Quantitative Assessment on the Misuse Risk of Intelligent Connected Vehicle Data

Journal Article (2025)
Author(s)

Yi Lu (Tongji University)

Hao Li (Tongji University)

Huizhao Tu (Tongji University)

Jian Liu (Ltd.)

Y. Yuan (TU Delft - Transport, Mobility and Logistics)

J.W.C. van Lint (TU Delft - Traffic Systems Engineering)

Research Group
Transport, Mobility and Logistics
DOI related publication
https://doi.org/10.1061/JTEPBS.TEENG-9361
More Info
expand_more
Publication Year
2025
Language
English
Research Group
Transport, Mobility and Logistics
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository as part of the Taverne amendment. More information about this copyright law amendment can be found at https://www.openaccess.nl. Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public. @en
Issue number
2
Volume number
152
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The operation of intelligent connected vehicles (ICVs) is fundamentally data-driven, continuously generating massive amounts of data. Given the significant value of ICV data to enterprises, industries, and nations, promoting data openness and sharing has become essential. However, such data often contain sensitive information, and its misuse can threaten individual privacy, corporate security, and even national interests. To address this dilemma, this paper develops the misuse risk score (MR-score), a novel quantification model and associated evaluation method for assessing the risk of ICV data misuse. The MR-score is constructed based on three core properties of ICV data: sensitivity; scale; and identifiability. The sensitivity score, information quantity, and identifiability factor are designated as the corresponding evaluation indicators, and systematic approaches for their quantification are proposed. The analytic hierarchy process is employed to measure the sensitivity score. Information entropy is adopted to evaluate the information quantity. A combination of k-anonymity-based and damage source determination-based methods is utilized to estimate the identifiability factor, considering data incompleteness, imprecision, and invalidity. Two empirical ICV data sets are utilized, and comparative analyses are conducted to demonstrate the effectiveness of the MR-score in capturing misuse risks. Higher MR-scores correspond to greater risk. The model captures the joint influence of all three data properties and reveals the marginal diminishing effect of data scale on misuse risk. This work offers valuable tools for data owners and regulatory agencies to prioritize critical data sets, implement targeted data protection measures, and enable secure data circulation while maximizing the value of ICV data.

Files

License info not available
warning

File under embargo until 26-05-2026