Privacy-Preserving Tampering Detection in Automotive Systems

被引:8
|
作者
Roman, Adrian-Silviu [1 ]
Genge, Bela [1 ]
Duka, Adrian-Vasile [1 ]
Haller, Piroska [1 ]
机构
[1] George Emil Palade Univ Med Pharm Sci & Technol T, Fac Engn & Informat Technol, Dept Elect Engn & Informat Technol, Targu Mures 540142, Romania
基金
欧盟地平线“2020”;
关键词
automotive systems; data distortion; data privacy; Fast Fourier Transform; tampering; ANOMALY DETECTION; K-ANONYMITY; BIG DATA; ALGORITHM; INTERNET; CLOUD;
D O I
10.3390/electronics10243161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern auto-vehicles are built upon a vast collection of sensors that provide large amounts of data processed by dozens of Electronic Control Units (ECUs). These, in turn, monitor and control advanced technological systems providing a large palette of features to the vehicle's end-users (e.g., automated parking, autonomous vehicles). As modern cars become more and more interconnected with external systems (e.g., cloud-based services), enforcing privacy on data originating from vehicle sensors is becoming a challenging research topic. In contrast, deliberate manipulations of vehicle components, known as tampering, require careful (and remote) monitoring of the vehicle via data transmissions and processing. In this context, this paper documents an efficient methodology for data privacy protection, which can be integrated into modern vehicles. The approach leverages the Fast Fourier Transform (FFT) as a core data transformation algorithm, accompanied by filters and additional transformations. The methodology is seconded by a Random Forest-based regression technique enriched with further statistical analysis for tampering detection in the case of anonymized data. Experimental results, conducted on a data set collected from the On-Board Diagnostics (OBD II) port of a 2015 EUR6 Skoda Rapid 1.2 L TSI passenger vehicle, demonstrate that the restored time-domain data preserves the characteristics required by additional processing algorithms (e.g., tampering detection), showing at the same time an adjustable level of privacy. Moreover, tampering detection is shown to be 100% effective in certain scenarios, even in the context of anonymized data.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Towards Privacy-Preserving Malware Detection Systems for Android
    Cui, Helei
    Zhou, Yajin
    Wang, Cong
    Li, Qi
    Ren, Kui
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 545 - 552
  • [2] Privacy-preserving outlier detection
    Vaidya, J
    Clifton, C
    FOURTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2004, : 233 - 240
  • [3] Privacy-preserving database systems
    Bertino, E
    Byun, JW
    Li, NH
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 178 - 206
  • [4] Privacy-Preserving Alibi Systems
    Davis, Benjamin
    Chen, Hao
    Franklin, Matthew
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [5] An Algorithmic Method for Tampering-Proof and Privacy-Preserving Smart Metering
    Li, Dongsheng
    Zhao, Yingying
    Zhang, Yawen
    Lv, Qin
    Shang, Li
    2018 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2018, : 459 - 465
  • [6] Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs
    Zhang, Tao
    Zhu, Quanyan
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01): : 148 - 161
  • [7] Privacy-preserving LOF outlier detection
    Li, Lu
    Huang, Liusheng
    Yang, Wei
    Yao, Xiaohui
    Liu, An
    KNOWLEDGE AND INFORMATION SYSTEMS, 2015, 42 (03) : 579 - 597
  • [8] Privacy-preserving LOF outlier detection
    Lu Li
    Liusheng Huang
    Wei Yang
    Xiaohui Yao
    An Liu
    Knowledge and Information Systems, 2015, 42 : 579 - 597
  • [9] Privacy-preserving people detection in the wild
    Mateusz Knapik
    Bogusław Cyganek
    Pattern Analysis and Applications, 2025, 28 (2)
  • [10] Privacy-Preserving Cameras for Fall Detection
    Lachance, Sonya L.
    Hutchins, Jeffrey M.
    CIN-COMPUTERS INFORMATICS NURSING, 2024, 42 (07) : 481 - 485