Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2693848.2694244acmconferencesArticle/Chapter ViewAbstractPublication PageswscConference Proceedingsconference-collections
research-article

Privacy assessment in vehicular networks using simulation

Published: 07 December 2014 Publication History

Abstract

Vehicular networks are envisioned to play an important role in the building of intelligent transportation systems. However, the dangers of the wireless transmission of potentially exploitable information such as detailed locations are often overlooked or only inadequately addressed in field operational tests or standardization efforts. One of the main reasons for this is that the concept of privacy is difficult to quantify. While vehicular network algorithms are usually evaluated by means of simulation, it is a non-trivial task to assess the performance of a privacy protection mechanism.
In this paper we discuss the principles, challenges, and necessary steps in terms of privacy assessment in vehicular networks. We identify useful and practical metrics that allow the comparison and evaluation of privacy protection algorithms. We present a systematic literature review that sheds light on the current state of the art and give recommendations for future research directions in the field.

References

[1]
Blackman, S., and R. Popoli. 1999. Design and Analysis of Modern Tracking Systems. Artech House Boston.
[2]
Chen, X., and J. Pang. 2012. "Measuring query privacy in location-based services". In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, 49--60. San Antonio, TX, USA: ACM.
[3]
Deng, M., K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen. 2011. "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements". Requirements Engineering 16 (1): 3--32.
[4]
Díaz, C. 2006. "Anonymity Metrics Revisited". In Anonymous Communication and its Applications, edited by S. Dolev, R. Ostrovsky, and A. Pfitzmann, Number 05411 in Dagstuhl Seminar Proceedings. Dagstuhl, Germany: Internationales Begegnungs- und Forschungszentrum für Informatik.
[5]
Díaz, C., S. Seys, J. Claessens, and B. Preneel. 2003. "Towards Measuring Anonymity". In Privacy Enhancing Technologies, edited by R. Dingledine and P. Syverson, Volume 2482 of Lecture Notes in Computer Science, 54--68. Springer Berlin Heidelberg.
[6]
Dwork, C. 2008. "Differential Privacy: A Survey of Results". In Theory and Applications of Models of Computation, edited by M. Agrawal, D. Du, Z. Duan, and A. Li, Volume 4978 of Lecture Notes in Computer Science, 1--19. Springer Berlin Heidelberg.
[7]
Eckhoff, D., and C. Sommer. 2014. "Driving for Big Data? Privacy Concerns in Vehicular Networking". IEEE Security and Privacy 12 (1): 77--79.
[8]
European Parliament 1995. "Directive 95/46/EC". Official Journal L 281:0031--0050.
[9]
Fellendorf, M., and P. Vortisch. 2010. "Microscopic Traffic Flow Simulator VISSIM". In Fundamentals of Traffic Simulation, edited by J. Barceló, Volume 145 of International Series in Operations Research & Management Science, 63--93. Springer.
[10]
Finn, R. L., D. Wright, and M. Friedewald. 2013. "Seven Types of Privacy". In European Data Protection: Coming of Age, edited by S. Gutwirth, R. Leenes, P. de Hert, and Y. Poullet, 3--32. Springer.
[11]
Fischer, L., S. Katzenbeisser, and C. Eckert. 2008. "Measuring unlinkability revisited". In Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, 105--110. Alexandria, Virginia, USA: ACM.
[12]
Hoh, B., and M. Gruteser. 2005. "Protecting Location Privacy Through Path Confusion". In Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, 194--205.
[13]
Hubaux, J.-P., S. Čapkun, and J. Luo. 2004. "The Security and Privacy of Smart Vehicles". IEEE Security and Privacy 2 (3): 49--55.
[14]
Kitchenham, B. 2004. "Procedures for Performing Systematic Reviews". Technical Report TR/SE-0401, Keele University.
[15]
Krajzewicz, D., G. Hertkorn, C. Rössel, and P. Wagner. 2002. "SUMO (Simulation of Urban MObility); An Open-source Traffic Simulation". In Proceedings of the 4th Middle East Symposium on Simulation and Modelling, 183--187. Sharjah, United Arab Emirates.
[16]
Ma, Z., F. Kargl, and M. Weber. 2010. "Measuring long-term location privacy in vehicular communication systems". Elsevier Computer Communications 33 (12): 1414--1427.
[17]
Merali, Z. 2010. "Computational science: Error -- why scientific programming does not compute". Nature 467 (7317): 775--777.
[18]
Nissenbaum, H. 2004. "Privacy as contextual integrity". Washington Law Review 79 (1): 119--158.
[19]
Pawlikowski, K., H.-D. Jeong, and J.-S. R. Lee. 2002. "On Credibility of Simulation Studies of Telecommunication Networks". IEEE Communications Magazine 40 (1): 132--139.
[20]
Pfitzmann, A., and M. Hansen. 2010. "A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management". v0.34, http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf.
[21]
Serjantov, A., and G. Danezis. 2003. "Towards an Information Theoretic Metric for Anonymity". In Privacy Enhancing Technologies, edited by R. Dingledine and P. Syverson, Volume 2482 of Lecture Notes in Computer Science, 41--53. Springer Berlin Heidelberg.
[22]
Shokri, R., J. Freudiger, and J.-P Hubaux. 2010. "A unified framework for location privacy". In Proceedings of the 3rd Symposium on Hot Topics in Privacy Enhancing Technologies, 203--214. Berlin, Germany.
[23]
Shokri, R., C. Troncoso, C. Díaz, J. Freudiger, and J.-P. Hubaux. 2010. "Unraveling an old cloak: k-anonymity for location privacy". In Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, 115--118. Chicago, Illinois: ACM.
[24]
Sommer, C., D. Eckhoff, and F. Dressler. 2010. "Improving the Accuracy of IVC Simulation using Crowd-sourced Geodata". Praxis der Informationsverarbeitung und Kommunikation 33 (4): 278--283.
[25]
Uppoor, S., and M. Fiore. 2011. "Large-scale Urban Vehicular Mobility for Networking Research". In Proceedings of the 3rd IEEE Vehicular Networking Conference, 62--69. Amsterdam, Netherlands.
[26]
Westin, A. 1967. Privacy and freedom. Atheneum.
[27]
Wiedersheim, B., Z. Ma, F. Kargl, and P. Papadimitratos. 2010. "Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough". In Proceedings of the 7th International Conference on Wireless On-Demand Network Systems and Services, 176--183.
[28]
Zimmer, M. 2005. "Surveillance, Privacy and the Ethics of Vehicle Safety Communication Technologies". Ethics and Information Technology 7 (4): 201--210.

Cited By

View all
  • (2019)A Survey on Agent-based Simulation Using Hardware AcceleratorsACM Computing Surveys10.1145/329104851:6(1-35)Online publication date: 28-Jan-2019
  • (2019)On the Strength of Privacy Metrics for Vehicular CommunicationIEEE Transactions on Mobile Computing10.1109/TMC.2018.283035918:2(390-403)Online publication date: 16-Jul-2019
  • (2018)Technical Privacy MetricsACM Computing Surveys10.1145/316838951:3(1-38)Online publication date: 12-Jun-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WSC '14: Proceedings of the 2014 Winter Simulation Conference
December 2014
4032 pages

Sponsors

Publisher

IEEE Press

Publication History

Published: 07 December 2014

Check for updates

Qualifiers

  • Research-article

Conference

WSC '14
Sponsor:
WSC '14: Winter Simulation Conference
December 7 - 10, 2014
Georgia, Savannah

Acceptance Rates

WSC '14 Paper Acceptance Rate 205 of 320 submissions, 64%;
Overall Acceptance Rate 3,413 of 5,075 submissions, 67%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2019)A Survey on Agent-based Simulation Using Hardware AcceleratorsACM Computing Surveys10.1145/329104851:6(1-35)Online publication date: 28-Jan-2019
  • (2019)On the Strength of Privacy Metrics for Vehicular CommunicationIEEE Transactions on Mobile Computing10.1109/TMC.2018.283035918:2(390-403)Online publication date: 16-Jul-2019
  • (2018)Technical Privacy MetricsACM Computing Surveys10.1145/316838951:3(1-38)Online publication date: 12-Jun-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media