Lightweight and Privacy-preserving Location Proofs for Intelligent Transportation Systems

نویسندگان

  • Yifan Zhang
  • Chiu C. Tan
  • Fengyuan Xu
  • Hao Han
  • Qun Li
چکیده

Transportation systems relying on vehicles to collect data for services such as road condition monitoring are vulnerable to malicious vehicles injecting large amounts of fake data. A particularly serious type of attack is that attackers report fake information about numerous places without actually presenting there. In this paper, we present VProof, a vehicle location proof scheme that enables a vehicle to prove its location claims match its historical locations. With VProof, vehicles construct their location proofs by simply extracting relevant contents from the packets received from roadside units. Our scheme is lightweight, since there is no communication required for a prover to obtain a location proof. Our scheme also well preserves users’ privacy, as we do not put any information that can be related to a user’s ID in a location proof. We have implemented a prototype VProof system and evaluated it with extensive real-world experiments. Our evaluation results show that VProof is able to reliably prove vehicle’s locations without leaking any user privacy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher

In this paper, a privacy preserving authentication protocol for RFID that relies on a single cryptographic component, a lightweight stream cipher, is constructed. The goal is to provide a more realistic balance between forward privacy and security, resistance against denial of service attacks, and computational efficiency (in tags and readers) than existing protocols. We achieve this goal by so...

متن کامل

PRIVACY-PRESERVING TRANSPORTATION TRAFFIC MEASUREMENT IN INTELLIGENT CYBER-PHYSICAL ROAD SYSTEMS By YIAN ZHOU A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY

of Dissertation Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy PRIVACY-PRESERVING TRANSPORTATION TRAFFIC MEASUREMENT IN INTELLIGENT CYBER-PHYSICAL ROAD SYSTEMS By Yian Zhou December 2015 Chair: Shigang Chen Major: Computer Engineering Traffic volume measurement is critical in transportation engineer...

متن کامل

Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems

Electronic cash is a suitable solution for payment systems, in which the user’s identity should not be revealed during the payment. This is for example the case for public transportation payment systems. One electronic cash scheme, efficient during the spending phase, was proposed by Brands’. This scheme, as all privacy-preserving payment schemes, is based on public-key cryptography. However, p...

متن کامل

License Plate location Determination by Using Case-Based Reasoning

The license plate recognition system is part of the intelligent transportation system. In the intelligent transportation system, the vehicle image is used as the system input. The first step is to improve the image, after the edge detection, a series of morphological operations are performed to identify the plaque. The main purpose of this research was to increase the importance of plate re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014