Home > Research > Publications & Outputs > Privacy Challenges with Protecting Live Vehicul...

Links

Text available via DOI:

View graph of relations

Privacy Challenges with Protecting Live Vehicular Location Context

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Privacy Challenges with Protecting Live Vehicular Location Context. / Bradbury, Matthew; Taylor, Phillip; Atmaca, Ugur Ilker et al.
In: IEEE Access, Vol. 8, 27.11.2020, p. 207465-207484.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Bradbury, M, Taylor, P, Atmaca, UI, Maple, C & Griffiths, N 2020, 'Privacy Challenges with Protecting Live Vehicular Location Context', IEEE Access, vol. 8, pp. 207465-207484. https://doi.org/10.1109/ACCESS.2020.3038533

APA

Bradbury, M., Taylor, P., Atmaca, U. I., Maple, C., & Griffiths, N. (2020). Privacy Challenges with Protecting Live Vehicular Location Context. IEEE Access, 8, 207465-207484. https://doi.org/10.1109/ACCESS.2020.3038533

Vancouver

Bradbury M, Taylor P, Atmaca UI, Maple C, Griffiths N. Privacy Challenges with Protecting Live Vehicular Location Context. IEEE Access. 2020 Nov 27;8:207465-207484. Epub 2020 Nov 17. doi: 10.1109/ACCESS.2020.3038533

Author

Bradbury, Matthew ; Taylor, Phillip ; Atmaca, Ugur Ilker et al. / Privacy Challenges with Protecting Live Vehicular Location Context. In: IEEE Access. 2020 ; Vol. 8. pp. 207465-207484.

Bibtex

@article{77f7adbc357941a1acb356bb5d54c97d,
title = "Privacy Challenges with Protecting Live Vehicular Location Context",
abstract = "Future Intelligent Transport Systems (ITS) will require that vehicles are equipped with Dedicated Short Range Communications (DSRC). With these DSRC capabilities, new privacy threats are emerging that can be taken advantage of by threat actors with little experience and cheap components.However, the origins of these privacy threats are not limited to the vehicle and its communications, but extend to non-vehicular devices carried by the driver and passengers. A shortcoming of existing work is that it tends to focus on a specific aspect of privacy leakage when attempting to protect location privacy. In doingso, interactions between privacy threats are not considered. In this work, we investigate the privacy surface of a vehicle by considering the many different ways in which location privacy can be leaked. Following this, we identify techniques to protect privacy and that it is insufficient to provide location privacy against a single threat vector. A methodology to calculate the interactions of privacy preserving techniques is used to highlight the need to consider the wider threat landscape and for techniques to collaborate to ensure location privacy is provided against multiple sources of privacy threats where possible.",
keywords = "Location privacy, connected vehicles, privacy surface, technique interaction",
author = "Matthew Bradbury and Phillip Taylor and Atmaca, {Ugur Ilker} and Carsten Maple and Nathan Griffiths",
year = "2020",
month = nov,
day = "27",
doi = "10.1109/ACCESS.2020.3038533",
language = "English",
volume = "8",
pages = "207465--207484",
journal = "IEEE Access",
issn = "2169-3536",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

RIS

TY - JOUR

T1 - Privacy Challenges with Protecting Live Vehicular Location Context

AU - Bradbury, Matthew

AU - Taylor, Phillip

AU - Atmaca, Ugur Ilker

AU - Maple, Carsten

AU - Griffiths, Nathan

PY - 2020/11/27

Y1 - 2020/11/27

N2 - Future Intelligent Transport Systems (ITS) will require that vehicles are equipped with Dedicated Short Range Communications (DSRC). With these DSRC capabilities, new privacy threats are emerging that can be taken advantage of by threat actors with little experience and cheap components.However, the origins of these privacy threats are not limited to the vehicle and its communications, but extend to non-vehicular devices carried by the driver and passengers. A shortcoming of existing work is that it tends to focus on a specific aspect of privacy leakage when attempting to protect location privacy. In doingso, interactions between privacy threats are not considered. In this work, we investigate the privacy surface of a vehicle by considering the many different ways in which location privacy can be leaked. Following this, we identify techniques to protect privacy and that it is insufficient to provide location privacy against a single threat vector. A methodology to calculate the interactions of privacy preserving techniques is used to highlight the need to consider the wider threat landscape and for techniques to collaborate to ensure location privacy is provided against multiple sources of privacy threats where possible.

AB - Future Intelligent Transport Systems (ITS) will require that vehicles are equipped with Dedicated Short Range Communications (DSRC). With these DSRC capabilities, new privacy threats are emerging that can be taken advantage of by threat actors with little experience and cheap components.However, the origins of these privacy threats are not limited to the vehicle and its communications, but extend to non-vehicular devices carried by the driver and passengers. A shortcoming of existing work is that it tends to focus on a specific aspect of privacy leakage when attempting to protect location privacy. In doingso, interactions between privacy threats are not considered. In this work, we investigate the privacy surface of a vehicle by considering the many different ways in which location privacy can be leaked. Following this, we identify techniques to protect privacy and that it is insufficient to provide location privacy against a single threat vector. A methodology to calculate the interactions of privacy preserving techniques is used to highlight the need to consider the wider threat landscape and for techniques to collaborate to ensure location privacy is provided against multiple sources of privacy threats where possible.

KW - Location privacy

KW - connected vehicles

KW - privacy surface

KW - technique interaction

U2 - 10.1109/ACCESS.2020.3038533

DO - 10.1109/ACCESS.2020.3038533

M3 - Journal article

VL - 8

SP - 207465

EP - 207484

JO - IEEE Access

JF - IEEE Access

SN - 2169-3536

ER -