Back to Search Start Over

Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks

Authors :
Li, Meng (author)
Chen, Yifei (author)
Kumar, Neeraj (author)
Lal, C. (author)
Conti, M. (author)
Alazab, Mamoun (author)
Li, Meng (author)
Chen, Yifei (author)
Kumar, Neeraj (author)
Lal, C. (author)
Conti, M. (author)
Alazab, Mamoun (author)
Publication Year :
2022

Abstract

Current connected and autonomous vehicles will contribute to various and green vehicular services. However, sharing personal data with untrustworthy Navigation Service Providers (NSPs) raises serious location concerns. To address this issue, many Location Privacy-Preserving Mechanisms (LPPMs) have been proposed. In addition, several quantification methods have been designed to help understand location privacy and illustrate how location privacy is leaked. However, their assessment is insufficient due to the incomplete assumptions about the adversary’s model. In particular, users tend to request the same navigation routes from home to workplace and acquire traffic information along the route. An adversary can collect the coordinates of adjacent locations and infer the two true locations. In this paper, we provide a formal framework for the analysis of LPPMs in navigation services. Our framework captures extra information that is available to an adversary performing localization attacks. By formalizing the adversary’s performance, we also propose and justify two new metrics to quantify location privacy in navigation services, namely accuracy and visibility. We assess the efficacy of two popular LPPMs for location privacy, i.e., differential privacy and k-anonymity. Experimental results demonstrate that the adversary can recover users’ locations with a high probability.<br />Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.<br />Cyber Security

Details

Database :
OAIster
Notes :
English
Publication Type :
Electronic Resource
Accession number :
edsoai.on1376663872
Document Type :
Electronic Resource
Full Text :
https://doi.org/10.1109.TGCN.2022.3144641