Title :
Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services
Author :
Corser, George ; Huirong Fu ; Tao Shu ; D´Errico, Patrick ; Ma, Wann-Jiun ; Supeng Leng ; Ye Zhu
Author_Institution :
Oakland Univ., Rochester, MI, USA
Abstract :
Wireless networks which would connect vehicles via the Internet to a location based service, LBS, also would expose vehicles to online surveillance. In circumstances when spatial cloaking is not effective, such as when continuous precise location is required, LBSs may be designed so that users relay dummy queries through other vehicles to camouflage true locations. This paper introduces PARROTS, Position Altered Requests Relayed Over Time and Space, a privacy protocol which protects LBS users´ location information from LBS administrators even (1) when the LBS requires continuous precise location data in a vehicular ad hoc network, (2) when LBS administrators collude with administrators of vehicular wireless access points (a.k.a. roadside units, or RSUs), and (3) when precise location data might be deanonymized using map databases linking vehicle positions with vehicle owners´ home/work addresses and geographic coordinates. Defense against deanonymization requires concealment of endpoints, the effectiveness of which depends on the density of LBS users and the endpoint protection zone size. Simulations using realistic vehicle traffic mobility models varying endpoint protection zone sizes measure improvements in privacy protection.
Keywords :
data privacy; radio access networks; telecommunication security; vehicular ad hoc networks; Internet; LBSs; PARROTS; VANET; dummy queries; endpoint concealment; endpoint protection zone size; location data deanonymization; location privacy protection; map databases; online surveillance; position altered requests relayed over time and space; privacy protocol; privacy-by-decoy; vehicle traffic mobility models; vehicular ad hoc network; vehicular location based services; vehicular wireless access points; wireless networks; Computational modeling; Cryptography; Mathematical model; Measurement; Privacy; Surveillance; Vehicles;
Conference_Titel :
Intelligent Vehicles Symposium Proceedings, 2014 IEEE
Conference_Location :
Dearborn, MI
DOI :
10.1109/IVS.2014.6856595