|国家预印本平台
首页|CAN-Trace Attack: Exploit CAN Messages to Uncover Driving Trajectories

CAN-Trace Attack: Exploit CAN Messages to Uncover Driving Trajectories

CAN-Trace Attack: Exploit CAN Messages to Uncover Driving Trajectories

来源:Arxiv_logoArxiv
英文摘要

Driving trajectory data remains vulnerable to privacy breaches despite existing mitigation measures. Traditional methods for detecting driving trajectories typically rely on map-matching the path using Global Positioning System (GPS) data, which is susceptible to GPS data outage. This paper introduces CAN-Trace, a novel privacy attack mechanism that leverages Controller Area Network (CAN) messages to uncover driving trajectories, posing a significant risk to drivers' long-term privacy. A new trajectory reconstruction algorithm is proposed to transform the CAN messages, specifically vehicle speed and accelerator pedal position, into weighted graphs accommodating various driving statuses. CAN-Trace identifies driving trajectories using graph-matching algorithms applied to the created graphs in comparison to road networks. We also design a new metric to evaluate matched candidates, which allows for potential data gaps and matching inaccuracies. Empirical validation under various real-world conditions, encompassing different vehicles and driving regions, demonstrates the efficacy of CAN-Trace: it achieves an attack success rate of up to 90.59% in the urban region, and 99.41% in the suburban region.

Xiaojie Lin、Baihe Ma、Xu Wang、Guangsheng Yu、Ying He、Wei Ni、Ren Ping Liu

10.1109/TITS.2025.3532455

公路运输工程

Xiaojie Lin,Baihe Ma,Xu Wang,Guangsheng Yu,Ying He,Wei Ni,Ren Ping Liu.CAN-Trace Attack: Exploit CAN Messages to Uncover Driving Trajectories[EB/OL].(2025-07-13)[2025-07-23].https://arxiv.org/abs/2507.09624.点此复制

评论