15 Dec 2015

VProof: Lightweight Privacy Preserving Vehicle Location Proofs

Abstract --- Transportation systems relying on vehicles to collect data for services such as road condition monitoring are vulnerable to malicious vehicles injecting large amounts of fake data.
VProof, a vehicle location proof scheme that enables a vehicle to prove that its location claims match its historical locations. With VProof, vehicles construct their location proofs by simply extracting relevant contents from the packets received from roadside units ... no communication required for a prover, ... preserves users’ privacy, as we do not put any information that can be related to a user’s ID in a location proof.

evaluated it with extensive real-world experiments.

The idea of location proofs has been considered by other types of applications before. The general approach is to let certain authorized entities with fixed geolocations perform as location proof issuers.

A location prover is believed to be in the vicinity of a proof issuer at a certain time if the prover possesses valid location proofs [7]–[9].

existing location proof solutions is coarse: ... This allows a malicious user to statically collect the location proofs issued by a proof issuer and report fake information about places where he never visited but are within the proof issuer’s communication radius.

VProof, fine-grained location proofs and prevent malicious users from statically collecting location proofs
RSUs (roadside units), which are necessary components of ITS systems [1], [2], continuously broadcast packets that are specifically for the location proof functionalities…
if a user claims his data were collected at a certain place, we require him to show that he has seen the correct RSS (received signal strength) pattern of the VPackets sent by a nearby RSU.

To prevent users from submitting fake information in vehicular networks, the existing solutions typically use anonymous authentication.

Concerns about users’ location privacy
if car owners are aware that bogus data can be traced back to them, they will not intentionally upload incorrect data.

III. BACKGROUND

In ITS data collection applications, vehicles sense and collect data about surrounding elements by their add-on vehicle sensors. The sensed data, along with the corresponding metadata that tell when and where the sensed data were generated, are uploaded to backend servers located at the infrastructure side …

assumptions about malicious users …

IV. TWO KEY OBSERVATIONS

Through real-world experiments, we observe that the RSS of a series of RSU packets received by a vehicle when it passes an RSU, which is continuously broadcasting packets with fixed power, exhibit similar patterns over time.