Skip to main content

Vehicle Trajectory Obfuscation and Detection

  • Chapter
  • First Online:
Cybersecurity for Smart Cities

Abstract

A vehicle in road networks shares location data with other vehicles and location-based services (LBS) through Internet-of-vehicles (IoV). By analyzing the location data from vehicles, LBS providers can offer vehicles better services. However, fake trajectories created by adversaries and malicious drivers diminish the location data utility in IoV and breach the quality of LBS. Illegal trajectory detection is vital to ensure location data utility in IoV. Existing location privacy-preserving schemes like obfuscation schemes add noise to actual location data increasing difficulties in detecting illegal trajectories. In this paper, we detect illegal trajectory in the case that all drivers in road networks protect location privacy by using obfuscation. We propose a new personalized obfuscation mechanism to dynamically and adaptively protect the location privacy of drivers in road networks. Considering uneven protection, we propose a trajectory detection scheme to classify trajectories in IoV. We evaluate our detection method with the data of real-world road networks, which is an important scenario of smart cities. The experiment results show that the proposed classifier outperforms existing studies in detecting malicious obfuscated trajectories with at least 94% of the Area Under the Curve (AUC) score.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Open Street Map is an open source database of the world’s geographic map. https://www.openstreetmap.org/.

  2. 2.

    Portugal taxi trajectory dataset[Online]. Available: https://www.kaggle.com/c/pkdd-15-predict-taxi-service-trajectory-i.

  3. 3.

    The intersection stands for the points of the two trajectories whose distance are within a certain range.

References

  1. Teng H, Dong M, Liu Y, Tian W, Liu X (2021) A low-cost physical location discovery scheme for large-scale internet of things in smart city through joint use of vehicles and uavs. Futur Gener Comput Syst 118:310–326

    Article  Google Scholar 

  2. Sharma L, Javali A, Nyamangoudar R, Priya R, Mishra P, Routray SK (2017) An update on location based services: Current state and future prospects. In: 2017 international conference on computing methodologies and communication (ICCMC). IEEE, pp 220–224

    Google Scholar 

  3. Wang Y, Cai Z, Tong X, Gao Y, Yin G (2018) Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems. Comput Netw 135:32–43

    Article  Google Scholar 

  4. Liu Z, Lei W, Ke J, Wenlei Q, Wang W, Wang H (2019) Accountable outsourcing location-based services with privacy preservation. IEEE Access 7:117258–117273

    Article  Google Scholar 

  5. Xiong Z, Cai Z, Han Q, Alrawais A, Li W (2020) Adgan: protect your location privacy in camera data of auto-driving vehicles. IEEE Trans Industr Inf 17(9):6200–6210

    Article  Google Scholar 

  6. Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: Differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp 901–914

    Google Scholar 

  7. Al-Dhubhani R, Cazalas JM (2018). An adaptive geo-indistinguishability mechanism for continuous LBS queries. Wirel Netw 24(8):3221–3239

    Google Scholar 

  8. Adegoke Y (2017) Uber drivers in lagos are using a fake GPS app to inflate rider fares. Quartz Africa, November, 13

    Google Scholar 

  9. Ge Y, Xiong H, Liu C, Zhou Z-H (2011) A taxi driving fraud detection system. In: 2011 IEEE 11th international conference on data mining. IEEE, pp 181–190

    Google Scholar 

  10. Targio Hashem IA, Chang V, Badrul Anuar N, Adewole K, Yaqoob I, Gani A, Ahmed E, Chiroma H (2016) The role of big data in smart city. Int J Inf Manag 36(5):748–758

    Google Scholar 

  11. Wang S, Qin H, Sun Y, Huang J (2018) Privacy preservation in location-based services. IEEE Commun Mag 56(3):134–140

    Article  Google Scholar 

  12. Dwork C (2006) Differential privacy, vol 2006, pp 1–12. ICALP

    Google Scholar 

  13. Yu L, Liu L, Pu C (2017) Dynamic differential; location privacy with personalized error bounds. In: Network and distributed system security symposium (NDSS)

    Google Scholar 

  14. Shokri R, Theodorakopoulos G, Le Boudec J-Y, Hubaux J-P (2011) Quantifying location privacy. In: 2011 IEEE symposium on security and privacy. IEEE, pp 247–262

    Google Scholar 

  15. Xiao Y, Xiong L, Zhang S, Cao Y (2017) Loclok: location cloaking with differential privacy via hidden Markov model. Proc VLDB Endowment 10(12):1901–1904

    Article  Google Scholar 

  16. Chen C, Zhang D, Castro PS, Li N, Sun L, Li S (2011) Real-time detection of anomalous taxi trajectories from gps traces. In: International conference on mobile and ubiquitous systems: computing, networking, and services. Springer, pp 63–74

    Google Scholar 

  17. Mao J, Wang T, Jin C, Zhou A (2017) Feature grouping-based outlier detection upon streaming trajectories. IEEE Trans Knowl Data Eng 29(12):2696–2709

    Article  Google Scholar 

  18. Yao D, Zhang C, Zhu Z, Qin H, Wang Z, Huang J, Bi J (2018) Learning deep representation for trajectory clustering. Expert Syst 35(2):e12252

    Article  Google Scholar 

  19. LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278–2324

    Article  Google Scholar 

  20. Nikhil N, Morris BT (2018) Convolutional neural network for trajectory prediction. In: Proceedings of the European conference on computer vision (ECCV) workshops

    Google Scholar 

  21. Suo D, Elena Renda M, Zhao J (2021) Quantifying the tradeoff between cybersecurity and location privacy. arXiv:2105.01262

  22. Zurbarán M, Avila K, Wightman P, Fernandez M (2015) Near-rand: noise-based location obfuscation based on random neighboring points. IEEE Latin Am Trans 13(11):3661–3667

    Article  Google Scholar 

  23. Zhao Y, Ma B, Wang Z, Liu Z, Zeng Y, Ma J (2022) Trajectory obfuscation and detection in internet-of-vehicles. In: 2022 IEEE 25th international conference on computer supported cooperative work in design (CSCWD). IEEE, pp 769–774

    Google Scholar 

  24. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 770–778

    Google Scholar 

  25. Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556

  26. Selvaraju RR, Cogswell M, Das A, Vedantam R, Parikh D, Batra D (2017) Grad-cam: visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE international conference on computer vision (ICCV), pp 618–626

    Google Scholar 

  27. Maier G (2014) Openstreetmap, the wikipedia map. Region 1(1):R3–R10 Dec

    Article  Google Scholar 

  28. Oh M-H, Iyengar G (2019) Sequential anomaly detection using inverse reinforcement learning. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, pp 1480–1490

    Google Scholar 

  29. Gray K, Smolyak D, Badirli S, Mohler G (2018) Coupled IGMM-GANS for deep multimodal anomaly detection in human mobility data. arXiv:1809.02728

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baihe Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ma, B. et al. (2023). Vehicle Trajectory Obfuscation and Detection. In: Ahmed, M., Haskell-Dowland, P. (eds) Cybersecurity for Smart Cities. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-24946-4_9

Download citation

Publish with us

Policies and ethics