Securing location privacy in vehicular applications and communications
<p> Vehicular communications systems may one day save lives, reduce fuel consumption, and advance connectivity, but they may also transmit information which could be deanonymized to obtain personal information. Vehicle location data are of special concern because they could be used maliciously...
Main Author: | |
---|---|
Language: | EN |
Published: |
Oakland University
2016
|
Subjects: | |
Online Access: | http://pqdtopen.proquest.com/#viewpdf?dispub=10169186 |
id |
ndltd-PROQUEST-oai-pqdtoai.proquest.com-10169186 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-PROQUEST-oai-pqdtoai.proquest.com-101691862016-10-13T15:57:57Z Securing location privacy in vehicular applications and communications Corser, George P. Automotive engineering|Computer science <p> Vehicular communications systems may one day save lives, reduce fuel consumption, and advance connectivity, but they may also transmit information which could be deanonymized to obtain personal information. Vehicle location data are of special concern because they could be used maliciously. This dissertation presents a systematic study resulting in novel definitions, metrics and methods for evaluating and applying location privacy preserving protocols specifically in vehicular settings.</p><p> Previous work in vehicular network privacy has not thoroughly considered vehicular mobility patterns. Previous work in vehicular network privacy has not solved the problem of collusion between MAC layer and application layer attackers. As defenses against location privacy attacks, previous work has favored the privacy methods of anonymization and obfuscation, but these methods have weaknesses. Spatial-temporal cloaking, for example, requires overhead of trusted third parties, and provides little protection in low vehicle densities especially when applications require frequent precise location data. Little published work has addressed the "location" part of location privacy, the geographical distance of location privacy, focusing instead on the size of the anonymity set. The need for new metrics is indicated.</p><p> The present research addresses these issues. In addition to new definitions and metrics, this study develops privacy methods which would (1) accommodate vehicular mobility patterns, (2) defend against collusion by MAC and application layer attackers, (3) produce privacy solutions which depend on cooperation neither by large numbers of other motorists nor by trusted third parties, and (4) function in low vehicle densities, notably during the transition period between system initialization and full saturation, (5) provide protection even when applications require frequent and precise location queries, and (6) provide protection over a geographical range beyond a vehicle's wireless communications range and provide protection over measurable and lengthy spans of time. Finally, it presents a new metric for measuring privacy (KDT), an equation to estimate the safety impact of privacy protocols (SSTE), and three new privacy models, Endpoint Protection Zones (EPZ), Privacy by Decoy (PBD) and Random Rotation of Vehicular Trajectory (RRVT).</p> Oakland University 2016-10-09 00:00:00.0 thesis http://pqdtopen.proquest.com/#viewpdf?dispub=10169186 EN |
collection |
NDLTD |
language |
EN |
sources |
NDLTD |
topic |
Automotive engineering|Computer science |
spellingShingle |
Automotive engineering|Computer science Corser, George P. Securing location privacy in vehicular applications and communications |
description |
<p> Vehicular communications systems may one day save lives, reduce fuel consumption, and advance connectivity, but they may also transmit information which could be deanonymized to obtain personal information. Vehicle location data are of special concern because they could be used maliciously. This dissertation presents a systematic study resulting in novel definitions, metrics and methods for evaluating and applying location privacy preserving protocols specifically in vehicular settings.</p><p> Previous work in vehicular network privacy has not thoroughly considered vehicular mobility patterns. Previous work in vehicular network privacy has not solved the problem of collusion between MAC layer and application layer attackers. As defenses against location privacy attacks, previous work has favored the privacy methods of anonymization and obfuscation, but these methods have weaknesses. Spatial-temporal cloaking, for example, requires overhead of trusted third parties, and provides little protection in low vehicle densities especially when applications require frequent precise location data. Little published work has addressed the "location" part of location privacy, the geographical distance of location privacy, focusing instead on the size of the anonymity set. The need for new metrics is indicated.</p><p> The present research addresses these issues. In addition to new definitions and metrics, this study develops privacy methods which would (1) accommodate vehicular mobility patterns, (2) defend against collusion by MAC and application layer attackers, (3) produce privacy solutions which depend on cooperation neither by large numbers of other motorists nor by trusted third parties, and (4) function in low vehicle densities, notably during the transition period between system initialization and full saturation, (5) provide protection even when applications require frequent and precise location queries, and (6) provide protection over a geographical range beyond a vehicle's wireless communications range and provide protection over measurable and lengthy spans of time. Finally, it presents a new metric for measuring privacy (KDT), an equation to estimate the safety impact of privacy protocols (SSTE), and three new privacy models, Endpoint Protection Zones (EPZ), Privacy by Decoy (PBD) and Random Rotation of Vehicular Trajectory (RRVT).</p> |
author |
Corser, George P. |
author_facet |
Corser, George P. |
author_sort |
Corser, George P. |
title |
Securing location privacy in vehicular applications and communications |
title_short |
Securing location privacy in vehicular applications and communications |
title_full |
Securing location privacy in vehicular applications and communications |
title_fullStr |
Securing location privacy in vehicular applications and communications |
title_full_unstemmed |
Securing location privacy in vehicular applications and communications |
title_sort |
securing location privacy in vehicular applications and communications |
publisher |
Oakland University |
publishDate |
2016 |
url |
http://pqdtopen.proquest.com/#viewpdf?dispub=10169186 |
work_keys_str_mv |
AT corsergeorgep securinglocationprivacyinvehicularapplicationsandcommunications |
_version_ |
1718386808653348864 |