Publication

Routing with Privacy for Drone Package Delivery Systems

Max Z Li

Ding, G., Berke, A., Gopalakrishnan, K., Degue, K., Balakrishnan, H., & Li, M. (2022). Routing with Privacy for Drone Package Delivery Systems. International Conference on Research in Air Transportation (ICRAT) 2022.

Abstract

Unmanned aerial vehicles (UAVs), or drones, are increasingly being used to deliver goods from vendors to customers. To safely conduct these operations at scale, drones are required to broadcast position information as codified in remote identification (remote ID) regulations. However, location broadcast of package delivery drones introduces a privacy risk for customers using these delivery services: Third-party observers may leverage broadcast drone trajectories to link customers with their purchases, potentially resulting in a wide range of privacy risks. We propose a probabilistic definition of privacy risk based on the likelihood of associating a customer to a vendor given a package delivery route. Next, we quantify these risks, enabling drone operators to assess privacy risks when planning delivery routes. We then evaluate the impacts of various factors (e.g., drone capacity) on privacy and consider the trade-offs between privacy and delivery wait times. Finally, we propose heuristics for generating routes with privacy guarantees to avoid exhaustive enumeration of all possible routes and evaluate their performance on several realistic delivery scenarios.

A simple example that we build on is in Fig 1, below: 
(a) Stops are made directly from vendor to customer; a third-party observer has a 100% chance of inferring which customer received a delivery from which vendor. (b) Stops are first made at the vendors in random order (randomness denoted by dashed circles), then at the customer addresses in random order; a third-party observer has a 50% chance of inferring which customer received a delivery from which vendor. (c) Two routing strategies (solid arrow versus dashed arrows) with vendors v1, v2, and customer a1, where one strategy (dashed arrows) includes a “decoy stop” at vendor v2.

Related Content