{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T22:36:04Z","timestamp":1774650964699,"version":"3.50.1"},"reference-count":103,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000266","name":"PETRAS: U.K., Research Hub for Cyber Security of the Internet of Things Project EPSRC","doi-asserted-by":"publisher","award":["EP\/N02334X\/1"],"award-info":[{"award-number":["EP\/N02334X\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016335","name":"Jaguar Land Rover","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016335","id-type":"DOI","asserted-by":"publisher"}]},{"name":"U.K.-EPSRC"},{"DOI":"10.13039\/501100000266","name":"Towards Autonomy: Smart and Connected Control (TASCC) Programme","doi-asserted-by":"publisher","award":["EP\/N01300X\/1"],"award-info":[{"award-number":["EP\/N01300X\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Towards Autonomy: Smart and Connected Control (TASCC) Programme","doi-asserted-by":"publisher","award":["EP\/N012380\/1"],"award-info":[{"award-number":["EP\/N012380\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3038533","type":"journal-article","created":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:44:15Z","timestamp":1605649455000},"page":"207465-207484","source":"Crossref","is-referenced-by-count":9,"title":["Privacy Challenges With Protecting Live Vehicular Location Context"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4661-000X","authenticated-orcid":false,"given":"Matthew","family":"Bradbury","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1279-8393","authenticated-orcid":false,"given":"Phillip","family":"Taylor","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7428-3504","authenticated-orcid":false,"given":"Ugur Ilker","family":"Atmaca","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4715-212X","authenticated-orcid":false,"given":"Carsten","family":"Maple","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6406-8632","authenticated-orcid":false,"given":"Nathan","family":"Griffiths","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287866"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-013-0196-1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65127-9_19"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023662"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"ref30","year":"2016","journal-title":"Automotive Industry Adopts GSMA Embedded SIM Specification to Accelerate Connected Car Market"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2013.89"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"key":"ref35","first-page":"169","article-title":"Mobile subscriber WiFi privacy","author":"o\u2019hanlon","year":"2017","journal-title":"Proc IEEE Secur Privacy Workshops (SPW)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23442"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2440374"},{"key":"ref27","article-title":"State of the art of electronic road tolling","author":"manzi","year":"2015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2820783.2820804"},{"key":"ref20","author":"nie","year":"2017","journal-title":"Free-Fall Hacking Tesla from Wireless to Can Bus"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2162864"},{"key":"ref21","first-page":"21","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","author":"rouf","year":"2010","journal-title":"Proc 19th USENIX Conf Security"},{"key":"ref24","first-page":"1","article-title":"Relay attacks on passive keyless entry and start systems in modern cars","author":"francillon","year":"2011","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref23","first-page":"1","article-title":"Lock it and still lose it&#x2014;On the (in) security of automotive remote keyless entry systems","author":"garcia","year":"2016","journal-title":"Proc 25th USENIX Secur Symp (USENIX Secur )"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508174"},{"key":"ref26","year":"2010"},{"key":"ref100","author":"carter","year":"2017","journal-title":"Connected Cars Privacy Security Issues Related to Connected Automated Vehicles"},{"key":"ref25","year":"2014"},{"key":"ref50","author":"schroeder","year":"2017","journal-title":"Top 11 Worst Location Data Privacy Breaches"},{"key":"ref51","year":"2018","journal-title":"Fitness App Strava Lights up Staff at Military Bases"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795497"},{"key":"ref58","first-page":"369","article-title":"Analyzing threat agents and their attributes","author":"vidalis","year":"2005","journal-title":"Proc ECIW"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994499"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198465"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.trb.2018.06.012"},{"key":"ref54","first-page":"1","article-title":"Vehicle point of interest detection using in-car data","author":"van hinsbergh","year":"2018","journal-title":"Proc 2nd ACM SIGSPATIAL Int Workshop AI Geograph Knowl Discovery"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.03.025"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s12544-015-0170-8"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST.2019.8667248"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0633-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2015.10.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100247"},{"key":"ref8","author":"shargall","year":"2018","journal-title":"How Does Black Box Insurance Work?"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600039WC"},{"key":"ref7","author":"beren","year":"2020","journal-title":"The 9 Best Car GPS Trackers of 2020"},{"key":"ref9","first-page":"449","author":"northcliffe","year":"1906","journal-title":"Motors Motor-Driving"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.12.050"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0029"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2800123"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795670"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2706978"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.888405"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s40534-016-0098-2"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2856767.2856806"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-015-1481-x"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1201\/9781420091502"},{"key":"ref71","first-page":"24","article-title":"L-diversity: Privacy beyond k-anonymity","author":"machanavajjhala","year":"2006","journal-title":"Proc Int Conf Data Engineering (ICDE)"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.008"},{"key":"ref76","first-page":"747","article-title":"BLENDER: Enabling local search with a hybrid differential privacy model","author":"avent","year":"2017","journal-title":"Proc 26th USENIX Security Symp (USENIX Security)"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"ref74","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Theory Cryptography"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2009.5416380"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3001381"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2013.6761338"},{"key":"ref63","author":"auto","year":"2018","journal-title":"Sacramento Becomes First City to Deploy Digital License Plates"},{"key":"ref64","article-title":"Fooling OCR systems with adversarial text images","author":"song","year":"2018","journal-title":"arXiv 1802 05385"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"ref67","first-page":"763","article-title":"The new casper: Query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"Proc 32nd Int Conf Very Large Data Bases"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242623"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2820039"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367531"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2822260"},{"key":"ref95","year":"2015","journal-title":"Directive (EU) 2015\/413 of the European Parliament and of the Council of 11 March 2015 Facilitating Cross-Border Exchange of Information on Road-Safety-Related Traffic Offences"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399369"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"ref92","article-title":"Passive remote keyless entry system","author":"king","year":"2001"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/1614379.1614380"},{"key":"ref90","article-title":"Every step you fake: A comparative analysis of fitness tracker privacy and security, version 1.5","author":"hilts","year":"2016"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2834569"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.024"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-1372"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MMAR.2014.6957429"},{"key":"ref96","year":"2014","journal-title":"eCall&#x2014;Do You Have Any Concerns for Your Privacy? You Shouldn&#x2019;t $\\ldots$"},{"key":"ref97","author":"liu","year":"2019","journal-title":"Efficient anonymous signatures with event linkability for V2X communications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2203741"},{"key":"ref11","article-title":"Met intelligence ANPR Bureau privacy impact accessment, met intelligence ANPR Bureau","author":"winterbourne","year":"2014"},{"key":"ref12","year":"2018","journal-title":"Automatic Number Plate Recognition Use of ANPR by Police Forces and Other Law Enforcement Agencies"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2016.7553002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.195"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2012.6338880"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2520-x"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.10.035"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_53"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2016.0064"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/0361198105191700119"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2964410"},{"key":"ref19","first-page":"333","article-title":"Mobile systems privacy:&#x2018;MobiPriv&#x2019; a robust system for snapshot or con-tinuous querying location based mo-bile systems","volume":"5","author":"stenneth","year":"2012","journal-title":"Trans Data Privacy"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381978"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347955"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2838136"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935026"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.17"},{"key":"ref88","author":"woolley","year":"2015","journal-title":"Bluetooth Technology Protecting Your Privacy"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09261380.pdf?arnumber=9261380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:56:56Z","timestamp":1642003016000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9261380\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":103,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3038533","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}