Wei Sun, Kannan Srinivsan (The Ohio State University)

ZOOX Best Paper Award Runner-Up!

Being followed by other vehicles during driving is scary and causes privacy leakage (e.g., location), which can make our blood run cold and even make run moves. Moreover, deliberately following the other vehicles may cause significant traffic accidents. The following vehicle needs to maintain an appropriate separation from the following vehicle without getting lost and uncovered. To put the driver’s privacy and safety first, it is essential to discriminate between stalking vehicles (i.e., following abnormal vehicles) and normal following vehicles. However, there are no infrastructure-free and ubiquitous in-vehicle systems that can achieve abnormal following vehicle detection while driving.

To this end, we propose P2D2, a Privacy-Preserving Defensive Driving system that can detect the abnormal following vehicles through the sensor fusion. Specifically, we will use the camera to extract each following vehicle’s following time, and use the IMU sensors (e.g., Gyroscope ) to extract our vehicle’s critical driving behavior (e.g., making a left or right turn). We harness the space diversity of IMU sensing data to remove the artifacts of road surface conditions (e.g., bumps on the road surface) on critical driving behavior (CDB) detection. Then, we leverage the machine learning-based anomaly detection algorithm to detect the abnormal following vehicles based on the following vehicle’s following time and our vehicle’s critical driving behavior within the following time. Our experimental results show the F-1 score of 97.45% for the abnormal following vehicle detection in different driving scenarios during our daily traffic commute.

View More Papers

Towards a Unified Cybersecurity Testing Lab for Satellite, Aerospace,...

Andrei Costin, Hannu Turtiainen, Syed Khandkher and Timo Hamalainen (Faculty of Information Technology, University of Jyvaskyla, Finland) Presenter: Andrei Costin

Read More

LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain...

Fuchen Ma (Tsinghua University), Yuanliang Chen (Tsinghua University), Meng Ren (Tsinghua University), Yuanhang Zhou (Tsinghua University), Yu Jiang (Tsinghua University), Ting Chen (University of Electronic Science and Technology of China), Huizhong Li (WeBank), Jiaguang Sun (School of Software, Tsinghua University)

Read More

Let Me Unwind That For You: Exceptions to Backward-Edge...

Victor Duta (Vrije Universiteit Amsterdam), Fabian Freyer (University of California San Diego), Fabio Pagani (University of California, Santa Barbara), Marius Muench (Vrije Universiteit Amsterdam), Cristiano Giuffrida (Vrije Universiteit Amsterdam)

Read More

On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used...

Piyush Kumar Sharma (imec-COSIC, KU Leuven), Devashish Gosain (Max Planck Institute for Informatics), Claudia Diaz (Nym Technologies, SA and imec-COSIC, KU Leuven)

Read More