Putting the User in Control of the Intelligent Transportation System

  • Catalin Gosman
  • Tudor Cornea
  • Ciprian Dobre
  • Florin PopEmail author
  • Aniello Castiglione
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9722)


Intelligent Transportation Systems (ITS) demonstrate innovative services for different modes of transport and traffic management. They enable users to be better informed and make safer, coordinated, and smarter use of transport networks. However, for such systems to be effective, security and privacy considerations have to be enforced. GPS data can lead to accurate traffic models, but such data can also be used by malicious advisories to gain knowledge about the whereabouts of users. In this paper, we propose a model and related constructs for users to define sharing policies for the data they contribute. The model allows entities to define data sharing policies associated with personal information captured by an ITS application. While ITS applications need to use specific data under various quality and context-based constraints, the user-oriented security policies could specify additional usage constraints, and our solution is an approach to mediate between these two sides. Secondly, we propose an algorithm to manage the trust level in the data contributed by users. The solution is based on the quality parameters of the information disseminated in the system, e.g. spatial whereabouts and timestamp for the transmitted data regarding various events happening in the system, combined with the reputation specific to the sources that transmit data. We evaluate a pilot security implementation of the model under real-world assumptions.


Security Traffic Sharing Policies Trust in information 



The research in this paper is supported by national projects MobiWay - Mobility beyond Individualism (PN-II-PT-PCCA-2013-4-0321), and DataWay - Real-time Data Processing Platform for Smart Cities: Making sense of Big Data (PN-II-RU-TE-2014-4-2731).


  1. 1.
    Bonne, B., Barzan, A., Quax, P., Lamotte, W., Wifipi: involuntary tracking of visitors at mass events. In: 2013 IEEE 14th International Symposium and Workshops on World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6. IEEE (2013)Google Scholar
  2. 2.
    Caballero-Gil, P., Caballero-Gil, C., Molina-Gil, J., Hernández-Goya, C.: Flexible authentication in vehicular ad hoc networks. In: 15th Asia-Pacific Conference on Communications, APCC 2009, pp. 576–879. IEEE (2009)Google Scholar
  3. 3.
    DataWay: Dataway (2015).
  4. 4.
    De Cristofaro, E., Soriente, C.: Extended capabilities for a privacy-enhanced participatory sensing infrastructure (pepsi). IEEE Trans. Inf. Forensics Secur. 8(12), 2021–2033 (2013)CrossRefGoogle Scholar
  5. 5.
    Fratila, C., Dobre, C., Pop, F., Cristea, V.: A transportation control system for urban environments. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 117–124. IEEE (2012)Google Scholar
  6. 6.
    Gerlach, M., Festag, A., Leinmüller, T., Goldacker, G., Harsch, C.: Security architecture for vehicular communication. In: Workshop on Intelligent Transportation (2007)Google Scholar
  7. 7.
    Haklay, M., Weber, P.: Openstreetmap: user-generated street maps. IEEE Pervasive Comput. 7(4), 12–18 (2008)CrossRefGoogle Scholar
  8. 8.
    Krause, M., Hochstatter, I.: Challenges in modelling and using quality of context (QoC). In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I.S. (eds.) MATA 2005. LNCS, vol. 3744, pp. 324–333. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Krontiris, I., Dimitriou, T.: A platform for privacy protection of data requesters and data providers in mobile sensing. Computer Communications (2015)Google Scholar
  10. 10.
    Li, Q., Cao, G.: Providing privacy-aware incentives for mobile sensing. In: 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 76–84. IEEE (2013)Google Scholar
  11. 11.
    MobiWay. Mobiway (2014).
  12. 12.
    Mun, M., Hao, S., Mishra, N., Shilton, K., Burke, J., Estrin, D., Hansen, M., Govindan, R.: Personal data vaults: a locus of control for personal data streams. In: Proceedings of the 6th International Conference, p. 17. ACM (2010)Google Scholar
  13. 13.
    Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Workshop on Hot Topics in Networks (HotNets-IV), pp. 1–6 (2005)Google Scholar
  14. 14.
    Patrushev, A.: Shortest path search for real road networks and dynamic costs with pgrouting. In: Proceedings of the 2008 Free and Open Source Software for Geospatial Conference (2008)Google Scholar
  15. 15.
    Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRefGoogle Scholar
  16. 16.
    Siebel, N.T., Maybank, S.: The advisor visual surveillance system. In: ECCV 2004 Workshop Applications of Computer Vision (ACV), vol. 1. Citeseer (2004)Google Scholar
  17. 17.
    Stampoulis, A., Chai, Z.: A survey of security in vehicular networks. Project CPSC, 534 (2007)Google Scholar
  18. 18.
    Wang, N.-W., Huang, Y.-M., Chen, W.-M.: A novel secure communication scheme in vehicular ad hoc networks. Comput. Commun. 31(12), 2827–2837 (2008)CrossRefGoogle Scholar
  19. 19.
    Wang, X., Cheng, W., Mohapatra, P., Abdelzaher, T., Artsense: anonymous reputation and trust in participatory sensing. In: 2013 Proceedings IEEE INFOCOM, pp. 2517–2525. IEEE (2013)Google Scholar
  20. 20.
    Wang, Y.-K.: Context awareness and adaptation in mobile learning. In: Proceedings of the 2nd IEEE International Workshop on Wireless and Mobile Technologies in Education, pp. 154–158. IEEE (2004)Google Scholar
  21. 21.
    Yang, D., Fang, X., Xue, G.: Truthful incentive mechanisms for k-anonymity location privacy. In: 2013 Proceedings IEEE INFOCOM, pp. 2994–3002. IEEE (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Catalin Gosman
    • 1
  • Tudor Cornea
    • 1
  • Ciprian Dobre
    • 1
  • Florin Pop
    • 1
    Email author
  • Aniello Castiglione
    • 2
  1. 1.Computer Science DeparmentUniversity Politehnica of BucharestBucharestRomania
  2. 2.Department of Computer ScienceUniversity of SalernoFisciano, SalernoItaly

Personalised recommendations