Breaching the privacy of connected vehicles network

Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Telecommunication systems 2019-04, Vol.70 (4), p.541-555
Hauptverfasser: Kaplun, Vladimir, Segal, Michael
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 555
container_issue 4
container_start_page 541
container_title Telecommunication systems
container_volume 70
creator Kaplun, Vladimir
Segal, Michael
description Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e. usage based insurance, entertainment services, navigation etc. The main objective of this work is to show that by analyzing the information about a driver which is provided to the usage based insurance companies, it is possible to get additional private data, even if the basic data in first look, seems not so harmful. In this work, we present an analysis of a novel approach for reconstructing driver’s path from other driving attributes, such as cornering events, average speed and total driving time. We show that, in some cases, it is possible to reconstruct the driver’s path, while not knowing the target point of the trip.
doi_str_mv 10.1007/s11235-018-00544-6
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2168403389</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2168403389</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-344981e6ca0ef9df3a57e2c1ff2d677a741b5637226eccedf22e585d6a5a67073</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EEqXwApwicTZ4_ZscoYKCVIkLnC3jrJuUkhQ7Lerb4xIkbpx2pZ1vVjOEXAK7BsbMTQLgQlEGJWVMSUn1EZmAMpxWUsFx3g8nWWp5Ss5SWjF2wKoJEXcRnW_ablkMDRab2O6c3xd9KHzfdegHrIsdNq1fYyo6HL76-H5OToJbJ7z4nVPy-nD_Mnuki-f50-x2Qb2AaqBCyqoE1N4xDFUdhFMGuYcQeK2NcUbCm9LCcK7Re6wD56hKVWunnDbMiCm5Gn03sf_cYhrsqt_GLr-0HHQpmRBllVV8VPnYpxQx2Bziw8W9BWYPKe1Yjs0N2J9yrM6QGKGUxd0S45_1P9Q3mfpmaw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2168403389</pqid></control><display><type>article</type><title>Breaching the privacy of connected vehicles network</title><source>SpringerNature Journals</source><creator>Kaplun, Vladimir ; Segal, Michael</creator><creatorcontrib>Kaplun, Vladimir ; Segal, Michael</creatorcontrib><description>Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e. usage based insurance, entertainment services, navigation etc. The main objective of this work is to show that by analyzing the information about a driver which is provided to the usage based insurance companies, it is possible to get additional private data, even if the basic data in first look, seems not so harmful. In this work, we present an analysis of a novel approach for reconstructing driver’s path from other driving attributes, such as cornering events, average speed and total driving time. We show that, in some cases, it is possible to reconstruct the driver’s path, while not knowing the target point of the trip.</description><identifier>ISSN: 1018-4864</identifier><identifier>EISSN: 1572-9451</identifier><identifier>DOI: 10.1007/s11235-018-00544-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Artificial Intelligence ; Automobiles ; Business and Management ; Computer Communication Networks ; Cornering ; Insurance ; IT in Business ; Probability Theory and Stochastic Processes ; Telecommunications systems ; Vehicles</subject><ispartof>Telecommunication systems, 2019-04, Vol.70 (4), p.541-555</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2019</rights><rights>Telecommunication Systems is a copyright of Springer, (2019). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-344981e6ca0ef9df3a57e2c1ff2d677a741b5637226eccedf22e585d6a5a67073</citedby><cites>FETCH-LOGICAL-c319t-344981e6ca0ef9df3a57e2c1ff2d677a741b5637226eccedf22e585d6a5a67073</cites><orcidid>0000-0001-7606-6522</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11235-018-00544-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11235-018-00544-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>315,782,786,27931,27932,41495,42564,51326</link.rule.ids></links><search><creatorcontrib>Kaplun, Vladimir</creatorcontrib><creatorcontrib>Segal, Michael</creatorcontrib><title>Breaching the privacy of connected vehicles network</title><title>Telecommunication systems</title><addtitle>Telecommun Syst</addtitle><description>Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e. usage based insurance, entertainment services, navigation etc. The main objective of this work is to show that by analyzing the information about a driver which is provided to the usage based insurance companies, it is possible to get additional private data, even if the basic data in first look, seems not so harmful. In this work, we present an analysis of a novel approach for reconstructing driver’s path from other driving attributes, such as cornering events, average speed and total driving time. We show that, in some cases, it is possible to reconstruct the driver’s path, while not knowing the target point of the trip.</description><subject>Artificial Intelligence</subject><subject>Automobiles</subject><subject>Business and Management</subject><subject>Computer Communication Networks</subject><subject>Cornering</subject><subject>Insurance</subject><subject>IT in Business</subject><subject>Probability Theory and Stochastic Processes</subject><subject>Telecommunications systems</subject><subject>Vehicles</subject><issn>1018-4864</issn><issn>1572-9451</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kM1OwzAQhC0EEqXwApwicTZ4_ZscoYKCVIkLnC3jrJuUkhQ7Lerb4xIkbpx2pZ1vVjOEXAK7BsbMTQLgQlEGJWVMSUn1EZmAMpxWUsFx3g8nWWp5Ss5SWjF2wKoJEXcRnW_ablkMDRab2O6c3xd9KHzfdegHrIsdNq1fYyo6HL76-H5OToJbJ7z4nVPy-nD_Mnuki-f50-x2Qb2AaqBCyqoE1N4xDFUdhFMGuYcQeK2NcUbCm9LCcK7Re6wD56hKVWunnDbMiCm5Gn03sf_cYhrsqt_GLr-0HHQpmRBllVV8VPnYpxQx2Bziw8W9BWYPKe1Yjs0N2J9yrM6QGKGUxd0S45_1P9Q3mfpmaw</recordid><startdate>20190401</startdate><enddate>20190401</enddate><creator>Kaplun, Vladimir</creator><creator>Segal, Michael</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-7606-6522</orcidid></search><sort><creationdate>20190401</creationdate><title>Breaching the privacy of connected vehicles network</title><author>Kaplun, Vladimir ; Segal, Michael</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-344981e6ca0ef9df3a57e2c1ff2d677a741b5637226eccedf22e585d6a5a67073</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Artificial Intelligence</topic><topic>Automobiles</topic><topic>Business and Management</topic><topic>Computer Communication Networks</topic><topic>Cornering</topic><topic>Insurance</topic><topic>IT in Business</topic><topic>Probability Theory and Stochastic Processes</topic><topic>Telecommunications systems</topic><topic>Vehicles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kaplun, Vladimir</creatorcontrib><creatorcontrib>Segal, Michael</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database (ProQuest)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Telecommunication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kaplun, Vladimir</au><au>Segal, Michael</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Breaching the privacy of connected vehicles network</atitle><jtitle>Telecommunication systems</jtitle><stitle>Telecommun Syst</stitle><date>2019-04-01</date><risdate>2019</risdate><volume>70</volume><issue>4</issue><spage>541</spage><epage>555</epage><pages>541-555</pages><issn>1018-4864</issn><eissn>1572-9451</eissn><abstract>Connected vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e. usage based insurance, entertainment services, navigation etc. The main objective of this work is to show that by analyzing the information about a driver which is provided to the usage based insurance companies, it is possible to get additional private data, even if the basic data in first look, seems not so harmful. In this work, we present an analysis of a novel approach for reconstructing driver’s path from other driving attributes, such as cornering events, average speed and total driving time. We show that, in some cases, it is possible to reconstruct the driver’s path, while not knowing the target point of the trip.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11235-018-00544-6</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0001-7606-6522</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1018-4864
ispartof Telecommunication systems, 2019-04, Vol.70 (4), p.541-555
issn 1018-4864
1572-9451
language eng
recordid cdi_proquest_journals_2168403389
source SpringerNature Journals
subjects Artificial Intelligence
Automobiles
Business and Management
Computer Communication Networks
Cornering
Insurance
IT in Business
Probability Theory and Stochastic Processes
Telecommunications systems
Vehicles
title Breaching the privacy of connected vehicles network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-05T13%3A11%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Breaching%20the%20privacy%20of%20connected%20vehicles%20network&rft.jtitle=Telecommunication%20systems&rft.au=Kaplun,%20Vladimir&rft.date=2019-04-01&rft.volume=70&rft.issue=4&rft.spage=541&rft.epage=555&rft.pages=541-555&rft.issn=1018-4864&rft.eissn=1572-9451&rft_id=info:doi/10.1007/s11235-018-00544-6&rft_dat=%3Cproquest_cross%3E2168403389%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2168403389&rft_id=info:pmid/&rfr_iscdi=true