Connected Vehicles: A Privacy Analysis

  • Mark QuinlanEmail author
  • Jun Zhao
  • Andrew Simpson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11637)


Just as the world of consumer devices was forever changed by the introduction of computer controlled solutions, the introduction of the engine control unit (ECU) gave rise to the automobile’s transformation from a transportation product to a technology platform. A modern car is capable of processing, analysing and transmitting data in ways that could not have been foreseen only a few years ago. These cars often incorporate telematics systems, which are used to provide navigation and internet connectivity over cellular networks, as well as data-recording devices for insurance and product development purposes. We examine the telematics system of a production vehicle, and aim to ascertain some of the associated privacy-related threats. We also consider how this analysis might underpin further research.


Connected vehicles Connected cars Privacy Privacy assessment Data privacy Security 


  1. 1.
    Albright, B.: Protecting connected cars. Aftermarket Bus. World 126(2), 10–11 (2017)Google Scholar
  2. 2.
    Alheeti, A., Khattab, M., Mcdonald-Maier, K.: Intelligent intrusion detection in external communication systems for autonomous vehicles. Syst. Sci. Control Eng. 6(1), 48–56 (2018)CrossRefGoogle Scholar
  3. 3.
    Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefGoogle Scholar
  4. 4.
    Benenson, Z., Gassmann, F., Reinfelder, L.: Android and iOS users’ differences concerning security and privacy. In: CHI 2013 Extended Abstracts on Human Factors in Computing Systems, pp. 817–822. Communications of the ACM, New York (2013)Google Scholar
  5. 5.
    Camp, L.J.: Respecting people and respecting privacy. Commun. ACM 58(7), 27–28 (2015)CrossRefGoogle Scholar
  6. 6.
    Glancy, D.: Privacy in autonomous vehicles. Santa Clara Law Rev. 52(4), 1171–1239 (2012)Google Scholar
  7. 7.
    Haberle, T., Charissis, L., Fehling, C., Nahm, J., Leymann, F.: The connected car in the cloud: a platform for prototyping telematics services. IEEE Softw. 32(6), 11–17 (2015). Scholar
  8. 8.
    Hubaux, J.P., Juels, A.: Privacy is dead, long live privacy. Commun. ACM 59(6), 39–41 (2016). Scholar
  9. 9.
    Joy, J., Gerla, M.: Internet of vehicles and autonomous connected car - privacy and security issues. In: 2017 26th International Conference on Computer Communication and Networks (ICCCN), pp. 1–9, July 2017.
  10. 10.
    Kaplun, V., Segal, M.: Breaching the privacy of connected vehicles network. Telecommun. Syst. 70(4), 541–555 (2019)CrossRefGoogle Scholar
  11. 11.
    Kasinathan, P., Pastrone, C., Spririto, M.A., Vinkovits, M.: Denial-of-service detection within the Internet of Things. In: Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2013), pp. 600–607. IEEE (2013)Google Scholar
  12. 12.
    Larkin, J.: Mapping the legal framework for autonomous vehicles. Automot. Ind. 195(2), 24–25 (2017)Google Scholar
  13. 13.
    Lim, J., Yu, H., Kim, K., Kim, M., Lee, S.: Preserving location privacy of connected vehicles with highly accurate location updates. IEEE Commun. Lett. 21(3), 540–543 (2017). Scholar
  14. 14.
    Mena, D.M., Papapanagiotou, I., Yang, B.: Internet of Things: survey on security. Inf. Secur. J.: Global Perspect. 27(3), 162–182 (2018). Scholar
  15. 15.
    Miorandi, D., Sicari, S., Pellegrini, F.D., Chlamtac, I.: Internet of Things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012). Scholar
  16. 16.
    Othmane, L.B., Weffers, H., Mohamad, M.M., Wolf, M.: A survey of security and privacy in connected vehicles. In: Benhaddou, D., Al-Fuqaha, A. (eds.) Wireless Sensor and Mobile Ad-Hoc Networks, pp. 217–247. Springer, New York (2015). Scholar
  17. 17.
    Ring, T.: Connected cars - the next target for hackers. Netw. Secur. 2015(11), 11–16 (2015)CrossRefGoogle Scholar
  18. 18.
    Suo, H., Wan, J., Zou, C., Liu, J.: Security in the Internet of Things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 3, pp. 648–651, March 2012Google Scholar
  19. 19.
    Wang, E.S.T., Lin, R.L.: Perceived quality factors of location-based apps on trust, perceived privacy risk, and continuous usage intention. Behav. Inf. Technol. 36(1), 2–10 (2017)Google Scholar
  20. 20.
    Weber, R.H.: Internet of Things: new security and privacy challenges. Comput. Law Secur. Rev. 6(1), 23–30 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of OxfordOxfordUK

Personalised recommendations