A framework for privacy and security analysis of probe-based traffic information systems

Edward S. Canepa, Christian G. Claudel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Abstract

Most large scale traffic information systems rely on fixed sensors (e.g. loop detectors, cameras) and user generated data, this latter in the form of GPS traces sent by smartphones or GPS devices onboard vehicles. While this type of data is relatively inexpensive to gather, it can pose multiple security and privacy risks, even if the location tracks are anonymous. In particular, creating bogus location tracks and sending them to the system is relatively easy. This bogus data could perturb traffic flow estimates, and disrupt the transportation system whenever these estimates are used for actuation. In this article, we propose a new framework for solving a variety of privacy and cybersecurity problems arising in transportation systems. The state of traffic is modeled by the Lighthill-Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. The resulting framework is very flexible, and can in particular be used to detect spoofing attacks in real time, or carry out attacks on location tracks. Numerical implementations are performed on experimental data from the Mobile Century experiment to validate this framework. © 2013 ACM.
Original languageEnglish (US)
Title of host publicationProceedings of the 2nd ACM international conference on High confidence networked systems - HiCoNS '13
PublisherAssociation for Computing Machinery (ACM)
Pages25-31
Number of pages7
ISBN (Print)9781450319614
DOIs
StatePublished - 2013

Bibliographical note

KAUST Repository Item: Exported on 2020-10-01

Fingerprint

Dive into the research topics of 'A framework for privacy and security analysis of probe-based traffic information systems'. Together they form a unique fingerprint.

Cite this