| Literature DB >> 32899524 |
Alexey Kashevnik1, Andrew Ponomarev1, Nikolay Shilov1, Andrey Chechulin1.
Abstract
This paper presents an analysis of modern research related to potential threats in a vehicle cabin, which is based on situation monitoring during vehicle control and the interaction of the driver with intelligent transportation systems (ITS). In the modern world, such systems enable the detection of potentially dangerous situations on the road, reducing accident probability. However, at the same time, such systems increase vulnerabilities in vehicles and can be sources of different threats. In this paper, we consider the primary information flows between the driver, vehicle, and infrastructure in modern ITS, and identify possible threats related to these entities. We define threat classes related to vehicle control and discuss which of them can be detected by smartphone sensors. We present a case study that supports our findings and shows the main use cases for threat identification using smartphone sensors: Drowsiness, distraction, unfastened belt, eating, drinking, and smartphone use.Entities:
Keywords: intelligent transportation systems; smartphone sensors; threats classification; vulnerabilities detection
Mesh:
Year: 2020 PMID: 32899524 PMCID: PMC7571015 DOI: 10.3390/s20185049
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1ITS Classification for vulnerability detection in vehicle cabin.
Figure 2Influence diagram as a framework for threat analysis.
Vulnerability classification for driver monitoring systems.
| Vulnerable | Description | Threat |
|---|---|---|
|
| ||
| Driver assistance system | Provides high-level (local driving restrictions, congestion and routing) and low-level (maneuver, lane change, dangerous state detection) assistance and monitoring. May build a personalized driver model to match driver’s style. | - Inadequate DAS models causing the incorrect system behavior. |
| Driver | Processes perceived information with a set of driving habits. | - Lack of training, suboptimal operative decisions, bad driving habits. |
|
| ||
| Monitoring | The process of observing the state of some entity and usually matching it with the desirable (or acceptable) state. It can be divided into environment monitoring, operative control monitoring, and psychophysiological monitoring. | Cheating state estimation for disabling alerts by smartphone usage, detection of unfastened seatbelt, etc.; sensors tampering, etc. |
| Recommendations/Alerts | Signals issued to the driver by DAS to draw the driver’s attention to some important changes in the situation or to inform about reasonable actions. Can be high-level (recommended speed, route) and low-level (maneuver suggestions, dangerous state alerts). | - Recommendations inconsistent with the driving habits or erroneous (recommendation to make a maneuver when it is dangerous) may result in suboptimal routing decisions or traffic rules violation (high-level recommendations), a dangerous situation, or even an accident (low-level recommendations). |
| Operative Control | A driver implements his/her driving decisions (maneuvering, speed control etc.) with a help of some typical HMI in the cabin (driving wheel, pedals etc.). | - Inadequate driving decisions (caused by bad driving habits or abnormal state) may result in the increase of accident chances. |
| Perception | A driver percepts the road situation. | - Missing important changes in situation (e.g., due to abnormal state, visual and audial obstacles, compromised HMIs reporting incorrect statuses to attempt driver or passengers to perform certain actions) results in the increase of accident chances. |
Vulnerabilities, attacks, and associated threats detectable by smartphone sensors.
| Vulnerability | Attack | Threat Source | |
|---|---|---|---|
| Cyber | Various cyber vulnerabilities (e.g., packet injection, malware injection, etc.) [ | Non-physical interaction with the vehicle, its communication channels, or other systems the vehicle interacts with [ | Environment (passenger or something/somebody from outside) |
| Cyber-Physical | Vulnerability to sensory channel attack (manipulating the physical environment to deceive vehicle’s sensors) [ | Manipulating the physical environment to deceive vehicle’s sensors [ | Environment (passenger or something/somebody from outside) |
| Physical | Vulnerability to hardware tampering [ | Physical damaging (including accidents) or natural degradation of vehicle’s components) [ | Environment (passenger or something/somebody from outside) |
| Psycho-physiological | Change of stress level [ | Unwanted interaction with the driver (sound, light, physical interaction) [ | Environment (passenger or something/somebody from outside) |
| Cyber-psycho-physiological | Change of stress level [ | Unwanted interaction with the driver through communication channels (e.g., phone calls, messaging). | Environment (passenger or something/somebody from outside) |
Figure 3Drowsiness and distraction use cases.
Figure 4Unfastened belt and smartphone usage use-cases.
Developed framework evaluation.
| # | Use-case | Recall | Precision |
|---|---|---|---|
| 1 | Drowsiness | 69% | 95% |
| 2 | Distraction | 95% | 98% |
| 3 | Belt Unfastens | 70% | 100% |
| 4 | Eating/Drinking | 45% | 80% |
| 5 | Smartphone Usage | 87% | 92% |