A framework for privacy and security analysis of probe-based traffic information systems

Handle URI:
http://hdl.handle.net/10754/564644
Title:
A framework for privacy and security analysis of probe-based traffic information systems
Authors:
Canepa, Edward S. ( 0000-0002-5779-2059 ) ; Claudel, Christian G. ( 0000-0003-0702-6548 )
Abstract:
Most large scale traffic information systems rely on fixed sensors (e.g. loop detectors, cameras) and user generated data, this latter in the form of GPS traces sent by smartphones or GPS devices onboard vehicles. While this type of data is relatively inexpensive to gather, it can pose multiple security and privacy risks, even if the location tracks are anonymous. In particular, creating bogus location tracks and sending them to the system is relatively easy. This bogus data could perturb traffic flow estimates, and disrupt the transportation system whenever these estimates are used for actuation. In this article, we propose a new framework for solving a variety of privacy and cybersecurity problems arising in transportation systems. The state of traffic is modeled by the Lighthill-Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. The resulting framework is very flexible, and can in particular be used to detect spoofing attacks in real time, or carry out attacks on location tracks. Numerical implementations are performed on experimental data from the Mobile Century experiment to validate this framework. © 2013 ACM.
KAUST Department:
Computer, Electrical and Mathematical Sciences and Engineering (CEMSE) Division; Electrical Engineering Program; Distributed Sensing Systems Laboratory (DSS)
Publisher:
Association for Computing Machinery (ACM)
Journal:
Proceedings of the 2nd ACM international conference on High confidence networked systems - HiCoNS '13
Conference/Event name:
2013 2nd ACM International Conference on High Confidence Networked Systems, HiCoNS 2013, as Part of CPSWeek 2013
Issue Date:
2013
DOI:
10.1145/2461446.2461451
Type:
Conference Paper
ISBN:
9781450319614
Appears in Collections:
Conference Papers; Electrical Engineering Program; Computer, Electrical and Mathematical Sciences and Engineering (CEMSE) Division

Full metadata record

DC FieldValue Language
dc.contributor.authorCanepa, Edward S.en
dc.contributor.authorClaudel, Christian G.en
dc.date.accessioned2015-08-04T07:10:42Zen
dc.date.available2015-08-04T07:10:42Zen
dc.date.issued2013en
dc.identifier.isbn9781450319614en
dc.identifier.doi10.1145/2461446.2461451en
dc.identifier.urihttp://hdl.handle.net/10754/564644en
dc.description.abstractMost large scale traffic information systems rely on fixed sensors (e.g. loop detectors, cameras) and user generated data, this latter in the form of GPS traces sent by smartphones or GPS devices onboard vehicles. While this type of data is relatively inexpensive to gather, it can pose multiple security and privacy risks, even if the location tracks are anonymous. In particular, creating bogus location tracks and sending them to the system is relatively easy. This bogus data could perturb traffic flow estimates, and disrupt the transportation system whenever these estimates are used for actuation. In this article, we propose a new framework for solving a variety of privacy and cybersecurity problems arising in transportation systems. The state of traffic is modeled by the Lighthill-Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. The resulting framework is very flexible, and can in particular be used to detect spoofing attacks in real time, or carry out attacks on location tracks. Numerical implementations are performed on experimental data from the Mobile Century experiment to validate this framework. © 2013 ACM.en
dc.publisherAssociation for Computing Machinery (ACM)en
dc.subjectcyber-physical systemsen
dc.subjectprivacy analysisen
dc.subjectsecurityen
dc.titleA framework for privacy and security analysis of probe-based traffic information systemsen
dc.typeConference Paperen
dc.contributor.departmentComputer, Electrical and Mathematical Sciences and Engineering (CEMSE) Divisionen
dc.contributor.departmentElectrical Engineering Programen
dc.contributor.departmentDistributed Sensing Systems Laboratory (DSS)en
dc.identifier.journalProceedings of the 2nd ACM international conference on High confidence networked systems - HiCoNS '13en
dc.conference.date9 April 2013 through 11 April 2013en
dc.conference.name2013 2nd ACM International Conference on High Confidence Networked Systems, HiCoNS 2013, as Part of CPSWeek 2013en
dc.conference.locationPhiladelphia, PAen
dc.contributor.institutionDepartment of Electrical Engineering, Saudi Arabiaen
kaust.authorClaudel, Christian G.en
kaust.authorCanepa, Edward S.en
All Items in KAUST are protected by copyright, with all rights reserved, unless otherwise indicated.