skip to main content
10.1145/3132211.3134462acmconferencesArticle/Chapter ViewAbstractPublication PagessecConference Proceedingsconference-collections
research-article

PredriveID: pre-trip driver identification from in-vehicle data

Published:12 October 2017Publication History

ABSTRACT

This paper explores the minimal dataset necessary at vehicular edge nodes, to effectively differentiate drivers using data from existing in-vehicle sensors. This facilitates novel personalization, insurance, advertising, and security applications but can also help in understanding the privacy sensitivity of such data. Existing work on differentiating drivers largely relies on devices that drivers carry, or on the locations that drivers visit to distinguish drivers. Internally, however, the vehicle processes a much richer set of sensor information that is becoming increasingly available to external services. To explore how easily drivers can be distinguished from such data, we consider a system that interfaces to the vehicle bus and executes supervised or unsupervised driver differentiation techniques on this data. To facilitate this analysis and to evaluate the system, we collect in-vehicle data from 24 drivers on a controlled campus test route, as well as 480 trips over three weeks from five shared university mail vans. We also conduct studies between members of a family. The results show that driver differentiation does not require longer sequences of driving telemetry data but can be accomplished with 91% accuracy within 20s after the driver enters the vehicle, usually even before the vehicle starts moving.

References

  1. SangJo Choi, JeongHee Kim, DongGu Kwak, Pongtep Angkititrakul, and John HL Hansen. Analysis and classification of driver behavior using in-vehicle can-bus information. In Biennial Workshop on DSP for In-Vehicle and Mobile Systems, pages 17--19, 2007.Google ScholarGoogle Scholar
  2. Tim Churches and Peter Christen. Blind data linkage using n-gram similarity comparisons. In Advances in Knowledge Discovery and Data Mining, pages 121--126. Springer, 2004. Google ScholarGoogle ScholarCross RefCross Ref
  3. Tim Churches and Peter Christen. Some methods for blindfolded record linkage. BMC Medical Informatics and Decision Making, 4(1):9, 2004. Google ScholarGoogle ScholarCross RefCross Ref
  4. Steve Corrigan. Introduction to the controller area network (can). Application Report, 2008.Google ScholarGoogle Scholar
  5. Miro Enev, Alex Takakuwa, Karl Koscher, and Tadayoshi Kohno. Automobile driver fingerprinting. Proceedings on Privacy Enhancing Technologies, 2016(1):34--50, 2016. Google ScholarGoogle ScholarCross RefCross Ref
  6. Xianyi Gao, Bernhard Firner, Shridatt Sugrim, Victor Kaiser-Pendergrast, Yulong Yang, and Janne Lindqvist. Elastic pathing: Your speed is enough to track you. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14, pages 975--986, New York, NY, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Philippe Golle and Kurt Partridge. On the anonymity of home/work location pairs. In Pervasive computing, pages 390--397. Springer, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Hoh, T. Iwuchukwu, Q. Jacobson, D. Work, A.M. Bayen, R. Herring, J.-C. Herrera, M. Gruteser, M. Annavaram, and J. Ban. Enhancing privacy and accuracy in probe vehicle-based traffic monitoring via virtual trip lines. Mobile Computing, IEEE Transactions on, 11(5):849--864, May 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Baik Hoh, Marco Gruteser, Hui Xiong, and Ansaf Alrabady. Preserving privacy in gps traces via density-aware path cloaking. Proceedings of CCSfi07, 2007.Google ScholarGoogle Scholar
  10. Shubham Jain and Janne Lindqvist. Should I protect you? Understanding developers' behavior to privacy-preserving APIs. In Workshop on Usable Security 2014, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  11. Yurong Jiang, Hang Qiu, Matthew McCartney, William G. J. Halfond, Fan Bai, Donald Grimm, and Ramesh Govindan. Carlog: A platform for flexible and efficient automotive sensing. In Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, SenSys '14, pages 221--235, New York, NY, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Cagdas Karatas, Luyang Liu, Hongyu Li, James Liu, Yan Wang, J Yang, Yingying Chen, Marco Gruteser, and Rich Martin. Leveraging wearables for steering and driver tracking,. In IEEE International Conference on Computer Communications (Infocom) 2016. ACM, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  13. John Krumm. Inference attacks on location tracks. In Proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE'07, pages 127--143, Berlin, Heidelberg, 2007. Springer-Verlag. Google ScholarGoogle ScholarCross RefCross Ref
  14. Chiyomi Miyajima, Yoshihiro Nishiwaki, Koji Ozawa, Toshihiro Wakita, Katsunobu Itou, Kazuya Takeda, and Fumitada Itakura. Driver modeling based on driving behavior and its evaluation in driver identification. Proceedings of the IEEE, 95(2):427--437, 2007. Google ScholarGoogle ScholarCross RefCross Ref
  15. Prashanth Mohan, Venkata N. Padmanabhan, and Ramachandran Ramjee. Neri-cell: Rich monitoring of road and traffic conditions using mobile smartphones. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, SenSys '08, pages 323--336, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. OnStar. OnStar by GM. http://openxcplatform.com/, 2015. Online; accessed 2015-12-5.Google ScholarGoogle Scholar
  17. Alex Pentland and Andrew Lin. Modeling and prediction of human behavior. Neural Computation, 11:229--242, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Andreas Riener and Alois Ferscha. Supporting implicit human-to-vehicle interaction: Driver identification from sitting postures. In The First Annual International Symposium on Vehicular Computing Systems (ISVCS 2008), page 10, 2008. Google ScholarGoogle ScholarCross RefCross Ref
  19. Monica Scannapieco, Ilya Figotin, Elisa Bertino, and Ahmed K Elmagarmid. Privacy preserving schema and data matching. In Proceedings of the 2007 ACM SIGMOD international conference on Management of data, pages 653--664. ACM, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Rainer Schnell, Tobias Bachteler, and Jörg Reiher. Privacy-preserving record linkage using bloom filters. BMC medical informatics and decision making, 9(1):41, 2009. Google ScholarGoogle ScholarCross RefCross Ref
  21. Heikki Summala. Automatization, automation, and modeling of driver's behavior. In Recherche - Transports - Scurit, pages 35--45. Elsevier, 2000. Google ScholarGoogle ScholarCross RefCross Ref
  22. The OpenXC. The OpenXC Platform. http://openxcplatform.com/, 2015. Online; accessed 2015-12-5.Google ScholarGoogle Scholar
  23. Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, and Richard P Martin. Sensing vehicle dynamics for determining driver phone use. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services, pages 41--54. ACM, 2013.Google ScholarGoogle Scholar
  24. Jie Yang, Simon Sidhom, Gayathri Chandrasekaran, Tam Vu, Hongbo Liu, Nicolae Cecan, Yingying Chen, Marco Gruteser, and Richard P Martin. Detecting driver phone use leveraging car speakers. In Proceedings of the 17th annual international conference on Mobile computing and networking, pages 97--108. ACM, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Bin Zan, Peng Hao, M. Gruteser, and Xuegang Ban. Vtl zone-aware path cloaking algorithm. In Intelligent Transportation Systems (ITSC), 2011 14th International IEEE Conference on, pages 1525--1530, Oct 2011. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. PredriveID: pre-trip driver identification from in-vehicle data

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SEC '17: Proceedings of the Second ACM/IEEE Symposium on Edge Computing
        October 2017
        365 pages
        ISBN:9781450350877
        DOI:10.1145/3132211

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 October 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SEC '17 Paper Acceptance Rate20of41submissions,49%Overall Acceptance Rate40of100submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader