Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring,

Slides:



Advertisements
Similar presentations
On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Advertisements

Presented by: Richard Wood. Goals and strategies Methods Performance evaluation Performance improvements Remaining Challenges.
Preserving Location Privacy Uichin Lee KAIST KSE Slides based on by Ling Liuhttp://
Real time vehicle tracking and driver behavior monitoring using a cellular handset based on accelerometry and GPS data Kevin Burke 4 th Electronic and.
1 Location Privacy. 2 Context Better localization technology + Pervasive wireless connectivity = Location-based applications.
Constructing Popular Routes from Uncertain Trajectories Ling-Yin Wei 1, Yu Zheng 2, Wen-Chih Peng 1 1 National Chiao Tung University, Taiwan 2 Microsoft.
Real-time Estimation of Accident Likelihood for Safety Enhancement Jun Oh, Ph.D., PE, PTOE Western Michigan University March 14, 2007.
Tracking Fine-grain Vehicular Speed Variations by Warping Mobile Phone Signal Strengths Presented by Tam Vu Gayathri Chandrasekaran*, Tam Vu*, Alexander.
IBM TJ Watson Research Center © 2010 IBM Corporation – All Rights Reserved AFRL 2010 Anand Ranganathan Role of Stream Processing in Ad-Hoc Networks Where.
Mobility Management in Mobile Wireless Systems Lecture 9.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
T-Drive : Driving Directions Based on Taxi Trajectories Microsoft Research Asia University of North Texas Jing Yuan, Yu Zheng, Chengyang Zhang, Xing Xie,
TSF: Trajectory-based Statistical Forwarding for Infrastructure-to-Vehicle Data Delivery in Vehicular Networks Jaehoon Jeong, Shuo Guo, Yu Gu, Tian He,
1 ROME: Road Monitoring and Alert System through Geo-Cache Bin Zan, Tingting Sun, Marco Gruteser, Yanyong Zhang WINLAB, Rutgers University.
Peng Cheng, Member, IEEE, Zhijun Qiu, and Bin Ran Presented By: Guru Prasanna Gopalakrishnan.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
February 9, 2006TransNow Student Conference Using Ground Truth Geospatial Data to Validate Advanced Traveler Information Systems Freeway Travel Time Messages.
EnLoc: Energy-Efficient Localization for Mobile Phones Written By, Ionut Constandache (Duke), Shravan Gaonkar (UIUC), Matt Sayler (Duke), Romit Roy Choudhary.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
TrafficView: A Driver Assistant Device for Traffic Monitoring based on Car-to-Car Communication Sasan Dashtinezhad, Tamer Nadeem Department of CS, University.
1 Vehicular Sensor Networks for Traffic Monitoring In proceedings of 17th International Conference on Computer Communications and Networks (ICCCN 2008)
Calling all cars: cell phone networks and the future of traffic Presentation by Scott Corey Article written by Haomiao Huang.
Yi Wang, Bhaskar Krishnamachari, Qing Zhao, and Murali Annavaram 1 The Tradeoff between Energy Efficiency and User State Estimation Accuracy in Mobile.
Rutgers: Gayathri Chandrasekaran, Tam Vu, Marco Gruteser, Rich Martin,
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
Baik Hoh Marco Gruteser Hui Xiong Ansaf Alrabady All images are credited to “ACM” Hoh et al (2007), pp
Privacy-Preserving IntelliDrive Data for Signalized Intersection Performance Measurement Xuegang (Jeff) Ban Rensselaer Polytechnic Institute (RPI) January.
Sensys 2009 Speaker:Lawrence.  Introduction  Overview & Challenges  Algorithm  Travel Time Estimation  Evaluation  Conclusion.
GeoPKDD Geographic Privacy-aware Knowledge Discovery and Delivery Kick-off meeting Pisa, March 14, 2005.
Rensselaer Polytechnic Institute (RPI)
6 am 11 am 5 pm Fig. 5: Population density estimates using the aggregated Markov chains. Colour scale represents people per km. Population Activity Estimation.
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
A Performance and Schedulability Analysis of an Autonomous Mobile Robot Jiangyang Huang & Shane Farritor Mechanical Engineering University of Nebraska–Lincoln.
Mirco Nanni, Roberto Trasarti, Giulio Rossetti, Dino Pedreschi Efficient distributed computation of human mobility aggregates through user mobility profiles.
Knowledge Discovery and Delivery Lab (ISTI-CNR & Univ. Pisa)‏ www-kdd.isti.cnr.it Anna Monreale Fabio Pinelli Roberto Trasarti Fosca Giannotti A. Monreale,
Estimating Traffic Flow Rate on Freeways from Probe Vehicle Data and Fundamental Diagram Khairul Anuar (PhD Candidate) Dr. Filmon Habtemichael Dr. Mecit.
Abstract Raw ITS data is commonly aggregated to 20-30sec intervals for collection and communication, and further aggregated to 1-60min intervals for archiving.
Privacy-Aware Personalization for Mobile Advertising
Jeremiah Dunn. Overview Introduction Mobile Millenium Goal Complexity of the Problem Gathering Data Data Fusion Modeling the Flow of Traffic Mobile Century.
Toward Community Sensing Andreas Krause Carnegie Mellon University Joint work with Eric Horvitz, Aman Kansal, Feng Zhao Microsoft Research Information.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
NATMEC June 5, 2006 Comparative Analysis Of Various Travel Time Estimation Algorithms To Ground Truth Data Using Archived Data Christopher M. Monsere Research.
CENTRE CEllular Network Trajectories Reconstruction Environment F. Giannotti, A. Mazzoni, S. Puntoni, C. Renso KDDLab, Pisa.
A Hybrid Method for achieving High Accuracy and Efficiency in Object Tracking using Passive RFID Lei Yang 1, Jiannong Cao 1, Weiping Zhu 1, and Shaojie.
Use of GIS Methodology for Online Urban Traffic Monitoring German Aerospace Center Institute of Transport Research M. Hetscher S. Lehmann I. Ernst A. Lippok.
1 Hiding Stars with Fireworks: Location Privacy through Camouflage Joseph Meyerowitz Romit Roy Choudhury ECE and PhysicsDept. of ECE and CS.
January 23, 2006Transportation Research Board 85 th Annual Meeting Using Ground Truth Geospatial Data to Validate Advanced Traveler Information Systems.
WINLAB Improving RF-Based Device-Free Passive Localization In Cluttered Indoor Environments Through Probabilistic Classification Methods Rutgers University.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users Yunxia Feng, Peng Liu, Jianhui Zhang May , 2012 Hangzhou,
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
Virtual Trip Lines for Distributed Privacy- Preserving Traffic Monitoring Baik Hoh et al. MobiSys08 Slides based on Dr. Hoh’s MobiSys presentation.
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques Mert Özer, Ilkcan Keles, Ismail Hakki Toroslu, Pinar.
Detection, Classification and Tracking in Distributed Sensor Networks D. Li, K. Wong, Y. Hu and A. M. Sayeed Dept. of Electrical & Computer Engineering.
2010 IEEE Fifth International Conference on networking, Architecture and Storage (NAS), pp , 2010 作者: Filip Cuckov and Min Song 指導教授:許子衡 教授 報告學生:馬敏修.
ABJ60 – Spatial Data and Information Science – Operations and Congestion Operations and Congestion.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Kanok Boriboonsomsin, Guoyuan Wu, Peng Hao, and Matthew Barth
Fundamentals of Traffic Flow
Mining Spatio-Temporal Reachable Regions over Massive Trajectory Data
Visible Light based Activity Sensing using Ceiling Photosensors
Macroscopic Speed Characteristics
Cross-Layer Optimization for State Update in Mobile Gaming
Location Privacy.
MACROSCOPIC ESTIMATION OF BI-MODAL TRAFFIC USING LOOP DETECTORS, FLOATING CARS, AND PUBLIC TRANSPORT DATA Igor Dakic ETH Zurich work in collaboration with.
A Unified Framework for Location Privacy
Presentation transcript:

Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring Baik Hoh, Marco Gruteser WINLAB / ECE Dept., Rutgers University Ryan Herring, Jeff Bana, Dan Work, Juan-Carlos Herrera, Alexandre Bayen Civil Engineering Dept., UC Berkeley Murali Annavaram, Quinn Jacobson Nokia Research Center Presentation By: Saurabh Hukerikar 30 th March 2009

Introduction Virtual trip lines  Geographic markers that indicate where vehicles should provide location updates  Aggregating and cloaking several location updates based on trip line identifiers for privacy by preventing updates from VTL’s deemed private.  Distributed architecture

The Conventions  Eye witness reports  Traffic cameras  Loop detectors  Cellular base station hand-off  In-Vehicle Transponders (IVTs) and License Plate Readers (LPRs).

Privacy risks & threat model Preserving privacy in GPS traces via uncertainty-aware path cloaking [B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady]  Spatio-temporal characteristics of the data allows tracking and re- identification of anonymous vehicles when user density is low.  Consecutive location samples from a vehicle exhibit temporal and spatial correlation, paths of individual vehicles can be reconstructed from a mix of anonymous samples belonging to several vehicles  Process can be formalized and automated through target tracking algorithms  Algorithms generally predict the target position using the last known speed and heading information and then decide which next sample to link to the same vehicle through Maximum Likelihood Detection

Privacy Metrics  Mean Time To Confusion (MTTC)  Mean Distance To Confusion (MDTC)  Tracking Uncertainity

Traffic Monitoring With Virtual Trip Lines Virtual trip line (VTL): [id; x1; y1; x2; y2; d] Handset VTL generator ID proxy server Traffic monitoring service provider Virtual trip lines control disclosure of location by sampling in space

VTL Placement: Minimum Spacing Speed variation Penetration & Speed – impact on Minimum spacing

If trip lines are placed immediately before or after intersections, an adversary may be able to follow vehicles paths based on speed differences VTL Placement: Road Layout

VTL Placement: Minimum Spacing – Speed consideration

Experimental Evaluation Travel time of each link is computed with the length of a link and the mean speed that is obtained by averaging out speed readings from probe vehicles during an aggregation interval. RMS error of about 80 seconds

Distance-to-confusion with two different sets of anonymous flow updates from both o The evenly spaced VTLs (with exclusion area) and o The evenly spaced VTLs (without exclusion area) o 1 – 2 % penetration o 500 meters exclusion area o Sets of equidistant trip lines with minimum spacing varying from 333 ft (100 meters) to 1670 ft (500 meters) o Uncertainty threshold of 0.2 Experimental Evaluation – Privacy v Accuracy Trade-Off

 Two successive anonymous updates that are sampled longer than 800 feet apart experience high tracking uncertainty.  Existence of the exclusion area  The travel time estimation generally improves with an increasing number of VTLs Privacy v Accuracy Trade-Off

Source: Experimental Evaluation

Critique  Energy requirements - dash board charger  Processing and Communication overhead on Client phone  Real time? - Distributed architecture  Exclusion of VTLs - Generic exclusion risks undercoverage - Individualized exclusion processing overhead or configuration

Source: “The TomTom devices with HD Traffic all use a built-in receiver including a SIM-card. Does this mean that I can be traced? TomTom takes privacy of personal information very seriously, and the information retreived is entirely anonymous. TomTom only uses information about the speed and direction travelled of TomTom device users. We don't know anything about the devices themselves, nor who owns them” “Data generated from the mobile phones is completely anonymous. TomTom, and has information about user direction and speed only - not the type of device, nor the owner of the mobile phone.” WEBLINK:TomTom High DefinitionTomTom High Definition

WEBLINK:

Questions?

Thank-you