Abstract
Just as the world of consumer devices was forever changed by the introduction of computer controlled solutions, the introduction of the engine control unit (ECU) gave rise to the automobile’s transformation from a transportation product to a technology platform. A modern car is capable of processing, analysing and transmitting data in ways that could not have been foreseen only a few years ago. These cars often incorporate telematics systems, which are used to provide navigation and internet connectivity over cellular networks, as well as data-recording devices for insurance and product development purposes. We examine the telematics system of a production vehicle, and aim to ascertain some of the associated privacy-related threats. We also consider how this analysis might underpin further research.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
References
Albright, B.: Protecting connected cars. Aftermarket Bus. World 126(2), 10–11 (2017)
Alheeti, A., Khattab, M., Mcdonald-Maier, K.: Intelligent intrusion detection in external communication systems for autonomous vehicles. Syst. Sci. Control Eng. 6(1), 48–56 (2018)
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Benenson, Z., Gassmann, F., Reinfelder, L.: Android and iOS users’ differences concerning security and privacy. In: CHI 2013 Extended Abstracts on Human Factors in Computing Systems, pp. 817–822. Communications of the ACM, New York (2013)
Camp, L.J.: Respecting people and respecting privacy. Commun. ACM 58(7), 27–28 (2015)
Glancy, D.: Privacy in autonomous vehicles. Santa Clara Law Rev. 52(4), 1171–1239 (2012)
Haberle, T., Charissis, L., Fehling, C., Nahm, J., Leymann, F.: The connected car in the cloud: a platform for prototyping telematics services. IEEE Softw. 32(6), 11–17 (2015). https://doi.org/10.1109/MS.2015.137
Hubaux, J.P., Juels, A.: Privacy is dead, long live privacy. Commun. ACM 59(6), 39–41 (2016). https://doi.org/10.1145/2834114
Joy, J., Gerla, M.: Internet of vehicles and autonomous connected car - privacy and security issues. In: 2017 26th International Conference on Computer Communication and Networks (ICCCN), pp. 1–9, July 2017. https://doi.org/10.1109/ICCCN.2017.8038391
Kaplun, V., Segal, M.: Breaching the privacy of connected vehicles network. Telecommun. Syst. 70(4), 541–555 (2019)
Kasinathan, P., Pastrone, C., Spririto, M.A., Vinkovits, M.: Denial-of-service detection within the Internet of Things. In: Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2013), pp. 600–607. IEEE (2013)
Larkin, J.: Mapping the legal framework for autonomous vehicles. Automot. Ind. 195(2), 24–25 (2017)
Lim, J., Yu, H., Kim, K., Kim, M., Lee, S.: Preserving location privacy of connected vehicles with highly accurate location updates. IEEE Commun. Lett. 21(3), 540–543 (2017). https://doi.org/10.1109/LCOMM.2016.2637902
Mena, D.M., Papapanagiotou, I., Yang, B.: Internet of Things: survey on security. Inf. Secur. J.: Global Perspect. 27(3), 162–182 (2018). https://doi.org/10.1080/19393555.2018.1458258
Miorandi, D., Sicari, S., Pellegrini, F.D., Chlamtac, I.: Internet of Things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012). https://doi.org/10.1016/j.adhoc.2012.02.016
Othmane, L.B., Weffers, H., Mohamad, M.M., Wolf, M.: A survey of security and privacy in connected vehicles. In: Benhaddou, D., Al-Fuqaha, A. (eds.) Wireless Sensor and Mobile Ad-Hoc Networks, pp. 217–247. Springer, New York (2015). https://doi.org/10.1007/978-1-4939-2468-4_10
Ring, T.: Connected cars - the next target for hackers. Netw. Secur. 2015(11), 11–16 (2015)
Suo, H., Wan, J., Zou, C., Liu, J.: Security in the Internet of Things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 3, pp. 648–651, March 2012
Wang, E.S.T., Lin, R.L.: Perceived quality factors of location-based apps on trust, perceived privacy risk, and continuous usage intention. Behav. Inf. Technol. 36(1), 2–10 (2017)
Weber, R.H.: Internet of Things: new security and privacy challenges. Comput. Law Secur. Rev. 6(1), 23–30 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Quinlan, M., Zhao, J., Simpson, A. (2019). Connected Vehicles: A Privacy Analysis. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11637. Springer, Cham. https://doi.org/10.1007/978-3-030-24900-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-24900-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24899-4
Online ISBN: 978-3-030-24900-7
eBook Packages: Computer ScienceComputer Science (R0)