablkMDRab2O6c3xd9KHzfdegHrIsdNq1fYyo6HL76-H5OToJbJ7z4nVPy-nD_Mnuki-f50-x2Qb2AaqBCyqoE1N4xDFUdhFMGuYcQeK2NcUbCm9LCcK7Re6wD56hKVWunnDbMiCm5Gn03sf_cYhrsqt_GLr-0HHQpmRBllVV8VPnYpxQx2Bziw8W9BWYPKe1Yjs0N2J9yrM6QGKGUxd0S45_1P9Q3mfpmaw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2168403389</pqid></control><display><type>article</type><title>Breaching the privacy of connected vehicles network</title><source>SpringerNature Journals</source><creator>Kaplun, Vladimir ; Segal, Michael</creator><creatorcontrib>Kaplun, Vladimir ; Segal, Michael</creatorcontrib><description>Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e. usage based insurance, entertainment services, navigation etc. The main objective of this work is to show that by analyzing the information about a driver which is provided to the usage based insurance companies, it is possible to get additional private data, even if the basic data in first look, seems not so harmful. In this work, we present an analysis of a novel approach for reconstructing driver’s path from other driving attributes, such as cornering events, average speed and total driving time. We show that, in some cases, it is possible to reconstruct the driver’s path, while not knowing the target point of the trip.</description><identifier>ISSN: 1018-4864</identifier><identifier>EISSN: 1572-9451</identifier><identifier>DOI: 10.1007/s11235-018-00544-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Artificial Intelligence ; Automobiles ; Business and Management ; Computer Communication Networks ; Cornering ; Insurance ; IT in Business ; Probability Theory and Stochastic Processes ; Telecommunications systems ; Vehicles</subject><ispartof>Telecommunication systems, 2019-04, Vol.70 (4), p.541-555</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2019</rights><rights>Telecommunication Systems is a copyright of Springer, (2019). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-344981e6ca0ef9df3a57e2c1ff2d677a741b5637226eccedf22e585d6a5a67073</citedby><cites>FETCH-LOGICAL-c319t-344981e6ca0ef9df3a57e2c1ff2d677a741b5637226eccedf22e585d6a5a67073</cites><orcidid>0000-0001-7606-6522</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11235-018-00544-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11235-018-00544-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>315,782,786,27931,27932,41495,42564,51326</link.rule.ids></links><search><creatorcontrib>Kaplun, Vladimir</creatorcontrib><creatorcontrib>Segal, Michael</creatorcontrib><title>Breaching the privacy of connected vehicles network</title><title>Telecommunication systems</title><addtitle>Telecommun Syst</addtitle><description>Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e. usage based insurance, entertainment services, navigation etc. The main objective of this work is to show that by analyzing the information about a driver which is provided to the usage based insurance companies, it is possible to get additional private data, even if the basic data in first look, seems not so harmful. In this work, we present an analysis of a novel approach for reconstructing driver’s path from other driving attributes, such as cornering events, average speed and total driving time. We show that, in some cases, it is possible to reconstruct the driver’s path, while not knowing the target point of the trip.</description><subject>Artificial Intelligence</subject><subject>Automobiles</subject><subject>Business and Management</subject><subject>Computer Communication Networks</subject><subject>Cornering</subject><subject>Insurance</subject><subject>IT in Business</subject><subject>Probability Theory and Stochastic Processes</subject><subject>Telecommunications systems</subject><subject>Vehicles</subject><issn>1018-4864</issn><issn>1572-9451</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kM1OwzAQhC0EEqXwApwicTZ4_ZscoYKCVIkLnC3jrJuUkhQ7Lerb4xIkbpx2pZ1vVjOEXAK7BsbMTQLgQlEGJWVMSUn1EZmAMpxWUsFx3g8nWWp5Ss5SWjF2wKoJEXcRnW_ablkMDRab2O6c3xd9KHzfdegHrIsdNq1fYyo6HL76-H5OToJbJ7z4nVPy-nD_Mnuki-f50-x2Qb2AaqBCyqoE1N4xDFUdhFMGuYcQeK2NcUbCm9LCcK7Re6wD56hKVWunnDbMiCm5Gn03sf_cYhrsqt_GLr-0HHQpmRBllVV8VPnYpxQx2Bziw8W9BWYPKe1Yjs0N2J9yrM6QGKGUxd0S45_1P9Q3mfpmaw</recordid><startdate>20190401</startdate><enddate>20190401</enddate><creator>Kaplun, Vladimir</creator><creator>Segal, Michael</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-7606-6522</orcidid></search><sort><creationdate>20190401</creationdate><title>Breaching the privacy of connected vehicles network</title><author>Kaplun, Vladimir ; Segal, Michael</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-344981e6ca0ef9df3a57e2c1ff2d677a741b5637226eccedf22e585d6a5a67073</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Artificial Intelligence</topic><topic>Automobiles</topic><topic>Business and Management</topic><topic>Computer Communication Networks</topic><topic>Cornering</topic><topic>Insurance</topic><topic>IT in Business</topic><topic>Probability Theory and Stochastic Processes</topic><topic>Telecommunications systems</topic><topic>Vehicles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kaplun, Vladimir</creatorcontrib><creatorcontrib>Segal, Michael</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database (ProQuest)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Telecommunication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kaplun, Vladimir</au><au>Segal, Michael</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Breaching the privacy of connected vehicles network</atitle><jtitle>Telecommunication systems</jtitle><stitle>Telecommun Syst</stitle><date>2019-04-01</date><risdate>2019</risdate><volume>70</volume><issue>4</issue><spage>541</spage><epage>555</epage><pages>541-555</pages><issn>1018-4864</issn><eissn>1572-9451</eissn><abstract>Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e. usage based insurance, entertainment services, navigation etc. The main objective of this work is to show that by analyzing the information about a driver which is provided to the usage based insurance companies, it is possible to get additional private data, even if the basic data in first look, seems not so harmful. In this work, we present an analysis of a novel approach for reconstructing driver’s path from other driving attributes, such as cornering events, average speed and total driving time. We show that, in some cases, it is possible to reconstruct the driver’s path, while not knowing the target point of the trip.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11235-018-00544-6</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0001-7606-6522</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1018-4864 |
ispartof | Telecommunication systems, 2019-04, Vol.70 (4), p.541-555 |
issn | 1018-4864 1572-9451 |
language | eng |
recordid | cdi_proquest_journals_2168403389 |
source | SpringerNature Journals |
subjects | Artificial Intelligence Automobiles Business and Management Computer Communication Networks Cornering Insurance IT in Business Probability Theory and Stochastic Processes Telecommunications systems Vehicles |
title | Breaching the privacy of connected vehicles network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-05T13%3A11%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Breaching%20the%20privacy%20of%20connected%20vehicles%20network&rft.jtitle=Telecommunication%20systems&rft.au=Kaplun,%20Vladimir&rft.date=2019-04-01&rft.volume=70&rft.issue=4&rft.spage=541&rft.epage=555&rft.pages=541-555&rft.issn=1018-4864&rft.eissn=1572-9451&rft_id=info:doi/10.1007/s11235-018-00544-6&rft_dat=%3Cproquest_cross%3E2168403389%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2168403389&rft_id=info:pmid/&rfr_iscdi=true |