2023
DOI: 10.1109/tits.2022.3217358
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Solution for Intelligent Transportation Systems: Private Driver DNA

Abstract: The rising connection of vehicles with the road infrastructure enables the creation of data-driven applications to offer drivers customized services. At the same time, these opportunities require innovative solutions to protect the drivers' privacy in a complex environment like an Intelligent Transportation System (ITS). This need is even more relevant when data are used to retrieve personal behaviors or attitudes. In our work, we propose a privacy-preserving solution, called Private Driver DNA, which designs … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 64 publications
(70 reference statements)
0
0
0
Order By: Relevance
“…To the best of our knowledge supported by the survey [24], the work [7] is the only relevant study that proposes an attack concerning the post-payment PPETC schemes. In [7], the authors present an attack to find drivers' possible traces in a toy example of an ETC system.…”
Section: Attacks On Privacy In Etcmentioning
confidence: 99%
“…To the best of our knowledge supported by the survey [24], the work [7] is the only relevant study that proposes an attack concerning the post-payment PPETC schemes. In [7], the authors present an attack to find drivers' possible traces in a toy example of an ETC system.…”
Section: Attacks On Privacy In Etcmentioning
confidence: 99%
“…The four attributes that relate to privacy in CAVs: are unlinkability, anonymity, pseudonymity, and unobservability. [42,80] Numerous surveys [81][82][83][84][85][86][87][88][89] have been conducted regarding the privacy in VANETs. These suggest privacy schemes such as tree-based risk assessment, cryptography, location cloaking [90], encryption-pseudoduyms [91], and obfuscation [92].…”
Section: Attacks On Privacymentioning
confidence: 99%
“…The issue of concern is whether all this information gathered by the trust mechanisms/or models is private. To solve such concerns studies in [42,[80][81][82][83][84][85][86][87][88][89] have proposed trust mechanisms that make use cryptography techniques despite the high computational resource requirement [10]. This raises the issue of whether privacy solutions in connected vehicles can be implemented without cryptography if not then there is need to minimize resource usage.…”
Section: Privacymentioning
confidence: 99%