Journal
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume 69, Issue 9, Pages 10336-10347Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2020.3005363
Keywords
Vehicles; Privacy; Roads; Encryption; Monitoring; Efficiency; privacy; traffic management; traffic flow statistics; verifiability
Categories
Funding
- National Natural Science Foundation of China [61272512, 61402037]
- Natural Sciences and Engineering Research Council of Canada (NSERC)
- China Scholarship Council
Ask authors/readers for more resources
Crowdsourcing-based traffic monitoring plays an important role in advanced traffic management systems due to its high accuracy and low costs, but it may expose drivers real identities and sensitive locations that results in the privacy leakage of drivers. In this paper, we propose a crowdsourcing-based traffic monitoring scheme that enables a transportation management center (TMC) to achieve traffic flow statistics at road intersections in an efficient, verifiable, and privacy-preserving manner. Specifically, by integrating a homomorphic encryption primitive and a super-increasing sequence, traffic flow can be flexibly structured and encrypted by drivers, i.e., each drivers travel direction at T-junctions or crossroads is protected. As a middle-ware between drivers and TMC, roadside units (RSUs) are introduced to aggregate and further perturb the aggregated encrypted traffic flow based on a differential privacy mechanism. In this way, TMC is capable of acquiring the traffic flow statistics by decrypting the perturbed encrypted traffic flow, without disclosing each individual drivers traffic information. In addition, based on a lightweight commitment proof, the correctness of the encrypted drivers data can be guaranteed, i.e., a selfish driver cannot arbitrarily manipulate his data to poison the aggregated traffic flow. Finally, security analysis demonstrates that the proposed scheme satisfies all desirable security properties, including confidentiality, verifiability, unlinkability, and traceability. Extensive simulations are also conducted to show that the proposed scheme is efficient in terms of low computation and communication costs.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available