2022
DOI: 10.1109/tnet.2022.3157654
|View full text |Cite
|
Sign up to set email alerts
|

User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack

Abstract: Traffic monitoring services collect traffic reports and respond to users' traffic queries. However, the reports and queries may reveal the user's identity and location. Although different anonymization techniques have been applied to protect user privacy, a new security threat arises, namely, n-by-1 jamming attack, in which an anonymous contributing driver impersonates n drivers and uploads n normal reports by using n reporting devices. Such an attack will mislead the traffic monitoring service provider and fu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…Since we build our RHS system upon Ethereum, both riders and drivers will pay transaction fees and may suffer a varying fee because of ether price's unstable nature. We can alleviate this problem by building a consortium blockchain among ride-hailing companies, insurance companies, transportation departments, and other vehicle-related institutions [59], [60]. Using the consortium blockchain, the miners/stakeholders can set the transaction fee to a fixed and acceptable value.…”
Section: Gas Costs and Monetary Costsmentioning
confidence: 99%
“…Since we build our RHS system upon Ethereum, both riders and drivers will pay transaction fees and may suffer a varying fee because of ether price's unstable nature. We can alleviate this problem by building a consortium blockchain among ride-hailing companies, insurance companies, transportation departments, and other vehicle-related institutions [59], [60]. Using the consortium blockchain, the miners/stakeholders can set the transaction fee to a fixed and acceptable value.…”
Section: Gas Costs and Monetary Costsmentioning
confidence: 99%
“…To complete the user matching, riders upload real-time locations to the RHSP. This induces privacy risks [11], [12], [13], [14], [15], [16], [17], [18] since location information is highly related to user activities such as leaving home, dining in an Italian restaurant, and attending a political gathering. To solve this problem, secure k nearest neighbour (SkNN) [19] is proposed.…”
Section: Mnemosyne: Privacy-preserving Ride Matching Withmentioning
confidence: 99%
“…Recall that two projection functions determine a feasible location and two feasible locations determine a feasible area. We select t from [2,4,6,8,10,12,14,16,18,20] and each case of t (t > 2) requires an additional OR than the case of t − 2. For the rider, with the increase of t, she has to compute more feasible locations fl and feasible areas fa, resulting in a large string set Q and a larger new string set Q .…”
Section: Performance By Varying Tmentioning
confidence: 99%
“…(1) Data/Index/Token Privacy. From the encrypted data item, index, and token, the adversary cannot learn any useful information about the data, data item's location, query location, and type [25][26][27][28][29]. (2) Obliviousness.…”
Section: Privacymentioning
confidence: 99%