You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

5 September 2020

In-Vehicle Situation Monitoring for Potential Threats Detection Based on Smartphone Sensors

,
,
and
St. Petersburg Federal Research Center, Russian Academy of Sciences (SPC RAS), St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, St. Petersburg 199178, Russia
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Smartphone Sensors for Driver Behavior Monitoring Systems

Abstract

This paper presents an analysis of modern research related to potential threats in a vehicle cabin, which is based on situation monitoring during vehicle control and the interaction of the driver with intelligent transportation systems (ITS). In the modern world, such systems enable the detection of potentially dangerous situations on the road, reducing accident probability. However, at the same time, such systems increase vulnerabilities in vehicles and can be sources of different threats. In this paper, we consider the primary information flows between the driver, vehicle, and infrastructure in modern ITS, and identify possible threats related to these entities. We define threat classes related to vehicle control and discuss which of them can be detected by smartphone sensors. We present a case study that supports our findings and shows the main use cases for threat identification using smartphone sensors: Drowsiness, distraction, unfastened belt, eating, drinking, and smartphone use.

1. Introduction

Nowadays, intelligent transportation systems (ITS) are attracting more and more research and development activities. There are a lot of conferences (IEEE International Conference on Intelligent Transportation Systems, IEEE Intelligent Vehicles Symposium postponed, Vehicle Technology and Intelligent Transport Systems, and etc.) and journals (IEEE Transactions on Intelligent Transportation Systems, IEEE Transactions on Intelligent Vehicles, and etc.) that join together researchers in the area. In addition, car manufactures are widely implementing ITS technologies in the produced vehicles. Such technologies include advanced driver assistance systems (ADAS) [1], vehicle-to-vehicle (V2V) Communication [2], driver monitoring systems [3]. The main task of ITS is to solve large-scale challenges of transportation infrastructure (i.e., routing, congestion prevention, and safety). Modern sensors for data collection and artificial intelligence solutions for its processing are widely used in ITSs. Information from sensors is joined into a holistic representation of the traffic situation and employs various predictive models to estimate future situation.
Driver Assistance Systems (DAS) support vehicle driver with the following features: antilock-breaking, adaptive cruise control, parking or lane change assistance, drowsiness monitoring, and etc. The main difference between DAS and ITS is that DAS provide functions to support a particular driver, while ITS are aiming at more global tasks related to traffic organization in a particular region.
The basic entities considered in the paper are the driver, environment (that includes vehicle the driver controls, road situation, and weather), and DAS. The road situation includes an infrastructure and other vehicles. The infrastructure includes information signs, toll points, monitoring, and parking systems. DAS are designed to support the driver in vehicle cabin and reduce accident probability, they reduce the level of both threats that the driver can bring to the environment, and threats that the environment can bring to the driver. However, DAS can also bring some threats for both the driver and the infrastructure.
Modern DAS are cyber-physical systems, software and hardware components, which can cause potential threats for them. At the moment, before automated vehicles are widely used, the human driver is the main part of any transportation system. When the driver is added to such cyber-physical system it becomes a socio-cyber-physical system with more components and threats. As a result, potential threats have to be considered taking into account interaction of DAS with the human. The paper makes a first step in this direction. Just as DAS, Driver Monitoring Systems (DMS) can both reduce some threats under the human machine interaction, and cause new threats during the interaction.
The main contribution of the paper is to identify possible threats in vehicle cabin, classify them, and discuss which of them can be detected by smartphone sensors (including front and back cameras, microphone, positioning system (GPS/GLONASS), accelerometer, magnetometer, and gyroscope). We believe that the analysis presented in the paper is important in three ways. First, it encompasses further research on in-vehicle monitoring, especially the line of research focused on using minimal (most accessible) hardware for increasing driver’s safety. Second, it provides a functional framework for in-vehicle monitoring applications. Finally, it allows one to systematically evaluate in-vehicle driver monitoring applications, in particular, the completeness of threats coverage.
In the paper we use the following standard terminology from the IT security domain [4]. Vulnerabilities are weaknesses that might be used to bring undesired damage. Threats are circumstances that potentially can cause undesired damage. Attacks are actions aimed at “the exploitation of vulnerabilities by threats”.
The rest of the paper is organized as follows. Related work in the topic of ITS, information flows in such systems as well as human-computer threats detection is presented in Section 2. Results got on the basis of the system analysis are presented in the Section 3. Research questions are discussed in Section 4. Main results are summarized in Section 5.

3. Classification of Potential Threats in Vehicle Cabin

We have identified possible threats in the vehicle cabin based on the related work analysis. To present them in a systematic way, it is useful to consider them in the context of entities and information flows in the vehicle cabin. Any of these threats can be associated with either an entity (e.g., state properties of it), or with some of the information flows. We present the influence diagram, showing the entities, the information flows, and map the identified threats to the elements of this influence diagram. Also, we present vulnerability classification in the vehicle cabin. After that, we propose threats classification and highlight which of them can be detected by smartphone sensors.

3.1. Driver-Environment-DAS Information Flows

Figure 2 presents the influence diagram showing relevant entities and their interdependencies. Main entities are a driver, an environment, and a driver assistance system. We differentiate a driver assistance systems from advanced driver assistance systems, which is an integrated system installed to the vehicles on manufactures. In the considered case, the driver assistance system implements the functions of driver monitoring. The environment is a complex entity, which includes a set of other entities influencing the safety and security of the driver, namely: vehicle, weather, and road situation. Vehicles in this context represent all the factors attributed to the vehicle used by a driver: Ergonomics of the controls, technical condition, and even passengers who share the trip with the driver. A road situation includes all the entities introduced by the transportation system: infrastructure (including road, semaphores, traffic signs, and road markings) and other vehicles in the neighborhood of the driver’s vehicle. Finally, weather represents factors of the environment not related to the transportation system, but affecting the safety and security (e.g., fog, heavy rain). For example, most of the threats resulted from abnormal driver state should be attributed to the driver in this diagram. Threats resulted from bad road conditions to the infrastructure, and from traffic situation to other vehicles.
Figure 2. Influence diagram as a framework for threat analysis.
Interdependence structure consists of two levels. The first level is the driver, the environment, and the interactions reflecting the fact that the driver continuously monitors the environment and makes operative driving decisions. This circuit exists as long as people drive vehicles. On the other hand, recent developments in the area of driver support have added a new level to this picture. Namely, sometimes, there is some entity (a system running either on the in-vehicle hardware or on a smartphone attached to the windshield) that monitors the driver and/or the situation and issues some alerts/recommendations to increase driver’s comfort and safety. The presence of this system transforms the situation in several ways. First, the system can detect some deviations in the driver’s behavior and/or anomalies in the information flows and warn the driver. Second, the system is itself associated with a number of information flows that can be distorted, resulting in potential threats. Finally, the presence of such system can change the behavior of the driver, who can rely on the system and make mistakes in case the system fails unexpectedly.
The logic behind using the diagram in Figure 2 as a source for threat identification and structuring is explained. First, the ‘lower level’ cycle: A driver percepts the road situation, processes it according to the set of driving patterns and habits, arrives to some operative decisions and implements them with a help of some typical human machine interface (HMI) in the cabin (driving wheel, pedals etc.). Each step of this cycle has its own associated threats: Perception can be influenced by some distractions or bad visibility, situation processing may be inadequate due to poor training and low driving experience, finally, operative control implementation may fail because of vehicle’s technical conditions and limitations. Not all of these threats are easily avoidable or even observable, but, some are. The ‘upper level’ cycle involves DAS, which monitors road situation, operative control decisions taken by the driver, and the driver’s state to alert the driver in case of dangerous behavior. In particular, by monitoring the driver’s state, DAS checks whether the driver is alert and may percept the road situation. By monitoring the road situation and the operative decisions of the driver, it may to some extent assess the driving habits and issue recommendations for improving them. However, the presence of the DAS brings four new information arrows and one entity and each of them have some threats associated. For example, failure of driver state monitoring information flow or algorithm may result in inadequate recommendations distracting and/or annoying the driver. Errors in road situation monitoring may again lead to inadequate or even dangerous recommendations. Besides, some DAS also can be configured (a driver can set alert thresholds, fine-tune the system’s behavior) or even enabled/disabled by the driver (the Settings arrow in Figure 2 captures all these possibilities). It can also pose some threats to the driver and/or other traffic participants.

3.2. Vulnerability Classification in Driver–Environment–DAS

Based on the interacting entities of the Driver-Environment-DAS system and information flows between them we identified potential threats to safety, following the idea that each threat can be associated with an entity, or with an information flow (Table 1). We have generalized the main threats in the vehicle cabin based on the literature review and analysis of existing DAS models. For each entity or information flow identified in Section 3.1, the table contains a brief description of the entity/flow, and possible threats. Threats are identified based on an observation that a threat can be caused, either by the state of some entity, or by corruption of an information flow. However, flows and entities cannot be analyzed totally independently, as flow contents is determined by its source entity. That is, establishing why, in some cases, entity-associated threats have flow-associated counterparts. For example, abnormal driver state is an entity-associated threat, but it results in inadequate driving decisions that are the contents of the operative control information flow, which is also a flow-associated threat.
Table 1. Vulnerability classification for driver monitoring systems.

3.3. Threats Classification

This section aims at threat classification with the purpose of defining which classes of threats can be detected via usage of smartphone. On this basis, the classification from [17] was used. In order to define sources and aims of threats, the vulnerabilities, attacks and threats that can take place in the Driver-Environment-DAS system were considered. On the other hand, the classification of threats based on their nature (namely, cyber, cyber-physical, physical, psycho-physiological, and cyber-psycho-physiological) was carried out (Table 2).
Table 2. Vulnerabilities, attacks, and associated threats detectable by smartphone sensors.
The threat sources column includes information on the evaluated possibility of threat detection via smartphone sensors. Unlike the attacker, the attack target (e.g., confidentiality, integrity, availability) does not affect the possibility of threat detection by smartphone sensors, it is not considered in this section.
We could not find any works that would address cyber and cyber-physical threats via smartphones. Hence, we claim that these threats cannot be detected via smartphone.
Physical threats from passengers or from outside of the vehicle can be partly detected via the smartphone. For example, the acceleration sensors can measure sharp acceleration or stopping related to, for example, an accident, however, this can be only be done after the incident (e.g., [46]). On the other hand, it is possible to identify, for example, presence of the dirt on the windshield via the smartphone camera. We could not find any research works in this area, however, we do not exclude this possibility.
Detection of misuse by the driver of some vehicle HMIs by smartphone is possible and have been researched in multiple efforts. For example, detection of the proper usage of seatbelts [40], keeping the driver’s hands on the steering wheel [47] and others.
Unpredictable behavior of DAS can also be a threat (for example, emergency braking in front of non-existing obstacle may cause a collision if the driver of the vehicle behind does not expect such braking). Obviously, a smartphone cannot detect such threats, however, certain rules can be developed (e.g., sharp acceleration by driver following sharp braking by DAS) that would help to generate reports for DAS developers to improve their systems in the future.
Detection of psycho-physiological threats with the help of smartphone is currently devoted more attention than to other classes of threats. For example, smartphones can be successfully used for identification of extra noise (e.g., [48]) that can be distracting for the driver (e.g., talking to passengers). In the similar way, the behavior of DAS can be evaluated for future reports. For example, when the system provides warnings too often (in this case the driver can become nervous, will not pay attention to signals from DAS, and can overlook a dangerous situation [49,50]) or if the system works fine and the driver relies on it too much, and then the system fails (e.g., [51]). Such reports can be generated by a smartphone via an analysis of the frequency of DAS signals together with the driver’s behavior.
The abnormal driver state and behavior can also be partially detected via smartphone sensors. (drowsiness, distraction, etc.) via AI-based analysis of images taken by the smartphone camera [32]. The following section describes this in detail.
As an analogy to distinguishing between physical and cyber-physical attacks, we distinguish between psycho-physiological and cyber-psycho-physiological influence. Whereas in the former the driver’s stress level is influenced in a physical way: Through physical interaction (e.g., pushing the driver), visual (e.g., visual image that makes the driver angry) or audio (e.g., talking to the driver to make him/her angry); the latter changes the driver’s stress level through internet, cellular network or radio (e.g., delivering information that make the driver angry). The simplest example is irritating spam phone calls or messages. We have not been able to find studies related to driver safety and currently cannot suggest any mechanisms to detect such threats using mobile phone sensors. Only the consequence related to changing driver’s mood could potentially be detected, but not the threat itself.

4. Case Study

In the previous section we have defined threats and classified them. The role of the case study is to demonstrate implementability of the identified threats detection via smartphone sensors within feasible time frames.
Based on our previous research work [32], we identified the main use cases for threats identification using smartphone sensors:
  • drowsiness (pre-sleeping condition, the driver concentration to the road is decreasing);
  • distraction (the driver does not concentrate to the road: the head is turned left/right/top/down);
  • unfastened belt (the belt is not fastened what causes a threat to the driver’s life);
  • eating (distraction from the road caused by eating something);
  • drinking (distraction from the road caused by drinking something);
  • smartphone use (distraction from the road caused by talking or messaging via smartphone).
We developed a software framework to support these use cases. The driver can record a video in vehicle cabin and then check it using the framework. The framework utilizes the Faceboxes neural network model [52] to detect the driver’s face and the Dlib framework to detect facial landmarks. Based on these landmarks, the drowsiness and distraction use cases are detected (Figure 3). For the unfastened belt, eating, drinking, smoking, and smartphone use cases (Figure 4) we developed a neural network model based on the YOLOv3 framework and a dataset that currently includes more than 3000 images of drivers in vehicle cabin. We use Java programming language to develop the cross platform prototype for the smartphone-based video analysis.
Figure 3. Drowsiness and distraction use cases.
Figure 4. Unfastened belt and smartphone usage use-cases.
We conducted experiments (see Table 3) and estimated accuracy of the developed framework (described in details in [32,40]) based on in-vehicle experiments. The experiments were conducted for one driver during several hours of driving. The driver performed a sequence of actions, defined by an operator. After that, the results of video recognition obtained using the proposed framework were compared with the operator data.
Table 3. Developed framework evaluation.

5. Discussion

In this section, we summarize the answers to the research questions specified in the introduction and analyzed in the paper. We recite the research questions one by one and provide answers based on the carried out analysis.
RQ1: What information flow is supported in Driver-Environment-DAS infrastructure?
We have identified major entities related to the process of driving a vehicle and major information flows between these entities. The entities we consider are: driver, environment (including the vehicle being controlled by the driver, road situation), and DAS. There are following flows between these entities: perception, operative control, monitoring (of the environment, of the driver), and possibly configuration (of the DAS by the driver). Based on the fact, that any threat can be associated with either an entity or an information flow, this analysis allows to systematically enumerate threats relevant to the process of driving a vehicle and further identify the threats that can be detected and assuaged by a smartphone.
In particular, the analysis of information flows (and the respective diagram, shown in Figure 2 helps to identify some threats introduced by DAS. On the one hand, DAS helps to avoid possible accidents by monitoring the driver and the environment, on the other hand it introduces a number of entities and flows, each of which has its own threats associated (e.g., inadequate DAS models, alerts in an inappropriate moments etc.). It also should be noted, that the approach to detect threats via information flow analysis can be extended to account for new entities, either on the same level of abstraction (e.g., car infotainment system), or on more fine-grained levels (e.g., decomposing DAS into typical subsystems and taking into consideration information flows between them).
RQ2: Which classes of threats in Driver-Environment-DAS systems are related to safety in vehicle cabin?
Based on the identified entities and information flows, as well as on the literature analysis, we have identified a number of safety-related vulnerabilities. Each of these vulnerabilities is connected either to vulnerabilities of an entity (its state), or to the information flow (its corruption). We distinguish the following threat classes based on vulnerable entities and flows.
  • Driver assistance systems;
  • Driver;
  • Monitoring;
  • Recommendations/Alerts;
  • Operative Control;
  • Perception.
We also found it useful to classify the identified vulnerabilities and associated threats to five classes, depending on the kind of the threat target, as well as on what channels and mechanisms are used to fulfil the attack: cyber, cyber-physical, physical, psycho-physiological, and cyber-psycho-physiological. Below, we identify detectable by smartphone threats based on this classification.
RQ3: Which threats can be detected by smartphone sensors?
It was found that smartphones cannot be used to identify any threats related to cyber communication channels. Therefore, we have not found any evidence that cyber or cyber-physical threats (not only related to safety, but also to privacy) can be detected by smartphone sensors. The same is the truth for cyber-psycho-physiological threats that we have proposed as a new class of threats.
However, the availability of various sensors is a significant advantage of using smartphones for detecting threats related to physical world. For example, physical threats from outside of the vehicle can potentially be partly detected (for example, the presence of dirt on the windshield via the smartphone camera). However, we could not find any research works in this area. Detection of misuse by the driver of some vehicle HMIs by smartphone is possible and have been researched in multiple efforts (proper usage of seatbelts, keeping the driver’s hands on the steering wheel, etc.). The unpredictable behavior of DAS cannot be timely detected by smartphone, but a system can be developed that would produce reports with potential errors made by DAS.
Detection of psycho-physiological threats by smartphone at the moment is one of the most popular research topics. Various threats can be detected from abnormal driver state to annoying DAS signals or extra noise.
We have also identified a new class of threats, namely cyber-psycho-physiological threats related to influencing the driver’s stress level via telecommunication channels (internet, cellular network, or radio). Their examples include irritating spam phone calls, messages or radio translations. No studies related to the effect of this threat to the driving safety have been found so we conclude that at the moment they cannot be detected by smartphone. However, it can be noted that consequences related to changing driver’s mood could potentially be detected by smartphones.
Of course, we understand that usage of smartphones is not an optimal solution for threats identification. However, the identified approaches can be adopted in the in-vehicle embedded systems for increasing the car safety level.

6. Summary and Future Work

The paper presents research results in the area of potential threats detection based on smartphone sensors in the vehicle cabin. We discuss the modern intelligent transportation systems and conclude that together with benefits such systems bring potential vulnerabilities. We have identified possible threats in the vehicle cabin. We presented the influence diagram, showing the entities and the information flows, and mapped the identified threats to the elements of this influence diagram. Then, we presented vulnerability classification in vehicle cabin. After that, we proposed threats classification and highlighted which of them can be detected by smartphone sensors. We classified threats as cyber-physical, physical, psycho-physiological, and cyber-psycho-physiological. As the result, we have introduced a new class of cyber-psycho-physiological threats that have not been presented in the literature before. Threat classes were illustrated with examples.
In the future, we plan to conduct research on algorithms that would evaluate correlation between driver and DAS actions. This, for example, would make it possible to evaluate the driver reaction time [42], which could indirectly indicate the driver’s state, false DAS alarms (when no actions is undertaken after the alarm and no consequences occur), false DAS evasive actions (e.g., braking or steering by DAS immediately compensated by the driver’s actions without consequences), and others. Another direction of the future research is to study the benefits of smartphone connection to CAN bus via On-board diagnostics (ODB) Bluetooth dongles. Such connection provides additional possibilities to analyze additional parameters for vulnerability detection in vehicle cabin.

Author Contributions

A.K. paper methodology and case study. A.P. Driver-Environment-DAS information flows and vulnerability classification. N.S. threat classification. A.C. supervision, administration, and funding acquisition. All authors have read and agreed to the published version of the manuscript.

Funding

The research has been supported by the Russian Foundation for Basic Research, project number # 19-29-06099. Developed case study has been partly supported by Russian State Research # 0073-2019-0005.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Viktorová, L.; Šucha, M. Learning about advanced driver assistance systems–The case of ACC and FCW in a sample of Czech drivers. Transp. Res. Part F Traffic Psychol. Behav. 2019, 65, 576–583. [Google Scholar] [CrossRef]
  2. Zhang, H.; Lu, X. Vehicle communication network in intelligent transportation system based on internet of things. Comput. Commun. 2020. [Google Scholar] [CrossRef]
  3. Choi, M.; Seo, M.; Lee, J.S.; Kim, S.W. Fuzzy support vector machine-based personalizing method to address the inter-subject variance problem of physiological signals in a driver monitoring system. Artif. Intell. Med. 2020, 105, 101843. [Google Scholar] [CrossRef] [PubMed]
  4. Pfleeger, C.P.; Pfleeger, S.L.; Margulies, J. Security in Computing, 5th ed.; Pearson: London, UK, 2015. [Google Scholar]
  5. Kashevnik, A.; Ponomarev, A.; Krasov, A. Human-Computer Threats Classification in Intelligent Transportation Systems. In Proceedings of the Conference of Open Innovation Association, FRUCT 2020, Yaroslavl, Russia, 20–24 April 2020; pp. 151–157. [Google Scholar] [CrossRef]
  6. Kelarestaghi, K.B.; Foruhandeh, M.; Heaslip, K.; Gerdes, R. Intelligent Transportation System Security: Impact-Oriented Risk Assessment of In-Vehicle Networks. IEEE Intell. Transp. Syst. Mag. 2019. [Google Scholar] [CrossRef]
  7. Ming, L.; Zhao, G.; Huang, M.; Kuang, X.; Li, H.; Zhang, M. Security analysis of intelligent transportation systems based on simulation data. In Proceedings of the 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018, South Padre Island, TX, USA, 8–10 April 2018; pp. 184–187. [Google Scholar] [CrossRef]
  8. Huq, N.; Vosseler, R.; Swimmer, M. Cyberattacks Against Intelligent Transportation Systems Assessing Future Threats to ITS; Trend Micro: Tokyo, Japan, 2017. [Google Scholar]
  9. Maple, C.; Bradbury, M.; Le, A.T.; Ghirardello, K. A connected and autonomous vehicle reference architecture for attack surface analysis. Appl. Sci. (Switz.) 2019, 9, 5101. [Google Scholar] [CrossRef]
  10. Macher, G.; Messnarz, R.; Armengaud, E.; Riel, A.; Brenner, E.; Kreiner, C. Integrated Safety and Security Development in the Automotive Domain. SAE Technical Paper. In Proceedings of the WCX™ 17: SAE World Congress Experience, Detroit, MI, USA, 4–6 April 2017. [Google Scholar] [CrossRef]
  11. Dürrwang, J.; Braun, J.; Rumez, M.; Kriesten, R.; Pretschner, A. Enhancement of Automotive Penetration Testing with Threat Analyses Results. SAE Int. J. Transp. Cybersecur. Priv. 2018, 1, 91–112. [Google Scholar] [CrossRef]
  12. Bialas, A. Vulnerability Assessment of Sensor Systems. Sensors 2019, 19, 2518. [Google Scholar] [CrossRef]
  13. Parkinson, S.; Ward, P.; Wilson, K.; Miller, J. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2898–2915. [Google Scholar] [CrossRef]
  14. Sari, A.; Onursal, O.; Akkaya, M. Review of the Security Issues in Vehicular Ad Hoc Networks (VANET). Int. J. Commun. Netw. Syst. Sci. 2015, 8, 552–566. [Google Scholar] [CrossRef]
  15. Hamida, E.; Noura, H.; Znaidi, W. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures. Electronics 2015, 4, 380–423. [Google Scholar] [CrossRef]
  16. Loukas, G.; Karapistoli, E.; Panaousis, E.; Sarigiannidis, P.; Bezemskij, A.; Vuong, T. A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Netw. 2019, 84, 124–147. [Google Scholar] [CrossRef]
  17. Humayed, A.; Luo, B. Cyber-physical security for smart cars. In Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems—ICCPS ‘15; ACM Press: New York, NY, USA, 2015; pp. 252–253. [Google Scholar] [CrossRef]
  18. Resch, B. People as Sensors and Collective Sensing-Contextual Observations Complementing Geo-Sensor Network Measurements. In Progress in Location-Based Services. Lecture Notes in Geoinformation and Cartography; Springer: Berlin/Heidelberg, Germany, 2013; pp. 391–406. [Google Scholar] [CrossRef]
  19. Rozhdestvenskiy, D.; Bouchner, P. Human machine interface for future cars. Changes needed. In Proceedings of the 2017 Smart City Symposium Prague (SCSP), Prague, Czech Republic, 25–26 May 2017. [Google Scholar] [CrossRef]
  20. AAA Foundation for Traffic Safety. 2017 Traffic Safety Culture Index; AAA Foundation for Traffic Safety: Washington, DC, USA, 2018. [Google Scholar]
  21. Lohani, M.; Payne, B.R.; Strayer, D.L. A Review of Psychophysiological Measures to Assess Cognitive States in Real-World Driving. Front. Hum. Neurosci. 2019, 13. [Google Scholar] [CrossRef] [PubMed]
  22. Chung, W.-Y.; Chong, T.-W.; Lee, B.-G. Methods to Detect and Reduce Driver Stress: A Review. Int. J. Automot. Technol. 2019, 20, 1051–1063. [Google Scholar] [CrossRef]
  23. Golestan, K.; Soua, R.; Karray, F.; Kamel, M.S. Situation awareness within the context of connected cars: A comprehensive review and recent trends. Inf. Fusion 2016, 29, 68–83. [Google Scholar] [CrossRef]
  24. Kashevnik, A.; Lashkov, I.; Teslya, N. Driver intelligent support system in internet of transportation things: Smartphone-based approach. In Proceedings of the 2019 14th Annual Conference System of Systems Engineering, SoSE 2019, Anchorage, AK, USA, 19–22 May 2019; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2019; pp. 170–175. [Google Scholar] [CrossRef]
  25. Milleville-Pennel, I.; Marquez, S. Comparison between elderly and young drivers’ performances on a driving simulator and self-assessment of their driving attitudes and mastery. Accid. Anal. Prev. 2020, 135, 105317. [Google Scholar] [CrossRef]
  26. Eboli, L.; Mazzulla, G.; Pungillo, G. How to define the accident risk level of car drivers by combining objective and subjective measures of driving style. Transp. Res. Part. F Traffic Psychol. Behav. 2017, 49, 29–38. [Google Scholar] [CrossRef]
  27. Fuller, R. A conceptualization of driving behaviour as threat avoidance. Ergonomics 1984, 27, 1139–1155. [Google Scholar] [CrossRef] [PubMed]
  28. Sagl, G.; Resch, B.; Blaschke, T. Contextual Sensing: Integrating Contextual Information with Human and Technical Geo-Sensor Information for Smart Cities. Sensors 2015, 15, 17013–17035. [Google Scholar] [CrossRef]
  29. Ferreira, J.; Carvalho, E.; Ferreira, B.V.; De Souza, C.; Suhara, Y.; Pentland, A.; Pessin, G. Driver behavior profiling: An investigation with different smartphone sensors and machine learning. PLoS ONE 2017, 12, e0174959. [Google Scholar] [CrossRef]
  30. Yang, L.; Dong, K.; Dmitruk, A.J.; Brighton, J.; Zhao, Y. A Dual-Cameras-Based Driver Gaze Mapping System With an Application on Non-Driving Activities Monitoring. IEEE Trans. Intell. Transp. Syst. 2019. [Google Scholar] [CrossRef]
  31. Jacobé de Naurois, C.; Bourdin, C.; Stratulat, A.; Diaz, E.; Vercher, J.L. Detection and prediction of driver drowsiness using artificial neural network models. Accid. Anal. Prev. 2019, 126, 95–104. [Google Scholar] [CrossRef] [PubMed]
  32. Kashevnik, A.; Lashkov, I.; Gurtov, A. Methodology and Mobile Application for Driver Behavior Analysis and Accident Prevention. IEEE Trans. Intell. Transp. Syst. 2019. [Google Scholar] [CrossRef]
  33. Kashevnik, A.; Lashkov, I.; Ponomarev, A.; Teslya, N.; Gurtov, A. Cloud-Based Driver Monitoring System Using a Smartphone. IEEE Sens. J. 2020, 20, 6701–6715. [Google Scholar] [CrossRef]
  34. Jeyeon, K.; Kenta, S.; Naohisa, H.; Kashevnik, A.; Kohji, T.; Seiichi, M.; Yusuke, T.; Osamu, M.; Ali, B. Context-based rider assistant system for two wheeled self-balancing vehicles. SPIIRAS Proc. 2019, 18, 583–614. [Google Scholar] [CrossRef]
  35. Redweik, P.; Catita, C.; Henriques, F.; Rodrigues, A. Solar Glare Vulnerability Analysis of Urban Road Networks—A Methodology. Energies 2019, 12, 4779. [Google Scholar] [CrossRef]
  36. Nassi, D.; Ben-Netanel, R.; Elovici, Y.; Nassi, B. MobilBye: Attacking ADAS with Camera Spoofing. arXiv 2019, arXiv:1906.09765. [Google Scholar]
  37. Nassi, B.; Nassi, D.; Ben-Netanel, R.; Mirsky, Y.; Drokin, O.; Elovici, Y. Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems. 2020. Available online: https://eprint.iacr.org/2020/085 (accessed on 3 September 2020).
  38. Barnard, Y.; Risser, R.; Krems, J. The Safety of Intelligent Driver Support. In Systems: Design, Evaluation and Social Perspectives, 1st ed.; CRC Press: Boca Raton, FL, USA, 2011. [Google Scholar]
  39. Narayanan, S.N.; Khanna, K.; Panigrahi, B.K.; Joshi, A. Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars. In Smart Cities Cybersecurity and Privacy; Elsevier: Amsterdam, The Netherlands, 2019; pp. 147–163. [Google Scholar] [CrossRef]
  40. Kashevnik, A.; Ali, A.; Lashkov, I.; Shilov, N. Seat Belt Fastness Detection Based on Image Analysis from Vehicle In-abin Camera. In Proceedings of the 2020 26th Conference of Open Innovations Association (FRUCT), Yaroslavl, Russia, 20–24 April 2020; pp. 143–150. [Google Scholar] [CrossRef]
  41. Hatoyama, K.; Nishioka, M.; Kitajima, M.; Nakahira, K.; Sano, K. Perception of Time in Traffic Congestion and Drivers’ Stress. In Proceedings of the International Conference on Transportation and Development 2019, Alexandria, VA, USA, 9–12 June 2019; American Society of Civil Engineers: Reston, VA, USA, 2019; pp. 165–174. [Google Scholar] [CrossRef]
  42. Zhang, Y.; Antonsson, E.K.; Grote, K. A new threat assessment measure for collision avoidance systems. In Proceedings of the 2006 IEEE Intelligent Transportation Systems Conference, Toronto, ON, Canada, 17–20 September 2006; pp. 968–975. [Google Scholar] [CrossRef]
  43. Eidehall, A.; Petersson, L. Statistical Threat Assessment for General Road Scenes Using Monte Carlo Sampling. IEEE Trans. Intell. Transp. Syst. 2008, 9, 137–147. [Google Scholar] [CrossRef]
  44. Yamada, K.; Kuchar, J.K. Preliminary study of behavioral and safety effects of driver dependence on a warning system in a driving simulator. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 2006, 36, 602–610. [Google Scholar] [CrossRef]
  45. Doudou, M.; Bouabdallah, A.; Berge-Cherfaoui, V. Driver Drowsiness Measurement Technologies: Current Research, Market Solutions, and Challenges. Int. J. Intell. Transp. Syst. Res. 2020, 18, 297–319. [Google Scholar] [CrossRef]
  46. White, J.; Thompson, C.; Turner, H.; Dougherty, B.; Schmidt, D.C. WreckWatch: Automatic Traffic Accident Detection and Notification with Smartphones. Mob. Netw. Appl. 2011, 16, 285–303. [Google Scholar] [CrossRef]
  47. Le, T.H.N.; Zheng, Y.; Zhu, C.; Luu, K.; Savvides, M. Multiple Scale Faster-RCNN Approach to Driver’s Cell-Phone Usage and Hands on Steering Wheel Detection. In Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Las Vegas, NV, USA, 26 June–1 July 2016; pp. 46–53. [Google Scholar] [CrossRef]
  48. Murphy, E.; King, E.A. Smartphone-based noise mapping: Integrating sound level meter app data into the strategic noise mapping process. Sci. Total Environ. 2016, 562, 852–859. [Google Scholar] [CrossRef] [PubMed]
  49. Bishop, R. Intelligent Vehicle Technology and Trends; Artech House: Norwood, MA, USA, 2005. [Google Scholar]
  50. Stanton, N.A.; Young, M.S. Driver behaviour with adaptive cruise control. Ergonomics 2005, 48, 1294–1313. [Google Scholar] [CrossRef] [PubMed]
  51. BBC. Tesla Model 3: Autopilot Engaged during Fatal Crash; BBC: London, UK, 2019. [Google Scholar]
  52. Zhang, S.; Zhu, X.; Lei, Z.; Shi, H.; Wang, X.; Li, S.Z. FaceBoxes: A CPU Real-time Face Detector with High Accuracy. In Proceedings of the IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1–4 October 2017; pp. 1–9. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.