Privacy-Preserving Tampering Detection in Automotive Systems

被引:8
作者
Roman, Adrian-Silviu [1 ]
Genge, Bela [1 ]
Duka, Adrian-Vasile [1 ]
Haller, Piroska [1 ]
机构
[1] George Emil Palade Univ Med Pharm Sci & Technol T, Fac Engn & Informat Technol, Dept Elect Engn & Informat Technol, Targu Mures 540142, Romania
基金
欧盟地平线“2020”;
关键词
automotive systems; data distortion; data privacy; Fast Fourier Transform; tampering; ANOMALY DETECTION; K-ANONYMITY; BIG DATA; ALGORITHM; INTERNET; CLOUD;
D O I
10.3390/electronics10243161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern auto-vehicles are built upon a vast collection of sensors that provide large amounts of data processed by dozens of Electronic Control Units (ECUs). These, in turn, monitor and control advanced technological systems providing a large palette of features to the vehicle's end-users (e.g., automated parking, autonomous vehicles). As modern cars become more and more interconnected with external systems (e.g., cloud-based services), enforcing privacy on data originating from vehicle sensors is becoming a challenging research topic. In contrast, deliberate manipulations of vehicle components, known as tampering, require careful (and remote) monitoring of the vehicle via data transmissions and processing. In this context, this paper documents an efficient methodology for data privacy protection, which can be integrated into modern vehicles. The approach leverages the Fast Fourier Transform (FFT) as a core data transformation algorithm, accompanied by filters and additional transformations. The methodology is seconded by a Random Forest-based regression technique enriched with further statistical analysis for tampering detection in the case of anonymized data. Experimental results, conducted on a data set collected from the On-Board Diagnostics (OBD II) port of a 2015 EUR6 Skoda Rapid 1.2 L TSI passenger vehicle, demonstrate that the restored time-domain data preserves the characteristics required by additional processing algorithms (e.g., tampering detection), showing at the same time an adjustable level of privacy. Moreover, tampering detection is shown to be 100% effective in certain scenarios, even in the context of anonymized data.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Privacy-Preserving Passive DNS
    Papadopoulos, Pavlos
    Pitropakis, Nikolaos
    Buchanan, William J.
    Lo, Owen
    Katsikas, Sokratis
    [J]. COMPUTERS, 2020, 9 (03) : 1 - 16
  • [42] Privacy-Preserving Multilayer Community Detection via Federated Learning
    Ma, Shi-Yao
    Xu, Xiao-Ke
    Xiao, Jing
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024,
  • [43] Privacy-Preserving Monotonicity of Differential Privacy Mechanisms
    Liu, Hai
    Wu, Zhenqiang
    Zhou, Yihui
    Peng, Changgen
    Tian, Feng
    Lu, Laifeng
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (11):
  • [44] Two Schemes of Privacy-Preserving Trust Evaluation
    Yan, Zheng
    Ding, Wenxiu
    Niemi, Valtteri
    Vasilakos, Athanasios V.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 175 - 189
  • [45] Privacy-Preserving and Publicly Verifiable Matrix Multiplication
    Liu, Jing
    Zhang, Liang Feng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2059 - 2071
  • [46] A Privacy-Preserving Comparison Protocol
    Sutradhar, Kartick
    Om, Hari
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (06) : 1815 - 1821
  • [47] Survey on Privacy-Preserving Techniques for Microdata Publication
    Carvalho, Tania
    Moniz, Nuno
    Faria, Pedro
    Antunes, Luis
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [48] Privacy-Preserving Blockchain Technologies
    Valadares, Dalton Cezane Gomes
    Perkusich, Angelo
    Martins, Aldenor Falcao
    Alshawki, Mohammed B.
    Seline, Chris
    [J]. SENSORS, 2023, 23 (16)
  • [49] A survey on privacy-preserving control and filtering of networked control systems
    Wang, Wei
    Ma, Lifeng
    Rui, Qiangqiang
    Gao, Chen
    [J]. INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024, 55 (11) : 2269 - 2288
  • [50] Privacy-preserving in Blockchain-based Federated Learning systems
    Sameera, K. M.
    Nicolazzo, Serena
    Arazzi, Marco
    Nocera, Antonino
    Rehiman, K. A. Rafidha
    Vinod, P.
    Conti, Mauro
    [J]. COMPUTER COMMUNICATIONS, 2024, 222 : 38 - 67