Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.5.919

The Sub Authentication Method For Driver Using Driving Patterns  

Jeong, Jong-Myoung (Graduate School for Information Security, Korea University)
Kang, Hyung Chul (Graduate School for Information Security, Korea University)
Jo, Hyo Jin (Graduate School for Information Security, Korea University)
Yoon, Ji Won (Graduate School for Information Security, Korea University)
Lee, Dong Hoon (Graduate School for Information Security, Korea University)
Abstract
Recently, a variety of IT technologies are applied to the vehicle. However, some vehicle-IT technologies without security considerations may cause security problems. Specially, some researches about a smart key system applied to automobiles for authentication show that the system is insecure from replay attacks and modification attacks using a wireless signal of the smart key. Thus, in this paper, we propose an authentication method for the driver by using driving patterns. Nowadays, we can obtain driving patterns using the In-vehicle network data. In our authentication model, we make driving ppatterns of car owner using standard normal distribution and apply these patterns to driver authentication. To validate our model, we perform an k-fold cross validation test using In-vehicle network data and obtain the result(true positive rate 0.7/false positive rate is 0.35). Considering to our result, it turns out that our model is more secure than existing 'what you have' authentication models such as the smart key if the authentication result is sent to the car owner through mobile networks.
Keywords
Vehicle Security; Driver Authentication; Driving pattern Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 ISO Standard, "Road vehicles -- Controller area network (CAN) -- Part 1: Data link layer and physical signalling," ISO 11898:1, 2003.
2 SAE Standard, "Vehicle Application Layer," SAE J1939/81. 1997.
3 R. Verdult, F. Garcia and J. Balasch, " Gone in 360 seconds: Hijacking with Hitag2," 21st USENIX Security Symposium, 2012.
4 이재원, "FY2011 수리비 지급현황 분석," KIDI, pp. 3-12, 2011.
5 SAE Standard, "E/E Diagnostic Test Modes," SAE J1979, Apr. 2002.
6 C. Lin, J. Sooil, P. Huei and L. Jangmoo, "Driving Pattern Recognition for Control of Hybrid Electric Trucks," Vehicle System Dynamics, vol. 42, no. 1-2, pp. 41-58, Dec. 2004.   DOI   ScienceOn
7 Y. Zhang, W.C. Lin and C.S. Yuen-kwok, "A pattern-recognition approach for driving skill characterization," Intelligent Transportation Systems, IEEE Transactions, vol. 11, no. 4, pp. 905-916, Dec. 2010.   DOI   ScienceOn
8 D.A. Johnson and M.M. Trivedi, "Driving style recognition using a smartphone as a sensor platform," 14th IEEE Intelligent Transportation Systems Conference, pp. 1609-1615, Oct. 2011.
9 배출가스자기진단장치(OBD) 인증 안내문, http://www.nier.go.kr/eric/portal/tprc/nf/ tprc-nf-01.page?boardId=TPRCNF01& bltnNo=1285570000146&command=READ
10 OBD-II PIDs, http://en.wikipedia.org/wi ki/OBD-II_PIDs
11 R. Kohavi, "A study of cross-validation and bootstrap for accuracy estimation and model selection," In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, vol. 14, no. 2, pp. 1137-1143, Aug. 1995.
12 A.P. Bradley. "The use of the area under the ROC curve in the evaluation of machine learning algorithms," Pattern Recognition., vol. 30, no. 7, pp. 1145- 1159, Jul. 1997.   DOI   ScienceOn
13 C. Pardilla, "Top 10 Ways to Steal a Car (and how to defend against them)," Edmunds.com, Jul. 2004.