Skip to main content

Privacy of Connected Vehicles

  • Chapter
  • First Online:
Handbook of Mobile Data Privacy

Abstract

By enabling vehicles to exchange information with infrastructure and other vehicles, connected vehicles enable new safety applications and services. Because this technology relies on vehicles to broadcast their location in clear text, it also raises location privacy concerns. In this chapter, we discuss the connected-car ecosystem and its underlying privacy threats. We further present the privacy protection approach of short-term identifiers, called pseudonyms, that is currently foreseen for emerging standards in car-to-X communication. To that end, we discuss the pseudonym lifecycle and analyze the trade-off between dependability and privacy requirements. We give examples of other privacy protection approaches for pay-as-you-drive insurance, sharing of trip data, and electric vehicle charging. We conclude the chapter by an outlook on open challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Norbert Bissmeyer et al. “Assessment of Node Trustworthiness in VANETs Using Data Plausibility Checks with Particle Filters”. In: Nov 2012. https://doi.org/10.1109/VNC.2012.6407448

  2. D. Cagara, B. Scheuermann, and A. L. C. Bazzan. “Traffic Optimization on Islands”. In: 2015 IEEE Vehicular Networking Conference (VNC) Dec. 2015, pp. 175–182. https://doi.org/10.1109/VNC.2015.7385574

  3. John Douceur. “The Sybil Attack”. In: Iptps ’01: First International Workshop on Peer-to-Peer Systems Springer, 2002, pp. 251–260.

    Google Scholar 

  4. Marie Douriez et al. “Anonymizing NYC Taxi Data: Does It Matter?” In: Proc. of IEEE Intl. Conf. on Data Science and Advanced Analytics (DSAA ’16) Montreal, Canada, Oct. 2016.

    Google Scholar 

  5. Karim Emara, Wolfgang Woerndl, and Johann Schlichter. “CAPS: Context-Aware Privacy Scheme for VANET Safety Applications”. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks WiSec ’15. New York, NY USA: ACM, 2015, 21:1–21:12. ISBN: 978-1-4503-3623-9. https://doi.org/10.1145/2766498.2766500

  6. Erika McCallister Tim Grance, and Karen Scarfone. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) Special Publication SP 800-122. NIST, 2010. URL: https://doi.org/10.6028/NIST.SP.800-122

  7. ETSI. Intelligent Transport Systems (ITS); Security; ITS Communications Se- curity Architecture and Security Management TS 102 940. 2012.

    Google Scholar 

  8. ETSI. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service EN 302 637–2. 2013.

    Google Scholar 

  9. ETSI. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service EN 302 637–3. 2013.

    Google Scholar 

  10. Marouane Fazouane et al. “Formal Verification of Privacy Properties in Electric Vehicle Charging”. In: Engineering Secure Software and Systems Springer Cham, Mar 4, 2015, pp. 17–33. https://doi.org/10.1007/9783319156187_2

  11. David Förster, Frank Kargl, and Hans Löhr. “A Framework for Evaluating Pseudonym Strategies in Vehicular Ad-Hoc Networks”. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Net- works WiSec ’15. New York, NY USA: ACM, 2015, 19:1–19:6. ISBN: 978-1-4503-3623-9. https://doi.org/10.1145/2766498.2766520

  12. J. Freudiger et al. “Mix-Zones for Location Privacy in Vehicular Networks”. In: Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. To do so, vehicles need to periodically broadcast safety messages providing preciseposition information …2007.

    Google Scholar 

  13. Ryan M. Gerdes et al. “Device Identification via Analog Signal Fingerprint- ing: A Matched Filter Approach.” In: NDSS 2006.

    Google Scholar 

  14. M. Gerlach and F. Guttler “Privacy in VANETs Using Changing Pseudonyms Ideal and Real”. In: Vehicular Technology Conference 2007. VTC2007- Spring. IEEE 65th Apr 2007, pp. 2521–2525. https://doi.org/10.1109/VETECS2007.519

  15. Philippe Golle and Kurt Partridge. “On the Anonymity of Home/Work Loca- tion Pairs”. In: Pervasive Computing Springer Berlin, Heidelberg, May 11, 2009, pp. 390–397. https://doi.org/10.1007/9783642015168_26

  16. Marco Gruteser and Dirk Grunwald. “Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking”. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services MobiSys ’03. New York, NY USA: ACM, 2003, pp. 31–42. https://doi.org/10.1145/1066116.1189037

  17. H. Hartenstein and L. P. Laberteaux. “A Tutorial Survey on Vehicular Ad Hoc Networks”. In: IEEE Communications Magazine 46.6 (June 2008), pp. 164–171. ISSN: 0163-6804. https://doi.org/10.1109/MCOM.2008.4539481

    Article  Google Scholar 

  18. Hannes Hartenstein and Kenneth Laberteaux, eds. VANET Vehicular Applica- tions and Inter-Networking Technologies 1 edition. Chichester U.K: Wiley Feb 15, 2010. 466 pp. ISBN: 978-0-470-74056-9.

    Google Scholar 

  19. Christina Höfer et al. “POPCORN: Privacy-Preserving Charging for Emobility”. In: Proceedings of the 2013 ACM Workshop on Security Privacy & Dependability for Cyber Vehicles CyCAR ’13. New York, NY USA: ACM, 2013, pp. 37–48. ISBN: 978-1-4503-2487-8. https://doi.org/101145/25179682517971

  20. Baik Hoh et al. “Enhancing Security and Privacy in Traffic-Monitoring Systems”. In: IEEE Pervasive Computing 5.4 (Oct. 2006), pp. 38–46. ISSN: 1536-1268. https://doi.org/10.1109/MPRV.2006.69

    Article  Google Scholar 

  21. “IEEE Standard for Wireless Access in Vehicular Environments Security Ser vices for Applications and Management Messages”. In: IEEE Std 1609.2-2016 (2016), pp. 1–289. https://doi.org/10.1109/IEEESTD.2016.7426684

  22. Frank Kargl, Florian Schaub, and Stefan Dietzel. “Mandatory Enforcement of Privacy Policies Using Trusted Computing Principles”. In: Intelligent Information Privacy Management Symposium (Privacy 2010) Stanford University USA: AAAI, Mar 2010.

    Google Scholar 

  23. Frank Kargl et al. “Enforcing Privacy Policies in Cooperative Intelligent Transportation Systems”. In: ACM 15th Annual International Conference on Mobile Computing and Networking (ACM Mobicom 2009) Poster Session Beijing, China, Sept. 2009.

    Google Scholar 

  24. S. Lefevre et al. “Impact of V2X Privacy Strategies on Intersection Collision Avoidance Systems”. In: 2013 IEEE Vehicular Networking Conference Dec. 2013, pp. 71–78. https://doi.org/10.1109/VNC.2013.6737592

  25. Maija Palmer. TomTom Sorry for Selling Driver Data to Police Financial Times. 2011. URL: https://wwwft.com/content/3f80e432719911e09b7a00144feabdc0 (visited on 01/09/2017).

  26. Min Mun et al. “PDVLoc: A Personal Data Vault for Controlled Location Data Sharing”. In: ACM Transactions on Sensor Networks 10.4 (2014).

    Google Scholar 

  27. On the Protection of Natural Persons with Regard to the Processing of Per sonal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation) 2016.

    Google Scholar 

  28. Balaji Palanisamy and Liu Ling. “Attack-Resilient Mix-Zones over Road Networks: Architecture and Algorithms”. In: IEEE Transactions on Mobile Computing 14.3 (2015), pp. 495–508.

    Google Scholar 

  29. Fayola Peters et al. “Balancing Privacy and Utility in Cross-Company De- fect Prediction”. In: IEEE Transactions on Software Engineering 39.8 (2013), pp. 1054–1068.

    Article  Google Scholar 

  30. J. Petit et al. “Pseudonym Schemes in Vehicular Networks: A Survey”. In: IEEE Communications Surveys Tutorials PP.99 (2014), pp. 1–1. ISSN: 1553-877X. https://doi.org/10.1109/COMST.2014.2345420

    Article  Google Scholar 

  31. Jonathan Petit, Michael Feiri, and Frank Kargl. “Revisiting Attacker Model for Smart Vehicles”. In: Sept. 2014. https://doi.org/10.1109/WIVEC.2014.6953258

  32. Jonathan Petit et al. “Connected Vehicles: Surveillance Threat and Mitigation”. In: Black Hat Europe Nov 2015.

    Google Scholar 

  33. Regulation (EU) 2015/758 of the European Parliament and of the Council of 29 April 2015 Concerning Type-Approval Requirements for the Deployment of the eCall in-Vehicle System Based on the 112 Service and Amending Directive 2007/46/EC 2015.

    Google Scholar 

  34. Road Vehicles – Vehicle to Grid Communication Interface ISO 15118. ISO/IEC.

    Google Scholar 

  35. Carsten Rolfes et al. PRESERVE Deliverable 3.2: FOT Trial 2 Results July 31, 2015. URL: https://www.preserve-project.eu/deliverables

  36. SAE. Dedicated Short Range Communications (DSRC) Message Set Dictionary Standard J2735. SAE, 2016.

    Google Scholar 

  37. F Schaub, Zhendong Ma, and F Kargl. “Privacy Requirements in Vehicular Communication Systems”. In: International Conference on Computational Science and Engineering, 2009. CSE ’09 Vol. 3. Aug. 2009, pp. 139–145. https://doi.org/10.1109/CSE.2009.135

    Google Scholar 

  38. E. Schoch, F. Kargl, and M. Weber. “Communication Patterns in VANETs”. In: IEEE Communications Magazine 46.11 (Nov 2008), pp. 119–125. ISSN: 0163-6804. https://doi.org/10.1109/MCOM.2008.4689254

    Article  Google Scholar 

  39. Elmar Schoch et al. “Impact of Pseudonym Changes on Geographic Routing in VANETs”. In: Security and Privacy in Ad-Hoc and Sensor Networks Springer Berlin, Heidelberg, Sept. 20, 2006, pp. 43–57. https://doi.org/101007/11964254_6

  40. C. Troncoso et al. “PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance”. In: IEEE Transactions on Dependable and Secure Computing 8.5 (Sept. 2011), pp. 742–755. ISSN: 1545-5971. https://doi.org/10.1109/TDSC.2010.71

    Article  Google Scholar 

  41. Carmela Troncoso et al. “Pripayd: Privacy Friendly Pay-as-You-Drive Insur ance”. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society WPES ’07. New York, NY USA: ACM, 2007, pp. 99–107. ISBN: 978-1-59593-883-1. https://doi.org/10.1145/1314333.1314353

  42. Björn Wiedersheim et al. “Privacy in InterVehicular Networks: Why Sim- ple Pseudonym Change Is Not Enough”. In: Wireless On-Demand Network Systems and Services (WONS), 2010 Seventh International Conference on IEEE, 2010, pp. 176–183.

    Google Scholar 

  43. Fangfang Zheng and Henk Van Zuylen. “Urban Link Travel Time Estimation Based on Sparse Probe Vehicle Data”. In: Transportation Research Part C: Emerging Technologies 31 (June 2013), pp. 145–157.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jonathan Petit .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Petit, J., Dietzel, S., Kargl, F. (2018). Privacy of Connected Vehicles. In: Gkoulalas-Divanis, A., Bettini, C. (eds) Handbook of Mobile Data Privacy . Springer, Cham. https://doi.org/10.1007/978-3-319-98161-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98161-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98160-4

  • Online ISBN: 978-3-319-98161-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics