Privacy-Preserving Tampering Detection in Automotive Systems

被引:8
|
作者
Roman, Adrian-Silviu [1 ]
Genge, Bela [1 ]
Duka, Adrian-Vasile [1 ]
Haller, Piroska [1 ]
机构
[1] George Emil Palade Univ Med Pharm Sci & Technol T, Fac Engn & Informat Technol, Dept Elect Engn & Informat Technol, Targu Mures 540142, Romania
基金
欧盟地平线“2020”;
关键词
automotive systems; data distortion; data privacy; Fast Fourier Transform; tampering; ANOMALY DETECTION; K-ANONYMITY; BIG DATA; ALGORITHM; INTERNET; CLOUD;
D O I
10.3390/electronics10243161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern auto-vehicles are built upon a vast collection of sensors that provide large amounts of data processed by dozens of Electronic Control Units (ECUs). These, in turn, monitor and control advanced technological systems providing a large palette of features to the vehicle's end-users (e.g., automated parking, autonomous vehicles). As modern cars become more and more interconnected with external systems (e.g., cloud-based services), enforcing privacy on data originating from vehicle sensors is becoming a challenging research topic. In contrast, deliberate manipulations of vehicle components, known as tampering, require careful (and remote) monitoring of the vehicle via data transmissions and processing. In this context, this paper documents an efficient methodology for data privacy protection, which can be integrated into modern vehicles. The approach leverages the Fast Fourier Transform (FFT) as a core data transformation algorithm, accompanied by filters and additional transformations. The methodology is seconded by a Random Forest-based regression technique enriched with further statistical analysis for tampering detection in the case of anonymized data. Experimental results, conducted on a data set collected from the On-Board Diagnostics (OBD II) port of a 2015 EUR6 Skoda Rapid 1.2 L TSI passenger vehicle, demonstrate that the restored time-domain data preserves the characteristics required by additional processing algorithms (e.g., tampering detection), showing at the same time an adjustable level of privacy. Moreover, tampering detection is shown to be 100% effective in certain scenarios, even in the context of anonymized data.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Privacy-Preserving Autoencoder for Collaborative Object Detection
    Azizian, Bardia
    Bajic, Ivan V.
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2024, 33 : 4937 - 4951
  • [2] An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems
    Keshk, Marwa
    Sitnikova, Elena
    Moustafa, Nour
    Hu, Jiankun
    Khalil, Ibrahim
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2021, 6 (01): : 66 - 79
  • [3] GuardianAI: Privacy-preserving federated anomaly detection with differential privacy
    Alabdulatif, Abdulatif
    ARRAY, 2025, 26
  • [4] Privacy-preserving data splitting: a combinatorial approach
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    Ricci, Sara
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (07) : 1735 - 1756
  • [5] Enhancing Privacy-Preserving Intrusion Detection through Federated Learning
    Alazab, Ammar
    Khraisat, Ansam
    Singh, Sarabjot
    Jan, Tony
    ELECTRONICS, 2023, 12 (16)
  • [6] Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption
    Alabdulatif, Abdulatif
    Kumarage, Heshan
    Khalil, Ibrahim
    Yi, Xun
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 : 28 - 45
  • [7] Privacy-preserving using homomorphic encryption in Mobile IoT systems
    Ren, Wang
    Tong, Xin
    Du, Jing
    Wang, Na
    Li, Shan Cang
    Min, Geyong
    Zhao, Zhiwei
    Bashir, Ali Kashif
    COMPUTER COMMUNICATIONS, 2021, 165 : 105 - 111
  • [8] Privacy-Preserving Hierarchical Federated Recommendation Systems
    Chen, Yucheng
    Feng, Chenyuan
    Feng, Daquan
    IEEE COMMUNICATIONS LETTERS, 2023, 27 (05) : 1312 - 1316
  • [9] Privacy-Preserving Identification Systems With Noisy Enrollment
    Zhou, Linghui
    Minh Thanh Vu
    Oechtering, Tobias J.
    Skoglund, Mikael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3510 - 3523
  • [10] Privacy-preserving fusion of IoT and big data for e-health
    Yang, Yang
    Zheng, Xianghan
    Guo, Wenzhong
    Liu, Ximeng
    Chang, Victor
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 1437 - 1455