Abstract
Vehicular communication in intelligent transport system offers data dissemination among vehicles in rapid transmission of road incident log to trusted entities. The adversary attacks having background knowledge are often a side effect due to re-identity and linkage attacks by innocuous public data sharing provisions. The proposed work spotlight on attacks with background knowledge who attempts to extract individual’s data using high end data extraction algorithms by linking with the vehicular trip database. Enhancing location privacy and individual privacy is achievable with k-anonymity perturbation scheme applied on vehicular database, which shows trivial for data leakage attacks, and the proposed algorithm significantly reduces the vehicle uniqueness to zero in achieving the sanitization process of vehicular database to avoid pre-knowledge attacks by intruder of ITS. This approach shows resilience in implementing the privacy preservation with lightweight process implementation and non-polynomial time complexity for DENIM messages. The data distortion caused due to perturbation is analyzed and reported in this work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Road traffic injuries. https://www.who.int/news-room/fact-sheets/detail/road-traffic-injuries
IEEE 1609 Working Group. IEEE Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages (2016)
Haas JJ, Hu YC, Laberteaux KP (2009) Design and analysis of a lightweight certificate revocation mechanism for VANET. In: Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking, pp 89–98
Car2Car Communication Consortium. https://www.car-car/org
ETSI EN 102 637–2. Intelligent Transport Systems (ITS); Vehicular communications; basic set of applications; Part 2: Specification of cooperative awareness basic service
Lonc B, Cincilla P (2016) Cooperative its security framework: Standards and implementations progress in europe. In: 2016 IEEE 17th ınternational symposium on a world of wireless, mobile and multimedia networks (WoWMoM), pp 1–6. IEEE
Hoh B, Gruteser M, Xiong H, Alrabady A (2006) Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Comput 5(4):38–46
Lin X, Sun X, Ho PH, Shen X (2007) GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456
Lu R, Lin X, Zhu H, Ho PH, Shen X (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008-The 27th conference on computer communications, pp 1229–1237. IEEE Press
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Palla, N.B., Rao, B.K., Raju, K.G., Vinaya Babu, A. (2021). Privacy by Design Approach for Vehicular Tripdata Using k-Anonymity Perturbation. In: Reddy, K.A., Devi, B.R., George, B., Raju, K.S. (eds) Data Engineering and Communication Technology. Lecture Notes on Data Engineering and Communications Technologies, vol 63. Springer, Singapore. https://doi.org/10.1007/978-981-16-0081-4_12
Download citation
DOI: https://doi.org/10.1007/978-981-16-0081-4_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0080-7
Online ISBN: 978-981-16-0081-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)