[en] As part of Intelligent Transportation Systems (ITS), Electronic toll collection (ETC) is a type of toll collection system (TCS) which is getting more and more popular as it can not only help to finance the government's road infrastructure but also it can play a crucial role in pollution reduction and congestion management. As most of the traditional ETC schemes (ETCS) require identifying their users, they enable location tracking. This violates user privacy and poses challenges regarding the compliance of such systems with privacy regulations such as the EU General Data Protection Regulation (GDPR). So far, several privacy-preserving ETC schemes have been proposed. To the best of our knowledge, this is the first survey that systematically reviews and compares various characteristics of these schemes, including components, technologies, security properties, privacy properties, and attacks on ETCS. This survey first categorizes the ETCS based on two technologies, GNSS and DSRC. Then under these categories, the schemes are classified based on whether they provide formal proof of security and support security analysis. We also demonstrate which schemes specifically are/are not resistant to collusion and physical attacks. Then, based on these classifications, several limitations and shortcomings in privacy-preserving ETCS are revealed. Finally, we identify several directions for future research.
Disciplines :
Computer science
Author, co-author :
Adavoudi Jolfaei, Amirhossein ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
Boualouache, Abdelwahab ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
Rupp, Andy ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
Schiffner, Stefan
Engel, Thomas ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
External co-authors :
yes
Language :
English
Title :
A Survey on Privacy-preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems
Publication date :
2023
Journal title :
IEEE Transactions on Intelligent Transportation Systems
ISSN :
1558-0016
Publisher :
Institute of Electrical and Electronics Engineers, New-York, United States - New York
Peer reviewed :
Peer Reviewed verified by ORBi
Focus Area :
Security, Reliability and Trust
FnR Project :
FNR14891397 - Intelligent Orchestrated Security And Privacy-aware Slicing For 5g And Beyond Vehicular Networks, 2020 (01/04/2021-31/03/2024) - Thomas Engel
M. Nasr Azadani and A. Boukerche, "Driving behavior analysis guidelines for intelligent transportation systems, " IEEE Trans. Intell. Transp. Syst., vol. 23, no. 7, pp. 6027-6045, Jul. 2022.
A. Sumalee and H. W. Ho, "Smarter and more connected: Future intelligent transportation system, " IATSS Res., vol. 42, no. 2, pp. 67-71, Jul. 2018.
P. Asuquo et al., "Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures, " IEEE Internet Things J., vol. 5, no. 6, pp. 4778-4802, Dec. 2018.
R. A. Popa, H. Balakrishnan, and A. J. Blumberg, "VPriv: Protecting privacy in location-based vehicular services, " USENIX Assoc., 2009.
Projections for the Global Electronic Toll Collection Market Size Between 2019 and 2030. Accessed: Dec. 20, 2021. [Online]. Available: https://www.statista.com/statistics/1254629/global-electronic-tollcollection-market-forecast/
K. W. Ogden, "Privacy issues in electronic toll collection, " Transp. Res. C, Emerg. Technol., vol. 9, no. 2, pp. 123-134, Apr. 2001.
F. Kerschbaum and H.W. Lim, "Privacy-preserving observation in public spaces, " in Proc. Eur. Symp. Res. Comput. Secur. Cham, Switzerland: Springer, 2015, pp. 81-100.
J. Day, Y. Huang, E. Knapp, and I. Goldberg, "SPEcTRe: Spot-checked private ecash tolling at roadside, " in Proc. 10th Annu. ACM Workshop Privacy Electron. Soc., Oct. 2011, pp. 61-68.
Newly Obtained Records Reveal Extensive Monitoring of E-ZPass Tags Throughout New York. Accessed: Dec. 20, 2021. [Online]. Available: https://www.aclu.org/blog/privacy-technology/location-tracking/newlyobtained-records-reveal-extensive-monitoring-e-zpass
F. Giannotti, M. Nanni, F. Pinelli, and D. Pedreschi, "Trajectory pattern mining, " in Proc. 13th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, Aug. 2007, pp. 330-339.
Y. Zheng, L. Zhang, X. Xie, and W.-Y. Ma, "Mining interesting locations and travel sequences from GPS trajectories, " in Proc. 18th Int. Conf. World Wide Web, Apr. 2009, pp. 791-800.
S. Bouchelaghem and M. Omar, "Reliable and secure distributed smart road pricing system for smart cities, " IEEE Trans. Intell. Transp. Syst., vol. 20, no. 5, pp. 1592-1603, May 2018.
S. Escher, M. Sontowski, K. Berling, S. Kopsell, and T. Strufe, "How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme, " in Proc. IEEE 93rd Veh. Technol. Conf. (VTCSpring), Apr. 2021, pp. 1-6.
R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux, "Quantifying location privacy, " in Proc. IEEE Symp. Secur. Privacy, May 2011, pp. 247-262.
C. Troncoso, E. Costa-Montenegro, C. Diaz, and S. Schiffner, "On the difficulty of achieving anonymity for vehicle-2-X communication, " Comput. Netw., vol. 55, no. 14, pp. 3199-3210, Oct. 2011.
B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos, "Privacy in inter-vehicular networks: Why simple pseudonym change is not enough, " in Proc. 7th Int. Conf. Wireless On-Demand Netw. Syst. Services (WONS), Feb. 2010, pp. 176-183.
K. Emara, W. Woerndl, and J. Schlichter, "Vehicle tracking using vehicular network beacons, " in Proc. IEEE 14th Int. Symp. World Wireless, Mobile Multimedia Netw. (WoWMoM), Jun. 2013, pp. 1-6.
A. Boualouache, S.-M. Senouci, and S. Moussaoui, "A survey on pseudonym changing strategies for vehicular ad-hoc networks, " IEEE Commun. Surveys Tuts., vol. 20, no. 1, pp. 770-790, 1st Quart., 2017.
V. Fetzer, M. Hoffmann, M. Nagel, A. Rupp, and R. Schwerdt, "P4TC-Provably-secure yet practical privacy-preserving toll collection, " Proc. Privacy Enhancing Technol., vol. 2020, no. 3, pp. 62-152, Jul. 2020.
N. Ganeshkumar and S. Kumar, "Obu (on-board unit) wireless devices in VANET(s) for effective communication-A review, " Computational Methods and Data Engineering. 2021, pp. 191-202.
J. Balasch, A. Rial, C. Troncoso, B. Preneel, I. Verbauwhede, and C. Geuens, "PrETP: Privacy-preserving electronic toll pricing., " in Proc. USENIX Secur. Symp., vol. 10, 2010, pp. 63-78.
W.-H. Lee, S.-S. Tseng, and C.-H. Wang, "Design and implementation of electronic toll collection system based on vehicle positioning system techniques, " Comput. Commun., vol. 31, no. 12, pp. 2925-2933, Jul. 2008.
A. De Palma and R. Lindsey, "Traffic congestion pricing methodologies and technologies, " Transp. Res. C, Emerg. Technol., vol. 19, no. 6, pp. 1377-1399, Dec. 2011.
Z. J. Wong, V. T. Goh, T. T. V. Yap, and H. Ng, "Vehicle classification using convolutional neural network for electronic toll collection, " in Computational Science and Technology. Cham, Switzerland: Springer, 2020, pp. 169-177.
X. Chen, G. Lenzini, S. Mauw, and J. Pang, "Design and formal analysis of a group signature based electronic toll pricing system, " J. Wireless Mobile Netw., Ubiquitous Comput., Dependable Appl., vol. 4, no. 1, pp. 55-75, 2013.
F. Baldimtsi, G. Hinterwalder, A. Rupp, A. Lysyanskaya, C. Paar, and W. P. Burleson, "Pay as you go, " in Proc. Workshop Hot Topics Privacy Enhancing Technol. (HotPETSs), 2012, pp. 1-10.
L. Yang, R. Saigal, and H. Zhou, "Distance-based dynamic pricing strategy for managed toll lanes, " Transp. Res. Rec., J. Transp. Res. Board, vol. 2283, no. 1, pp. 90-99, Jan. 2012.
Toll Collect Service on the Road. Accessed: Oct. 2022. [Online]. Available: https://www.toll-collect.de/en/toll-collect/bezahlen/maut-tarife/maut-tarife.html
Z. Liu, S. Wang, B. Zhou, and Q. Cheng, "Robust optimization of distance-based tolls in a network considering stochastic day to day dynamics, " Transp. Res. C, Emerg. Technol., vol. 79, pp. 58-72, Jun. 2017.
R. Jardi-Cedo, M. Mut-Puigserver, M. M. Payeras-Capella, J. Castella-Roca, and A. Viejo, "Electronic road pricing system for low emission zones to preserve driver privacy, " in Proc. Int. Conf. Model. Decisions Artif. Intell. Cham, Switzerland: Springer, 2014, pp. 1-13.
R. Jardi-Cedo, J. Castella-Roca, and A. Viejo, "Privacy-preserving electronic toll system with dynamic pricing for low emission zones, " in Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. Cham, Switzerland: Springer, 2014, pp. 327-334.
R. Jardi-Cedo, M. Mut-Puigserver, J. Castella-Roca, M. Magdalena, and A. Viejo, "Privacy-preserving electronic road pricing system for multifare low emission zones, " in Proc. 9th Int. Conf. Secur. Inf. Netw., Jul. 2016, pp. 158-165.
Z. Lu, G. Qu, and Z. Liu, "A survey on recent advances in vehicular network security, trust, and privacy, " IEEE Trans. Intell. Transp. Syst., vol. 20, no. 2, pp. 760-776, Feb. 2018.
M. A. Al-Shareeda, M. Anbar, I. H. Hasbullah, and S. Manickam, "Survey of authentication and privacy schemes in vehicular ad hoc networks, " IEEE Sensors J., vol. 21, no. 2, pp. 2422-2433, Jan. 2021.
R. G. Engoulou, M. Bellaiche, S. Pierre, and A. Quintero, "VANET security surveys, " Comput. Commun., vol. 44, pp. 1-13, May 2014.
S. S. Manvi and S. Tangade, "A survey on authentication schemes in VANETs for secured communication, " Veh. Commun., vol. 9, pp. 19-30, Jul. 2017.
X. Chen, G. Lenzini, S. Mauw, and J. Pang, "A group signature based electronic toll pricing system, " in Proc. 7th Int. Conf. Availability, Rel. Secur., Aug. 2012, pp. 85-93.
A. Pfitzmann and M. Hansen, "A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, " Dresden, Germany, 2010.
R. Shokri, J. Freudiger, and J.-P. Hubaux, "A unified framework for location privacy, " Ecole Polytechnique Federale de Lausanne, Switzerland, Tech. Rep. EPFL-REPORT-148708, Jul. 2010.
F. Qu, Z. Wu, F.-Y. Wang, and W. Cho, "A security and privacy review of VANETs, " IEEE Trans. Intell. Transp. Syst., vol. 16, no. 6, pp. 2985-2996, Dec. 2015.
I. Ali, A. Hassan, and F. Li, "Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey, " Veh. Commun., vol. 16, pp. 45-61, Apr. 2019.
M. A. Al-Shareeda, M. Anbar, S. Manickam, and A. A. Yassin, "VPPCS: VANET-based privacy-preserving communication scheme, " IEEE Access, vol. 8, pp. 150914-150928, 2020.
J. Whitefield, L. Chen, T. Giannetsos, S. Schneider, and H. Treharne, "Privacy-enhanced capabilities for VANETs using direct anonymous attestation, " in Proc. IEEE Veh. Netw. Conf. (VNC), Nov. 2017, pp. 123-130.
W. De Jonge and B. Jacobs, "Privacy-friendly electronic traffic pricing via commits, " in Proc. Int. Workshop Formal Aspects Secur. Trust. Cham, Switzerland: Springer, 2008, pp. 143-161.
X. Chen, D. Fonkwe, and J. Pang, "Post-hoc analysis of user traceability in electronic toll collection systems, " in Proc. 7th Int. Workshop Data Privacy Manage. New York, NY, USA: Springer-Verlag, 2013, pp. 29-42.
J. C. Lagarias and A. M. Odlyzko, "Solving low-density subset sum problems, " J. Assoc. Comp. Math., vol. 32, no. 1, pp. 229-246, Jan. 1985.
S. Meiklejohn, K. Mowery, S. Checkoway, and H. Shacham, "The phantom tollbooth: Privacy-preserving electronic toll collection in the presence of driver collusion., " in Proc. USENIX Secur. Symp., vol. 201, no. 1, 2011, pp. 1-16.
O. Goldreich, "Secure multi-party computation, " Manuscript. Preliminary Version, vol. 78, p. 110, Jun. 1998.
X. Deng and T. Gao, "Electronic payment schemes based on blockchain in VANETs, " IEEE Access, vol. 8, pp. 38296-38303, 2020.
D. Das, S. Banerjee, P. Chatterjee, M. Biswas, U. Biswas, and W. Alnumay, "Design and development of an intelligent transportation management system using blockchain and smart contracts, " Cluster Comput., vol. 25, no. 3, pp. 1899-1913, Jun. 2022.
W.-Y. Chiu and W. Meng, "EdgeTC-A PBFT blockchain-based ETC scheme for smart cities, " Peer-to-Peer Netw. Appl., vol. 14, no. 5, pp. 2874-2886, Sep. 2021.
B. Xiao, X. Fan, S. Gao, and W. Cai, "EdgeToll: A blockchain-based toll collection system for public sharing of heterogeneous edges, " in Proc. IEEE INFOCOM Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), Apr. 2019, pp. 1-6.
A. Didouh, A. B. Lopez, Y. E. Hillali, A. Rivenq, and M. A. A. Faruque, "Eve, you shall not get access! A cyber-physical blockchain architecture for electronic toll collection security, " in Proc. IEEE 23rd Int. Conf. Intell. Transp. Syst. (ITSC), Sep. 2020, pp. 1-7.
P. C. Bartolomeu, E. Vieira, and J. Ferreira, "Pay as you go: A generic crypto tolling architecture, " IEEE Access, vol. 8, pp. 196212-196222, 2020.
S. Huang, L. Yang, X. Yang, X. Li, and F. Gao, "A decentralized ETC architecture based on blockchain technology, " J. Adv. Transp., vol. 2021, pp. 1-10, May 2021.
R. Jabbar et al., "Blockchain technology for intelligent transportation systems: A systematic literature review, " IEEE Access, vol. 10, pp. 20995-21031, 2022.
R. Zhang, R. Xue, and L. Liu, "Security and privacy on blockchain, " ACM Comput. Surv., vol. 52, no. 3, pp. 1-34, 2019.
R. Canetti, "Universally composable security: A new paradigm for cryptographic protocols, " in Proc. 42nd IEEE Symp. Found. Comput. Sci., Jun. 2001, pp. 136-145.
M. Dahl, S. Delaune, and G. Steel, "Formal analysis of privacy for anonymous location based services, " in Proc. Joint Workshop Theory Secur. Appl. Cham, Switzerland: Springer, 2011, pp. 98-112.
R. Borges, F. Sebe, and M. Valls, "An anonymous and unlinkable electronic toll collection system, " Int. J. Inf. Secur., vol. 21, no. 5, pp. 1151-1162, Oct. 2022.
R. Dingledine, N. Mathewson, and P. Syverson, "TOR: The secondgeneration onion router, " in Proc. 13th USENIX Secur. Symp. (USENIX Secur.). San Diego, CA, USA: USENIX Association, Aug. 2004. [Online]. Available: https://www.usenix.org/conference/13thusenix-security-symposium/tor-second-generation-onion-router
M. Gruteser and B. Hoh, "On the anonymity of periodic location samples, " in Proc. Int. Conf. Secur. Pervasive Comput. Cham, Switzerland: Springer, 2005, pp. 179-192.
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems, " IEEE Pervasive Comput., vol. 5, no. 4, pp. 38-46, Oct./Dec. 2006.
J. Krumm, "Inference attacks on location tracks, " in Proc. Int. Conf. Pervasive Comput. Cham, Switzerland: Springer, 2007, pp. 127-143.
C. Troncoso, G. Danezis, E. Kosta, and B. Preneel, "Pripayd: Privacy friendly pay-as-you-drive insurance, " in Proc. ACM Workshop Privacy Electron. Soc., Oct. 2007, pp. 99-107.
G. Danezis and C. Diaz, "Space-efficient private search with applications to rateless codes, " in Proc. Int. Conf. Financial Cryptography Data Secur. Cham, Switzerland: Springer, 2007, pp. 148-162.
J. Balasch, I. Verbauwhede, and B. Preneel, "An embedded platform for privacy-friendly road charging applications, " in Proc. Design, Autom. Test Eur. Conf. Exhib. (DATE), Mar. 2010, pp. 867-872.
F. D. Garcia, E. R. Verheul, and B. Jacobs, "Cell-based roadpricing, " in Proc. Eur. Public Key Infrastructure Workshop. Cham, Switzerland: Springer, 2011, pp. 106-122.
M. Green and S. Hohenberger, "Blind identity-based encryption and simulatable oblivious transfer, " in Proc. Int. Conf. Theory Appl. Cryptol. Inf. Secur. Cham, Switzerland: Springer, 2007, pp. 265-282.
H. Karim and D. B. Rawat, "TollsOnly please-Homomorphic encryption for toll transponder privacy in Internet of Vehicles, " IEEE Internet Things J., vol. 9, no. 4, pp. 2627-2636, Feb. 2022.
C. Gentry, A Fully Homomorphic Encryption Scheme. Stanford, CA, USA: Stanford Univ., 2009.
G. Hartung, M. Hoffmann, M. Nagel, and A. Rupp, "BBA+: Improving the security and applicability of privacy-preserving point collection, " in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Oct. 2017, pp. 1925-1942.
B. Aiello, Y. Ishai, and O. Reingold, "Priced oblivious transfer: How to sell digital goods, " in Proc. Int. Conf. Theory Appl. Cryptograph. Techn. Cham, Switzerland: Springer, 2001, pp. 119-135.
A. Barki, S. Brunet, N. Desmoulins, S. Gambs, S. Gharout, and J. Traore, "Private eCash in practice (short paper), " in Proc. Int. Conf. Financial Cryptography Data Secur. Cham, Switzerland: Springer, 2016, pp. 99-109.
B. K. Chaurasia and S. Verma, "Secure pay while on move toll collection using VANET, " Comput. Standards Interfaces, vol. 36, no. 2, pp. 403-411, Feb. 2014.
Z. Ying, L. Yi, and M. Ma, "BEHT: Blockchain-based efficient highway toll paradigm for opportunistic autonomous vehicle platoon, " Wireless Commun. Mobile Comput., vol. 2020, pp. 1-13, Sep. 2020.
H. Sukhwani, J. M. Martinez, X. Chang, K. S. Trivedi, and A. Rindos, "Performance modeling of PBFT consensus process for permissioned blockchain network (Hyperledger Fabric), " in Proc. IEEE 36th Symp. Reliable Distrib. Syst. (SRDS), Sep. 2017, pp. 253-255.
H. Bangui, M. Ge, and B. Buhnova, "A hybrid machine learning model for intrusion detection in VANET, " Computing, vol. 104, no. 3, pp. 503-531, Mar. 2022.
A. M. Alrehan and F. A. Alhaidari, "Machine learning techniques to detect DDoS attacks on VANET system: A survey, " in Proc. 2nd Int. Conf. Comput. Appl. Inf. Secur. (ICCAIS), May 2019, pp. 1-6.
S. So, P. Sharma, and J. Petit, "Integrating plausibility checks and machine learning for misbehavior detection in VANET, " in Proc. 17th IEEE Int. Conf. Mach. Learn. Appl. (ICMLA), Dec. 2018, pp. 564-571.
J. Grover, N. K. Prajapati, V. Laxmi, and M. S. Gaur, "Machine learning approach for multiple misbehavior detection in VANET, " in Proc. Int. Conf. Adv. Comput. Commun. Cham, Switzerland: Springer, 2011, pp. 644-653.
P. K. Singh, S. Gupta, R. Vashistha, S. K. Nandi, and S. Nandi, "Machine learning based approach to detect position falsification attack in VANETs, " in Proc. Int. Conf. Secur. Privacy. Cham, Switzerland: Springer, 2019, pp. 166-178.
S. Ercan, M. Ayaida, and N. Messai, "Misbehavior detection for position falsification attacks in VANETs using machine learning, " IEEE Access, vol. 10, pp. 1893-1904, 2022.
A. Boualouache and T. Engel, "A survey on machine learning-based misbehavior detection systems for 5G and beyond vehicular networks, " IEEE Commun. Surveys Tuts., early access, Jan. 12, 2023, doi: 10.1109/COMST.2023.3236448.
Y. Zeng, M. Qiu, D. Zhu, Z. Xue, J. Xiong, and M. Liu, "DeepVCM: A deep learning based intrusion detection method in VANET, " in Proc. IEEE 5th Intl Conf. Big Data Secur. Cloud (BigDataSecurity) Intl Conf. High Perform. Smart Comput., (HPSC) IEEE Intl Conf. Intell. Data Secur. (IDS), May 2019, pp. 288-293.
S. A. Almalki and F. T. Sheldon, "Deep learning to improve false data injection attack detection in cooperative intelligent transportation systems, " in Proc. IEEE 12th Annu. Inf. Technol., Electron. Mobile Commun. Conf. (IEMCON), Oct. 2021, pp. 1016-1021.