Skip to main content

Connected Vehicles: A Privacy Analysis

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11637))

Abstract

Just as the world of consumer devices was forever changed by the introduction of computer controlled solutions, the introduction of the engine control unit (ECU) gave rise to the automobile’s transformation from a transportation product to a technology platform. A modern car is capable of processing, analysing and transmitting data in ways that could not have been foreseen only a few years ago. These cars often incorporate telematics systems, which are used to provide navigation and internet connectivity over cellular networks, as well as data-recording devices for insurance and product development purposes. We examine the telematics system of a production vehicle, and aim to ascertain some of the associated privacy-related threats. We also consider how this analysis might underpin further research.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.lepoint.fr/high-tech-internet/geolocalisation-la-cnil-rend-une-sanction-exemplaire-31-07-2014-1850400_47.php.

  2. 2.

    http://www.qnx.com/news/events/japan-summit/en/presentations/Connectivity%20in%20automotive_en.pdf.

  3. 3.

    http://www.osnews.com/story/28133/Ford_ditches_Microsoft_for_QNX_in_latest_in-vehicle_tech_platform.html.

  4. 4.

    https://www.automotivelinux.org/announcements/2018/12/17/agl-grows-with-five-new-members.

  5. 5.

    https://www.mckinsey.com/~/media/McKinsey/Industries/Automotive%20and%20Assembly/Our%20Insights/Monetizing%20car%20data/Monetizing-car-data.ashx.

  6. 6.

    https://myc-profile.bmwgroup.com/api/gateway/contentserver/staticcontent/Angular/gdpr/v2/?target=bmw-browser#/legal-docs-content?version=2018.05.15&fileName=Bmw_cd_pp_gb-en.json.

  7. 7.

    http://www.buckingham.ac.uk/wp-content/uploads/2014/11/pnc-2014-usedcar.pdf.

References

  1. Albright, B.: Protecting connected cars. Aftermarket Bus. World 126(2), 10–11 (2017)

    Google Scholar 

  2. Alheeti, A., Khattab, M., Mcdonald-Maier, K.: Intelligent intrusion detection in external communication systems for autonomous vehicles. Syst. Sci. Control Eng. 6(1), 48–56 (2018)

    Article  Google Scholar 

  3. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  4. Benenson, Z., Gassmann, F., Reinfelder, L.: Android and iOS users’ differences concerning security and privacy. In: CHI 2013 Extended Abstracts on Human Factors in Computing Systems, pp. 817–822. Communications of the ACM, New York (2013)

    Google Scholar 

  5. Camp, L.J.: Respecting people and respecting privacy. Commun. ACM 58(7), 27–28 (2015)

    Article  Google Scholar 

  6. Glancy, D.: Privacy in autonomous vehicles. Santa Clara Law Rev. 52(4), 1171–1239 (2012)

    Google Scholar 

  7. Haberle, T., Charissis, L., Fehling, C., Nahm, J., Leymann, F.: The connected car in the cloud: a platform for prototyping telematics services. IEEE Softw. 32(6), 11–17 (2015). https://doi.org/10.1109/MS.2015.137

    Article  Google Scholar 

  8. Hubaux, J.P., Juels, A.: Privacy is dead, long live privacy. Commun. ACM 59(6), 39–41 (2016). https://doi.org/10.1145/2834114

    Article  Google Scholar 

  9. Joy, J., Gerla, M.: Internet of vehicles and autonomous connected car - privacy and security issues. In: 2017 26th International Conference on Computer Communication and Networks (ICCCN), pp. 1–9, July 2017. https://doi.org/10.1109/ICCCN.2017.8038391

  10. Kaplun, V., Segal, M.: Breaching the privacy of connected vehicles network. Telecommun. Syst. 70(4), 541–555 (2019)

    Article  Google Scholar 

  11. Kasinathan, P., Pastrone, C., Spririto, M.A., Vinkovits, M.: Denial-of-service detection within the Internet of Things. In: Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2013), pp. 600–607. IEEE (2013)

    Google Scholar 

  12. Larkin, J.: Mapping the legal framework for autonomous vehicles. Automot. Ind. 195(2), 24–25 (2017)

    Google Scholar 

  13. Lim, J., Yu, H., Kim, K., Kim, M., Lee, S.: Preserving location privacy of connected vehicles with highly accurate location updates. IEEE Commun. Lett. 21(3), 540–543 (2017). https://doi.org/10.1109/LCOMM.2016.2637902

    Article  Google Scholar 

  14. Mena, D.M., Papapanagiotou, I., Yang, B.: Internet of Things: survey on security. Inf. Secur. J.: Global Perspect. 27(3), 162–182 (2018). https://doi.org/10.1080/19393555.2018.1458258

    Article  Google Scholar 

  15. Miorandi, D., Sicari, S., Pellegrini, F.D., Chlamtac, I.: Internet of Things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012). https://doi.org/10.1016/j.adhoc.2012.02.016

    Article  Google Scholar 

  16. Othmane, L.B., Weffers, H., Mohamad, M.M., Wolf, M.: A survey of security and privacy in connected vehicles. In: Benhaddou, D., Al-Fuqaha, A. (eds.) Wireless Sensor and Mobile Ad-Hoc Networks, pp. 217–247. Springer, New York (2015). https://doi.org/10.1007/978-1-4939-2468-4_10

    Chapter  Google Scholar 

  17. Ring, T.: Connected cars - the next target for hackers. Netw. Secur. 2015(11), 11–16 (2015)

    Article  Google Scholar 

  18. Suo, H., Wan, J., Zou, C., Liu, J.: Security in the Internet of Things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 3, pp. 648–651, March 2012

    Google Scholar 

  19. Wang, E.S.T., Lin, R.L.: Perceived quality factors of location-based apps on trust, perceived privacy risk, and continuous usage intention. Behav. Inf. Technol. 36(1), 2–10 (2017)

    Google Scholar 

  20. Weber, R.H.: Internet of Things: new security and privacy challenges. Comput. Law Secur. Rev. 6(1), 23–30 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mark Quinlan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Quinlan, M., Zhao, J., Simpson, A. (2019). Connected Vehicles: A Privacy Analysis. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11637. Springer, Cham. https://doi.org/10.1007/978-3-030-24900-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24900-7_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24899-4

  • Online ISBN: 978-3-030-24900-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics