4.7 Article

Verifiable and Privacy-Preserving Traffic Flow Statistics for Advanced Traffic Management Systems

Journal

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume 69, Issue 9, Pages 10336-10347

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2020.3005363

Keywords

Vehicles; Privacy; Roads; Encryption; Monitoring; Efficiency; privacy; traffic management; traffic flow statistics; verifiability

Funding

  1. National Natural Science Foundation of China [61272512, 61402037]
  2. Natural Sciences and Engineering Research Council of Canada (NSERC)
  3. China Scholarship Council

Ask authors/readers for more resources

Crowdsourcing-based traffic monitoring plays an important role in advanced traffic management systems due to its high accuracy and low costs, but it may expose drivers real identities and sensitive locations that results in the privacy leakage of drivers. In this paper, we propose a crowdsourcing-based traffic monitoring scheme that enables a transportation management center (TMC) to achieve traffic flow statistics at road intersections in an efficient, verifiable, and privacy-preserving manner. Specifically, by integrating a homomorphic encryption primitive and a super-increasing sequence, traffic flow can be flexibly structured and encrypted by drivers, i.e., each drivers travel direction at T-junctions or crossroads is protected. As a middle-ware between drivers and TMC, roadside units (RSUs) are introduced to aggregate and further perturb the aggregated encrypted traffic flow based on a differential privacy mechanism. In this way, TMC is capable of acquiring the traffic flow statistics by decrypting the perturbed encrypted traffic flow, without disclosing each individual drivers traffic information. In addition, based on a lightweight commitment proof, the correctness of the encrypted drivers data can be guaranteed, i.e., a selfish driver cannot arbitrarily manipulate his data to poison the aggregated traffic flow. Finally, security analysis demonstrates that the proposed scheme satisfies all desirable security properties, including confidentiality, verifiability, unlinkability, and traceability. Extensive simulations are also conducted to show that the proposed scheme is efficient in terms of low computation and communication costs.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available