Abstract
Modern car-embedded technologies enabled car thieves to perform new ways to steal cars. In order to avoid auto-theft attacks, in this paper we propose a machine learning based method to silently and continuously profile the driver by analyzing built-in vehicle sensors. The proposed method exploits rule-based machine learning with the aim to discriminate between the car owner and impostors. Furthermore, we discuss how the rules generated by the rule-based algorithm can be adopted in order to discriminate between different driving styles.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Bernardi, M.L., Cimitile, M., Martinelli, F., Mercaldo, F.: Driver and path detection through time-series classification. J. Adv. Transp. 2018, 20 (2018)
Canfora, G., Martinelli, F., Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.: LEILA: formal tool for identifying mobile malicious behaviour. IEEE Trans. Softw. Eng. (2018). https://doi.org/10.1109/TSE.2018.2834344
Ceccarelli, M., Cerulo, L., Santone, A.: De novo reconstruction of gene regulatory networks from time series data, an approach based on formal methods. Methods 69(3), 298–305 (2014)
Cimitile, A., Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Talos: no more ransomware victims with formal methods. Int. J. Inf. Secur. 1–20 (2017)
De Francesco, N., Lettieri, G., Santone, A., Vaglini, G.: Heuristic search for equivalence checking. Softw. Syst. Model. 15(2), 513–530 (2016)
Enev, M., Takakuwa, A., Koscher, K., Kohno, T.: Automobile driver fingerprinting. Proc. Priv. Enhanc. Technol. 2016(1), 34–50 (2016)
Kwak, B.I., Woo, J., Kim, H.K.: Know your master: driver profiling-based anti-theft method. In: PST, vol. 2016, pp. 211–218 (2016)
Martin, B.: Instance-based learning: nearest neighbor with generalization [thesis] (1995)
Martinelli, F., Mercaldo, F., Nardone, V., Orlando, A., Santone, A.: Who’s driving my car? A machine learning based approach to driver identification (2018)
Martinelli, F., Mercaldo, F., Nardone, V., Santone, A.: Car hacking identification through fuzzy logic algorithms. In: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1–7. IEEE (2017)
Martinelli, F., Mercaldo, F., Orlando, A., Nardone, V., Santone, A., Sangaiah, A.K.: Human behavior characterization for driving style recognition in vehicle system. Comput. Electr. Eng. (2018)
Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Download malware? No, thanks. how formal methods can block update attacks. In: 2016 IEEE/ACM 4th FME Workshop on Formal Methods in Software Engineering (FormaliSE), pp. 22–28. IEEE (2016)
Miyajima, C., Nishiwaki, Y., Ozawa, K., Wakita, T., Itou, K., Takeda, K.: Cepstral analysis of driving behavioral signals for driver identification. In: 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings, vol. 5, pp. V–V. IEEE (2006)
Nor, N.M., Wahab, A.: Driver identification and driver’s emotion verification using KDE and MLP neural networks. In: 2010 International Conference on Information and Communication Technology for the Muslim World (ICT4M), pp. E96–E101. IEEE (2010)
Powers, D.M.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation (2011)
Roy, S.: Nearest neighbor with generalization. Christchurch, New Zealand (2002)
Stehman, S.V.: Selecting and interpreting measures of thematic classification accuracy. Remote Sens. Environ. 62(1), 77–89 (1997)
Acknowledgment
This work has been partially supported by H2020 EU-funded projects NeCS and C3ISP and EIT-Digital Project HII and PRIN “Governing Adaptive and Unplanned Systems of Systems” and the EU project CyberSure 734815.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Martinelli, F., Mercaldo, F., Nardone, V., Santone, A., Vaglini, G. (2018). Real-Time Driver Behaviour Characterization Through Rule-Based Machine Learning. In: Gallina, B., Skavhaug, A., Schoitsch, E., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2018. Lecture Notes in Computer Science(), vol 11094. Springer, Cham. https://doi.org/10.1007/978-3-319-99229-7_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-99229-7_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99228-0
Online ISBN: 978-3-319-99229-7
eBook Packages: Computer ScienceComputer Science (R0)