Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2897937.2898071acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article
Public Access

Privacy preserving localization for smart automotive systems

Published: 05 June 2016 Publication History

Abstract

This paper presents the first provably secure localization method for smart automotive systems. Using this method, a lost car can compute its location with assistance from three nearby cars while the locations of all the participating cars including the lost car remain private. This localization application is one of the very first location-based services that does not sacrifice accuracy to maintain privacy. The secure location is computed using a protocol utilizing Yao's Garbled Circuit (GC) that allows two parties to jointly compute a function on their private inputs. We design and optimize GC netlists of the functions required for computation of location by leveraging conventional logic synthesis tools. Proof-of-concept implementation of the protocol shows that the complete operation can be performed within only 550 ms. The fast computing time enables practical localization of moving cars.

References

[1]
J. Hubaux, S. Capkun, and J. Luo, "The security and privacy of smart vehicles," in IEEE S & P, 2004.
[2]
"Automotive security best practices - intel," 2015.
[3]
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J. Hubaux, "Secure vehicular communication systems: design and architecture," in IEEE CM, 2008.
[4]
R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, "Preserving user location privacy in mobile data management infrastructures," in Privacy Enhancing Technologies, Springer, 2006.
[5]
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing location-based identity inference in anonymous spatial queries," in IEEE ITKDE, 2007.
[6]
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in ICMSAS, ACM, 2003.
[7]
A. Khoshgozaran and C. Shahabi, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy," in ASTD, Springer, 2007.
[8]
G. Zhong, I. Goldberg, and U. Hengartner, "Louis, lester and pierre: Three protocols for location privacy," in Privacy Enhancing Technologies, Springer, 2007.
[9]
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. Tan, "Private queries in location based services: anonymizers are not necessary," in SIGMOD ICMD, ACM, 2008.
[10]
A. Yao, "How to generate and exchange secrets," in IEEE FOCS, 1986.
[11]
Y. Huang, D. Evans, and J. Katz, "Private set intersection: Are garbled circuits better than custom protocols?," in NDSS, 2012.
[12]
Brenner, Perl, and Smith, "hcrypt SFE project." https://hcrypt.com/sfe/.
[13]
E. M. Songhori, S. U. Hussain, A. Sadeghi, T. Schneider, and F. Koushanfar, "Tinygarble: Highly compressed and scalable sequential garbled circuits," in IEEE S&P, 2015.
[14]
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Zhu, "Tools for privacy preserving distributed data mining," in SIGKDD Explorations Newsletter, 2002.
[15]
B. Kreuter, A. Shelat, B. Mood, and K. R. Butler, "PCF: A portable circuit format for scalable two-party secure computation.," in USENIX Security, 2013.
[16]
M. Bellare, V. T. Hoang, S. K., and P. Rogaway, "Efficient garbling from a fixed-key blockcipher," in IEEE S&P, 2013.
[17]
Y. Lindell and B. Pinkas, "Secure two-party computation via cut-and-choose oblivious transfer," in Journal of Cryptology, Springer, 2012.
[18]
M. Naor and B. Pinkas, "Computationally secure oblivious transfer," in Journal of Cryptology, Springer, 2005.
[19]
V. Kolesnikov and T. Schneider, "Improved garbled circuit: Free xor gates and applications," in ICALP, Springer, 2008.
[20]
M. Naor, B. Pinkas, and R. Sumner, "Privacy preserving auctions and mechanism design," in CEC, ACM, 1999.
[21]
S. Zahur, M. Rosulek, and D. Evans, "Two halves make a whole: Reducing data transfer in garbled circuits using half gates." Cryptology ePrint Archive, 2014. http://eprint.iacr.org/2014/756.
[22]
Y. Shang, Z. Liu, J. Wang, and X. Xiao, "Triangle and centroid localization algorithm based on distance compensation," in ICISCE, IET, 2012.
[23]
A. Bensky, Wireless positioning technologies and applications. Artech House, 2007.
[24]
"Intel Atom Processor E3845." ark.intel.com/products/78475, 2015.
[25]
"IEEE 1609 - family of standards for wireless access in vehicular environments (WAVE)." standards.its.dot.gov/factsheets/factsheet/80, 2009.
[26]
M. Atallah and W. Du, "Secure multi-party computational geometry," in Algorithms and Data Structures, Springer, 2001.
[27]
Y. Huang and R. Vishwanathan, "Privacy preserving group nearest neighbour queries in location-based services using cryptographic techniques," in IEEE GLOBECOM, 2010.
[28]
E. Songhori, S. Hussain, A. Sadeghi, and F. Koushanfar, "Compacting privacy-preserving k-nearest neighbor search using logic synthesis," in DAC, 2015.

Cited By

View all
  • (2024)Privacy-Preserving WiFi Localization Based on Inner Product Encryption in a Cloud EnvironmentIEEE Internet of Things Journal10.1109/JIOT.2024.335834911:10(17264-17282)Online publication date: 15-May-2024
  • (2024)Preserving Privacy in Wi-Fi Localization with Plausible Dummy LocationsPrivacy Preservation in Distributed Systems10.1007/978-3-031-58013-0_7(151-184)Online publication date: 8-Apr-2024
  • (2023)A survey on indoor positioning security and privacyComputers and Security10.1016/j.cose.2023.103293131:COnline publication date: 1-Aug-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
DAC '16: Proceedings of the 53rd Annual Design Automation Conference
June 2016
1048 pages
ISBN:9781450342360
DOI:10.1145/2897937
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 June 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. connected cars
  2. garbled circuit
  3. location based services
  4. location privacy
  5. secure automotive system
  6. secure function evaluation

Qualifiers

  • Research-article

Funding Sources

Conference

DAC '16

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)73
  • Downloads (Last 6 weeks)13
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Privacy-Preserving WiFi Localization Based on Inner Product Encryption in a Cloud EnvironmentIEEE Internet of Things Journal10.1109/JIOT.2024.335834911:10(17264-17282)Online publication date: 15-May-2024
  • (2024)Preserving Privacy in Wi-Fi Localization with Plausible Dummy LocationsPrivacy Preservation in Distributed Systems10.1007/978-3-031-58013-0_7(151-184)Online publication date: 8-Apr-2024
  • (2023)A survey on indoor positioning security and privacyComputers and Security10.1016/j.cose.2023.103293131:COnline publication date: 1-Aug-2023
  • (2022)Privacy-preserving indoor localization based on inner product encryption in a cloud environmentKnowledge-Based Systems10.1016/j.knosys.2021.108005239:COnline publication date: 5-Mar-2022
  • (2020)PPFQ: Privacy-Preserving Friends Query over Online Social Networks2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom50675.2020.00181(1348-1353)Online publication date: Dec-2020
  • (2020)Preserving Privacy in WiFi Localization With Plausible Dummy LocationsIEEE Transactions on Vehicular Technology10.1109/TVT.2020.300636369:10(11909-11925)Online publication date: Oct-2020
  • (2020)Resilient Privacy-Preserving Distributed Localization Against Dishonest Nodes in Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2020.30047097:9(9214-9223)Online publication date: Sep-2020
  • (2019)On Location Privacy in Fingerprinting-based Indoor Positioning SystemProceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems10.1145/3347146.3359081(289-298)Online publication date: 5-Nov-2019
  • (2018)P3ACM Transactions on Design Automation of Electronic Systems10.1145/323662523:6(1-19)Online publication date: 28-Nov-2018
  • (2018)To Hide Private Position Information in Localization Using Time Difference of ArrivalIEEE Transactions on Signal Processing10.1109/TSP.2018.285818766:18(4946-4956)Online publication date: 15-Sep-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media