Print Email Facebook Twitter User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack Title User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack Author Li, Meng (Hefei University of Technology) Zhu, Liehuang (Beijing Institute of Technology) Zhang, Zijian (Beijing Institute of Technology) Lal, C. (TU Delft Cyber Security) Conti, M. (TU Delft Cyber Security; University of Padua) Alazab, Mamoun (Charles Darwin University) Date 2022 Abstract Traffic monitoring services collect traffic reports and respond to users' traffic queries. However, the reports and queries may reveal the user's identity and location. Although different anonymization techniques have been applied to protect user privacy, a new security threat arises, namely, n-by-1 jamming attack, in which an anonymous contributing driver impersonates n drivers and uploads n normal reports by using n reporting devices. Such an attack will mislead the traffic monitoring service provider and further degrade the service quality. Existing traffic monitoring services do not support customized queries, and private information retrieval techniques cannot be applied directly in traffic monitoring. We formally define the new attack and propose a traffic monitoring scheme TraJ to defend the attack and achieve user-defined location privacy. Specifically, we bridge anonymous contributing drivers without disclosing their speed set by using private set intersection. Each RSU collects time traffic reports and structures a weighted proximity graph to filter out malicious colluding drivers. We design a user-defined privacy-preserving query method by encoding complex road network. We leverage the uploading phase from private aggregation to collect traffic conditions and allow requesting drivers to dynamically and privately query traffic conditions. We provide a formal analysis of TraJ to prove its privacy and security properties. We also construct a prototype based on a real-world dataset and Android smartphones to demonstrate its feasibility and efficiency. A formal analysis demonstrates the privacy and security properties. Extensive experiments illustrate the performance and defense efficacy. Subject Vehicular networkstraffic monitoringsecurityprivacyedge computingproximity graph To reference this document use: http://resolver.tudelft.nl/uuid:9e3ba326-5bfc-410e-a24c-30bed5e87069 DOI https://doi.org/10.1109/TNET.2022.3157654 Embargo date 2023-07-01 ISSN 1063-6692 Source IEEE - ACM Transactions on Networking, 30 (5), 2060-2073 Bibliographical note Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public. Part of collection Institutional Repository Document type journal article Rights © 2022 Meng Li, Liehuang Zhu, Zijian Zhang, C. Lal, M. Conti, Mamoun Alazab Files PDF User_Defined_Privacy_Pres ... Attack.pdf 3.86 MB Close viewer /islandora/object/uuid:9e3ba326-5bfc-410e-a24c-30bed5e87069/datastream/OBJ/view