Abstract
Intelligent Transportation Systems (ITS) demonstrate innovative services for different modes of transport and traffic management. They enable users to be better informed and make safer, coordinated, and smarter use of transport networks. However, for such systems to be effective, security and privacy considerations have to be enforced. GPS data can lead to accurate traffic models, but such data can also be used by malicious advisories to gain knowledge about the whereabouts of users. In this paper, we propose a model and related constructs for users to define sharing policies for the data they contribute. The model allows entities to define data sharing policies associated with personal information captured by an ITS application. While ITS applications need to use specific data under various quality and context-based constraints, the user-oriented security policies could specify additional usage constraints, and our solution is an approach to mediate between these two sides. Secondly, we propose an algorithm to manage the trust level in the data contributed by users. The solution is based on the quality parameters of the information disseminated in the system, e.g. spatial whereabouts and timestamp for the transmitted data regarding various events happening in the system, combined with the reputation specific to the sources that transmit data. We evaluate a pilot security implementation of the model under real-world assumptions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The proposed security model can be applied to various other ITS applications. For example, data sensed by privately-owned devices could further be exchanged by users interested in social-based applications, such as distributed social networks of traffic participants. Another applicability is the participatory sensing paradigm, where citizen campaign can collect traffic-related data, such as noise or pollution levels, to derive accurate models of potential problems within the city.
- 2.
References
Bonne, B., Barzan, A., Quax, P., Lamotte, W., Wifipi: involuntary tracking of visitors at mass events. In: 2013 IEEE 14th International Symposium and Workshops on World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6. IEEE (2013)
Caballero-Gil, P., Caballero-Gil, C., Molina-Gil, J., Hernández-Goya, C.: Flexible authentication in vehicular ad hoc networks. In: 15th Asia-Pacific Conference on Communications, APCC 2009, pp. 576–879. IEEE (2009)
DataWay: Dataway (2015). http://dataway.hpc.pub.ro/
De Cristofaro, E., Soriente, C.: Extended capabilities for a privacy-enhanced participatory sensing infrastructure (pepsi). IEEE Trans. Inf. Forensics Secur. 8(12), 2021–2033 (2013)
Fratila, C., Dobre, C., Pop, F., Cristea, V.: A transportation control system for urban environments. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 117–124. IEEE (2012)
Gerlach, M., Festag, A., Leinmüller, T., Goldacker, G., Harsch, C.: Security architecture for vehicular communication. In: Workshop on Intelligent Transportation (2007)
Haklay, M., Weber, P.: Openstreetmap: user-generated street maps. IEEE Pervasive Comput. 7(4), 12–18 (2008)
Krause, M., Hochstatter, I.: Challenges in modelling and using quality of context (QoC). In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I.S. (eds.) MATA 2005. LNCS, vol. 3744, pp. 324–333. Springer, Heidelberg (2005)
Krontiris, I., Dimitriou, T.: A platform for privacy protection of data requesters and data providers in mobile sensing. Computer Communications (2015)
Li, Q., Cao, G.: Providing privacy-aware incentives for mobile sensing. In: 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 76–84. IEEE (2013)
MobiWay. Mobiway (2014). http://mobiway.hpc.pub.ro/
Mun, M., Hao, S., Mishra, N., Shilton, K., Burke, J., Estrin, D., Hansen, M., Govindan, R.: Personal data vaults: a locus of control for personal data streams. In: Proceedings of the 6th International Conference, p. 17. ACM (2010)
Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Workshop on Hot Topics in Networks (HotNets-IV), pp. 1–6 (2005)
Patrushev, A.: Shortest path search for real road networks and dynamic costs with pgrouting. In: Proceedings of the 2008 Free and Open Source Software for Geospatial Conference (2008)
Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)
Siebel, N.T., Maybank, S.: The advisor visual surveillance system. In: ECCV 2004 Workshop Applications of Computer Vision (ACV), vol. 1. Citeseer (2004)
Stampoulis, A., Chai, Z.: A survey of security in vehicular networks. Project CPSC, 534 (2007)
Wang, N.-W., Huang, Y.-M., Chen, W.-M.: A novel secure communication scheme in vehicular ad hoc networks. Comput. Commun. 31(12), 2827–2837 (2008)
Wang, X., Cheng, W., Mohapatra, P., Abdelzaher, T., Artsense: anonymous reputation and trust in participatory sensing. In: 2013 Proceedings IEEE INFOCOM, pp. 2517–2525. IEEE (2013)
Wang, Y.-K.: Context awareness and adaptation in mobile learning. In: Proceedings of the 2nd IEEE International Workshop on Wireless and Mobile Technologies in Education, pp. 154–158. IEEE (2004)
Yang, D., Fang, X., Xue, G.: Truthful incentive mechanisms for k-anonymity location privacy. In: 2013 Proceedings IEEE INFOCOM, pp. 2994–3002. IEEE (2013)
Acknowledgment
The research in this paper is supported by national projects MobiWay - Mobility beyond Individualism (PN-II-PT-PCCA-2013-4-0321), and DataWay - Real-time Data Processing Platform for Smart Cities: Making sense of Big Data (PN-II-RU-TE-2014-4-2731).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Gosman, C., Cornea, T., Dobre, C., Pop, F., Castiglione, A. (2016). Putting the User in Control of the Intelligent Transportation System. In: Liu, J., Steinfeld, R. (eds) Information Security and Privacy. ACISP 2016. Lecture Notes in Computer Science(), vol 9722. Springer, Cham. https://doi.org/10.1007/978-3-319-40253-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-40253-6_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-40252-9
Online ISBN: 978-3-319-40253-6
eBook Packages: Computer ScienceComputer Science (R0)