4.7 Article

Verifiable and Privacy-Preserving Traffic Flow Statistics for Advanced Traffic Management Systems

期刊

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
卷 69, 期 9, 页码 10336-10347

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2020.3005363

关键词

Vehicles; Privacy; Roads; Encryption; Monitoring; Efficiency; privacy; traffic management; traffic flow statistics; verifiability

资金

  1. National Natural Science Foundation of China [61272512, 61402037]
  2. Natural Sciences and Engineering Research Council of Canada (NSERC)
  3. China Scholarship Council

向作者/读者索取更多资源

Crowdsourcing-based traffic monitoring plays an important role in advanced traffic management systems due to its high accuracy and low costs, but it may expose drivers real identities and sensitive locations that results in the privacy leakage of drivers. In this paper, we propose a crowdsourcing-based traffic monitoring scheme that enables a transportation management center (TMC) to achieve traffic flow statistics at road intersections in an efficient, verifiable, and privacy-preserving manner. Specifically, by integrating a homomorphic encryption primitive and a super-increasing sequence, traffic flow can be flexibly structured and encrypted by drivers, i.e., each drivers travel direction at T-junctions or crossroads is protected. As a middle-ware between drivers and TMC, roadside units (RSUs) are introduced to aggregate and further perturb the aggregated encrypted traffic flow based on a differential privacy mechanism. In this way, TMC is capable of acquiring the traffic flow statistics by decrypting the perturbed encrypted traffic flow, without disclosing each individual drivers traffic information. In addition, based on a lightweight commitment proof, the correctness of the encrypted drivers data can be guaranteed, i.e., a selfish driver cannot arbitrarily manipulate his data to poison the aggregated traffic flow. Finally, security analysis demonstrates that the proposed scheme satisfies all desirable security properties, including confidentiality, verifiability, unlinkability, and traceability. Extensive simulations are also conducted to show that the proposed scheme is efficient in terms of low computation and communication costs.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据