Privacy-Preserving Tampering Detection in Automotive Systems

被引:8
|
作者
Roman, Adrian-Silviu [1 ]
Genge, Bela [1 ]
Duka, Adrian-Vasile [1 ]
Haller, Piroska [1 ]
机构
[1] George Emil Palade Univ Med Pharm Sci & Technol T, Fac Engn & Informat Technol, Dept Elect Engn & Informat Technol, Targu Mures 540142, Romania
基金
欧盟地平线“2020”;
关键词
automotive systems; data distortion; data privacy; Fast Fourier Transform; tampering; ANOMALY DETECTION; K-ANONYMITY; BIG DATA; ALGORITHM; INTERNET; CLOUD;
D O I
10.3390/electronics10243161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern auto-vehicles are built upon a vast collection of sensors that provide large amounts of data processed by dozens of Electronic Control Units (ECUs). These, in turn, monitor and control advanced technological systems providing a large palette of features to the vehicle's end-users (e.g., automated parking, autonomous vehicles). As modern cars become more and more interconnected with external systems (e.g., cloud-based services), enforcing privacy on data originating from vehicle sensors is becoming a challenging research topic. In contrast, deliberate manipulations of vehicle components, known as tampering, require careful (and remote) monitoring of the vehicle via data transmissions and processing. In this context, this paper documents an efficient methodology for data privacy protection, which can be integrated into modern vehicles. The approach leverages the Fast Fourier Transform (FFT) as a core data transformation algorithm, accompanied by filters and additional transformations. The methodology is seconded by a Random Forest-based regression technique enriched with further statistical analysis for tampering detection in the case of anonymized data. Experimental results, conducted on a data set collected from the On-Board Diagnostics (OBD II) port of a 2015 EUR6 Skoda Rapid 1.2 L TSI passenger vehicle, demonstrate that the restored time-domain data preserves the characteristics required by additional processing algorithms (e.g., tampering detection), showing at the same time an adjustable level of privacy. Moreover, tampering detection is shown to be 100% effective in certain scenarios, even in the context of anonymized data.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] A Distributed Anonymization Scheme for Privacy-preserving Recommendation Systems
    Luo, Zhifeng
    Chen, Shuhong
    Li, Yutian
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 491 - 494
  • [22] Privacy-preserving clustering for big data in cyber-physical-social systems: Survey and perspectives
    Zhao, Yaliang
    Tarus, Samwel K.
    Yang, Laurence T.
    Sun, Jiayu
    Ge, Yunfei
    Wang, Jinke
    INFORMATION SCIENCES, 2020, 515 : 132 - 155
  • [23] Privacy-Preserving Multiview Matrix Factorization for Recommender Systems
    Mai P.
    Pang Y.
    IEEE Transactions on Artificial Intelligence, 2024, 5 (01): : 267 - 277
  • [24] Privacy-Preserving Object Recognition with Explainability in Smart Systems
    Abbasi, Wisam
    Mori, Paolo
    Saracino, Andrea
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 519 - 534
  • [25] Privacy-preserving anomaly detection in stochastic dynamical systems: Synthesis of optimal Gaussian mechanisms
    Hayati, Haleh
    Murguia, Carlos
    van de Wouw, Nathan
    EUROPEAN JOURNAL OF CONTROL, 2025, 81
  • [26] Privacy-preserving Real-time Anomaly Detection Using Edge Computing
    Mehnaz, Shagufta
    Bertino, Elisa
    2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, : 469 - 480
  • [27] A Differential Privacy Approach for Privacy-Preserving Multi-Modal Stress Detection
    Alshareef, Moudy Sharaf
    Jaber, Mona
    Abdelmoniem, Ahmed M.
    2023 IEEE 28TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS, CAMAD 2023, 2023, : 206 - 212
  • [28] Adaptive Ensemble Methods for Tampering Detection in Automotive Aftertreatment Systems
    Bolboaca, Roland
    IEEE ACCESS, 2022, 10 : 105497 - 105517
  • [29] Outsourced privacy-preserving anomaly detection in time series of multi-party
    Zhang, Chunkai
    Zuo, Wei
    Yang, Peng
    Li, Ye
    Wang, Xuan
    CHINA COMMUNICATIONS, 2022, 19 (02) : 201 - 213
  • [30] A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems
    Soleymani, Seyed Ahmad
    Goudarzi, Shidrokh
    Anisi, Mohammad Hossein
    Jindal, Anish
    Kama, Nazri
    Ismail, Saiful Adli
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2023, 27 (05) : 2314 - 2322