Abstract
Due to the limited communication range and the unbalance distribution of Wi-Fi access points, the disconnection gap during vehicular Internet access almost depends on the access point distribution along the driving path. In this way, with the vehicle mobility statistics, the service provider of account-based web service (i.e., Email and Weblog) could mine the current access point of an interested account owner by the sequence of disconnection gap. As the first paper to study this issue, we propose a probability algorithm for location mining that can be computed recursively with the length of communication feature sequence. Real map based simulations evaluate the location privacy threat and the relationship with the density of access points and communication feature classes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ott, J., Kutscher, D.: Drive-thru internet: IEEE 802.11b for automobile users. In: Proceedings of the IEEE INFOCOM, pp. 362–373 (2004)
DSRC ITS standards advisory. http://grouper.ieee.org/groups/scc32/dsrc/index.html
KPMGs Global Automotive Executive Survey. http://www.kpmg.com/GE/en/IssuesAndInsights/ArticlesPublications/Documents/Global-automotive-executive-survey-2012.pdf
Balasubramanian, A., Mahajan, R., Venkataramani, A., Levine, B.N., Zahorjan, J.: Interactive WiFi connectivity for moving vehicles. In: Proceedings of the ACM SIGCOMM, pp. 427–438 (2008)
Zheng, Z., Sinha, P., Kumar, S.: Sparse WiFi deployment for vehicular internet access with bounded interconnection gap. IEEE/ACM Trans. Network. 20(3), 956–969 (2012)
Lu, N., Zhang, N., Cheng, N., Shen, X., Mark, J.W., Bai, F.: Vehicles meet infrastructure: toward capacity-cost tradeoffs for vehicular access networks. IEEE Trans. Intell. Transp. Syst. 14(3), 1266–1277 (2013)
Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)
Lin, X., Lu, R., Zhang, C., Zhu, H., Ho, P.-H., Shen, X.: Security in vehicular ad hoc networks. IEEE Commun. Mag. 46(4), 88–95 (2008)
Liu, X., Zhao, H., Pan, M., Yue, H., Li, X., Fang, Y.: Traffic-aware multiple mix zone placement for protecting location privacy. In: Proceedings of the IEEE INFOCOM 2012, pp. 972–980 (2012)
Ying, B., Makrakis, D., Mouftah, H.T.: Dynamic mix-zone for location privacy in vehicular networks. IEEE Commun. Lett. 17(8), 1524–1527 (2013)
Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. (JSAC) 25(8), 1569–1589 (2007)
Simulation of urban mobility (SUMO). http://sumo.sourceforge.net
U.S. Census Bureau: TIGER, TIGER/Line and TIGER-Related Products. http://www.census.gov/geo/www/tiger/
Acknowledgements
This work was supported by the National Natural Science Foundation of China under Grant No. 61202482, No. 61303264, No. 61202488, and No. 61379148.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sun, Y., Chen, S., Han, B., Zhang, B., Su, J. (2015). A Novel Location Privacy Mining Threat in Vehicular Internet Access Service. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_46
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)