Visible to the public Privacy-Preserving Traffic Flow Estimation for Road Networks

TitlePrivacy-Preserving Traffic Flow Estimation for Road Networks
Publication TypeConference Paper
Year of Publication2020
AuthorsBentafat, Elmahdi, Rathore, M. Mazhar, Bakiras, Spiridon
Conference NameGLOBECOM 2020 - 2020 IEEE Global Communications Conference
Date Publisheddec
KeywordsAggregates, Bloom filter, Computing Theory, Computing Theory and Privacy, cryptography, Encryption, homomorphic encryption, privacy, Protocols, pubcrawl, Receivers, Resiliency, Roads, vehicular traffic flow estimation
AbstractFuture intelligent transportation systems necessitate a fine-grained and accurate estimation of vehicular traffic flows across critical paths of the underlying road network. This task is relatively trivial if we are able to collect detailed trajectories from every moving vehicle throughout the day. Nevertheless, this approach compromises the location privacy of the vehicles and may be used to build accurate profiles of the corresponding individuals. To this end, this work introduces a privacy-preserving protocol that leverages roadside units (RSUs) to communicate with the passing vehicles, in order to construct encrypted Bloom filters stemming from the vehicle IDs. The aggregate Bloom filters are encrypted with a threshold cryptosystem and can only be decrypted by the transportation authority in collaboration with multiple trusted entities. As a result, the individual communications between the vehicles and the RSUs remain secret. The decrypted Bloom filters reveal the aggregate traffic information at each RSU, but may also serve as a means to compute an approximation of the traffic flow between any pair of RSUs, by simply estimating the number of common vehicles in their respective Bloom filters. We performed extensive simulation experiments with various configuration parameters and demonstrate that our protocol reduces the estimation error considerably when compared to the current state-of-the-art approaches. Furthermore, our implementation of the underlying cryptographic primitives illustrates the feasibility, practicality, and scalability of the system.
DOI10.1109/GLOBECOM42002.2020.9322454
Citation Keybentafat_privacy-preserving_2020