Skip to main content

Real-Time Driver Behaviour Characterization Through Rule-Based Machine Learning

  • Conference paper
  • First Online:
Computer Safety, Reliability, and Security (SAFECOMP 2018)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 11094))

Included in the following conference series:

Abstract

Modern car-embedded technologies enabled car thieves to perform new ways to steal cars. In order to avoid auto-theft attacks, in this paper we propose a machine learning based method to silently and continuously profile the driver by analyzing built-in vehicle sensors. The proposed method exploits rule-based machine learning with the aim to discriminate between the car owner and impostors. Furthermore, we discuss how the rules generated by the rule-based algorithm can be adopted in order to discriminate between different driving styles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.ic3.gov/media/2016/160317.aspx.

  2. 2.

    https://www.iii.org/fact-statistic/facts-statistics-auto-theft.

  3. 3.

    https://www.nicb.org/.

  4. 4.

    http://www.totalcardiagnostics.com/elm327-bluetooth/.

  5. 5.

    http://www.cs.waikato.ac.nz/ml/weka/.

  6. 6.

    https://play.google.com/store/apps/details?id=org.prowl.torquefree.

References

  1. Bernardi, M.L., Cimitile, M., Martinelli, F., Mercaldo, F.: Driver and path detection through time-series classification. J. Adv. Transp. 2018, 20 (2018)

    Article  Google Scholar 

  2. Canfora, G., Martinelli, F., Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.: LEILA: formal tool for identifying mobile malicious behaviour. IEEE Trans. Softw. Eng. (2018). https://doi.org/10.1109/TSE.2018.2834344

  3. Ceccarelli, M., Cerulo, L., Santone, A.: De novo reconstruction of gene regulatory networks from time series data, an approach based on formal methods. Methods 69(3), 298–305 (2014)

    Article  Google Scholar 

  4. Cimitile, A., Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Talos: no more ransomware victims with formal methods. Int. J. Inf. Secur. 1–20 (2017)

    Google Scholar 

  5. De Francesco, N., Lettieri, G., Santone, A., Vaglini, G.: Heuristic search for equivalence checking. Softw. Syst. Model. 15(2), 513–530 (2016)

    Article  Google Scholar 

  6. Enev, M., Takakuwa, A., Koscher, K., Kohno, T.: Automobile driver fingerprinting. Proc. Priv. Enhanc. Technol. 2016(1), 34–50 (2016)

    Article  Google Scholar 

  7. Kwak, B.I., Woo, J., Kim, H.K.: Know your master: driver profiling-based anti-theft method. In: PST, vol. 2016, pp. 211–218 (2016)

    Google Scholar 

  8. Martin, B.: Instance-based learning: nearest neighbor with generalization [thesis] (1995)

    Google Scholar 

  9. Martinelli, F., Mercaldo, F., Nardone, V., Orlando, A., Santone, A.: Who’s driving my car? A machine learning based approach to driver identification (2018)

    Google Scholar 

  10. Martinelli, F., Mercaldo, F., Nardone, V., Santone, A.: Car hacking identification through fuzzy logic algorithms. In: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1–7. IEEE (2017)

    Google Scholar 

  11. Martinelli, F., Mercaldo, F., Orlando, A., Nardone, V., Santone, A., Sangaiah, A.K.: Human behavior characterization for driving style recognition in vehicle system. Comput. Electr. Eng. (2018)

    Google Scholar 

  12. Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Download malware? No, thanks. how formal methods can block update attacks. In: 2016 IEEE/ACM 4th FME Workshop on Formal Methods in Software Engineering (FormaliSE), pp. 22–28. IEEE (2016)

    Google Scholar 

  13. Miyajima, C., Nishiwaki, Y., Ozawa, K., Wakita, T., Itou, K., Takeda, K.: Cepstral analysis of driving behavioral signals for driver identification. In: 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings, vol. 5, pp. V–V. IEEE (2006)

    Google Scholar 

  14. Nor, N.M., Wahab, A.: Driver identification and driver’s emotion verification using KDE and MLP neural networks. In: 2010 International Conference on Information and Communication Technology for the Muslim World (ICT4M), pp. E96–E101. IEEE (2010)

    Google Scholar 

  15. Powers, D.M.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation (2011)

    Google Scholar 

  16. Roy, S.: Nearest neighbor with generalization. Christchurch, New Zealand (2002)

    Google Scholar 

  17. Stehman, S.V.: Selecting and interpreting measures of thematic classification accuracy. Remote Sens. Environ. 62(1), 77–89 (1997)

    Article  Google Scholar 

Download references

Acknowledgment

This work has been partially supported by H2020 EU-funded projects NeCS and C3ISP and EIT-Digital Project HII and PRIN “Governing Adaptive and Unplanned Systems of Systems” and the EU project CyberSure 734815.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Francesco Mercaldo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Martinelli, F., Mercaldo, F., Nardone, V., Santone, A., Vaglini, G. (2018). Real-Time Driver Behaviour Characterization Through Rule-Based Machine Learning. In: Gallina, B., Skavhaug, A., Schoitsch, E., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2018. Lecture Notes in Computer Science(), vol 11094. Springer, Cham. https://doi.org/10.1007/978-3-319-99229-7_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99229-7_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99228-0

  • Online ISBN: 978-3-319-99229-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics