2013
DOI: 10.1007/978-3-642-35890-6_3
|View full text |Cite
|
Sign up to set email alerts
|

Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems

Abstract: Abstract. Electronic Toll Pricing (ETP), a location-based vehicular service, allows users to pay tolls without stopping or even slowing down their cars. User location records are collected so as to calculate their payments. However, users have privacy concerns as locations are considered as private information. In this paper, we focus on user traceability in ETP systems where anonymous location records are stored by the service providers. Based on user toll payment information, we propose a post-hoc analysis o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…To the best of our knowledge supported by the survey [24], the work [7] is the only relevant study that proposes an attack concerning the post-payment PPETC schemes. In [7], the authors present an attack to find drivers' possible traces in a toy example of an ETC system. A trace is a set of trips a driver has made within a billing period.…”
Section: Attacks On Privacy In Etcmentioning
confidence: 99%
See 3 more Smart Citations
“…To the best of our knowledge supported by the survey [24], the work [7] is the only relevant study that proposes an attack concerning the post-payment PPETC schemes. In [7], the authors present an attack to find drivers' possible traces in a toy example of an ETC system. A trace is a set of trips a driver has made within a billing period.…”
Section: Attacks On Privacy In Etcmentioning
confidence: 99%
“…The adversary uses an attack that works based on solving the SSP whose solutions lead to a driver's set of traces where the correct trace is located. To solve the SSP, [7] utilizes Pisinger's algorithm [33] due to its linear computation time. However, it is important to note that the values corresponding to the set of traces must adhere to specific restrictions.…”
Section: Attacks On Privacy In Etcmentioning
confidence: 99%
See 2 more Smart Citations
“…However, such a solution raises another threat after payment information finishes. Chen et al [ 11 ] claimed that this information can be cracked by an external malicious attacker. Therefore, post hoc analysis concerning user traceability based on a user toll payment information scheme has been proposed by them.…”
Section: Related Workmentioning
confidence: 99%