Abstract
A vehicle in road networks shares location data with other vehicles and location-based services (LBS) through Internet-of-vehicles (IoV). By analyzing the location data from vehicles, LBS providers can offer vehicles better services. However, fake trajectories created by adversaries and malicious drivers diminish the location data utility in IoV and breach the quality of LBS. Illegal trajectory detection is vital to ensure location data utility in IoV. Existing location privacy-preserving schemes like obfuscation schemes add noise to actual location data increasing difficulties in detecting illegal trajectories. In this paper, we detect illegal trajectory in the case that all drivers in road networks protect location privacy by using obfuscation. We propose a new personalized obfuscation mechanism to dynamically and adaptively protect the location privacy of drivers in road networks. Considering uneven protection, we propose a trajectory detection scheme to classify trajectories in IoV. We evaluate our detection method with the data of real-world road networks, which is an important scenario of smart cities. The experiment results show that the proposed classifier outperforms existing studies in detecting malicious obfuscated trajectories with at least 94% of the Area Under the Curve (AUC) score.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Open Street Map is an open source database of the world’s geographic map. https://www.openstreetmap.org/.
- 2.
Portugal taxi trajectory dataset[Online]. Available: https://www.kaggle.com/c/pkdd-15-predict-taxi-service-trajectory-i.
- 3.
The intersection stands for the points of the two trajectories whose distance are within a certain range.
References
Teng H, Dong M, Liu Y, Tian W, Liu X (2021) A low-cost physical location discovery scheme for large-scale internet of things in smart city through joint use of vehicles and uavs. Futur Gener Comput Syst 118:310–326
Sharma L, Javali A, Nyamangoudar R, Priya R, Mishra P, Routray SK (2017) An update on location based services: Current state and future prospects. In: 2017 international conference on computing methodologies and communication (ICCMC). IEEE, pp 220–224
Wang Y, Cai Z, Tong X, Gao Y, Yin G (2018) Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems. Comput Netw 135:32–43
Liu Z, Lei W, Ke J, Wenlei Q, Wang W, Wang H (2019) Accountable outsourcing location-based services with privacy preservation. IEEE Access 7:117258–117273
Xiong Z, Cai Z, Han Q, Alrawais A, Li W (2020) Adgan: protect your location privacy in camera data of auto-driving vehicles. IEEE Trans Industr Inf 17(9):6200–6210
Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: Differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp 901–914
Al-Dhubhani R, Cazalas JM (2018). An adaptive geo-indistinguishability mechanism for continuous LBS queries. Wirel Netw 24(8):3221–3239
Adegoke Y (2017) Uber drivers in lagos are using a fake GPS app to inflate rider fares. Quartz Africa, November, 13
Ge Y, Xiong H, Liu C, Zhou Z-H (2011) A taxi driving fraud detection system. In: 2011 IEEE 11th international conference on data mining. IEEE, pp 181–190
Targio Hashem IA, Chang V, Badrul Anuar N, Adewole K, Yaqoob I, Gani A, Ahmed E, Chiroma H (2016) The role of big data in smart city. Int J Inf Manag 36(5):748–758
Wang S, Qin H, Sun Y, Huang J (2018) Privacy preservation in location-based services. IEEE Commun Mag 56(3):134–140
Dwork C (2006) Differential privacy, vol 2006, pp 1–12. ICALP
Yu L, Liu L, Pu C (2017) Dynamic differential; location privacy with personalized error bounds. In: Network and distributed system security symposium (NDSS)
Shokri R, Theodorakopoulos G, Le Boudec J-Y, Hubaux J-P (2011) Quantifying location privacy. In: 2011 IEEE symposium on security and privacy. IEEE, pp 247–262
Xiao Y, Xiong L, Zhang S, Cao Y (2017) Loclok: location cloaking with differential privacy via hidden Markov model. Proc VLDB Endowment 10(12):1901–1904
Chen C, Zhang D, Castro PS, Li N, Sun L, Li S (2011) Real-time detection of anomalous taxi trajectories from gps traces. In: International conference on mobile and ubiquitous systems: computing, networking, and services. Springer, pp 63–74
Mao J, Wang T, Jin C, Zhou A (2017) Feature grouping-based outlier detection upon streaming trajectories. IEEE Trans Knowl Data Eng 29(12):2696–2709
Yao D, Zhang C, Zhu Z, Qin H, Wang Z, Huang J, Bi J (2018) Learning deep representation for trajectory clustering. Expert Syst 35(2):e12252
LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278–2324
Nikhil N, Morris BT (2018) Convolutional neural network for trajectory prediction. In: Proceedings of the European conference on computer vision (ECCV) workshops
Suo D, Elena Renda M, Zhao J (2021) Quantifying the tradeoff between cybersecurity and location privacy. arXiv:2105.01262
Zurbarán M, Avila K, Wightman P, Fernandez M (2015) Near-rand: noise-based location obfuscation based on random neighboring points. IEEE Latin Am Trans 13(11):3661–3667
Zhao Y, Ma B, Wang Z, Liu Z, Zeng Y, Ma J (2022) Trajectory obfuscation and detection in internet-of-vehicles. In: 2022 IEEE 25th international conference on computer supported cooperative work in design (CSCWD). IEEE, pp 769–774
He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 770–778
Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556
Selvaraju RR, Cogswell M, Das A, Vedantam R, Parikh D, Batra D (2017) Grad-cam: visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE international conference on computer vision (ICCV), pp 618–626
Maier G (2014) Openstreetmap, the wikipedia map. Region 1(1):R3–R10 Dec
Oh M-H, Iyengar G (2019) Sequential anomaly detection using inverse reinforcement learning. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, pp 1480–1490
Gray K, Smolyak D, Badirli S, Mohler G (2018) Coupled IGMM-GANS for deep multimodal anomaly detection in human mobility data. arXiv:1809.02728
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Ma, B. et al. (2023). Vehicle Trajectory Obfuscation and Detection. In: Ahmed, M., Haskell-Dowland, P. (eds) Cybersecurity for Smart Cities. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-24946-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-24946-4_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-24945-7
Online ISBN: 978-3-031-24946-4
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)