Authenticating Drivers Using Automotive Batteries

Automakers have been improving, or even trying to replace, key-based driver authentication solutions, owing to their vulnerability to cyber attacks and single-point-of-failures, as well as their inability of driver identification. In line with this effort, we design a novel driver authentication system using automotive batteries, called Batteries-as-Authenticators (BAuth), to mitigate the limitations of key-based solutions by providing a second-factor authentication. BAuth is an add-on module installed between vehicles and their batteries, which uses the batteries as sensors to validate drivers' identities and actuators to enable/disable the cranking of vehicle's engine. We have prototyped and evaluated BAuth on 6 regular/hybrid/electric vehicles. Our evaluation shows BAuth to authenticate the drivers with a 98.17 (2.84)% averaged true (false) positive rates and tolerate the dynamics caused by the aging/temperature/state-of-charge of batteries. Our user study corroborates BAuth's attractiveness to car owners.

[1]  Pengcheng Shi,et al.  Peg-Free Hand Geometry Recognition Using Hierarchical Geomrtry and Shape Matching , 2002, MVA.

[2]  Syed Masud Mahmud,et al.  Some attacks against vehicles' passive entry security systems and their solutions , 2003, IEEE Trans. Veh. Technol..

[3]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[4]  Peter G. Neumann,et al.  Security by obscurity , 2003, CACM.

[5]  Amit K. Awasthi,et al.  A remote user authentication scheme using smart cards with forward secrecy , 2003, IEEE Trans. Consumer Electron..

[6]  Robert P. W. Duin,et al.  Prototype selection for dissimilarity-based classifiers , 2006, Pattern Recognit..

[7]  Matti Pietikäinen,et al.  Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[8]  Gang Zheng,et al.  Application of Projective Invariants in Hand Geometry Biometrics , 2007, IEEE Transactions on Information Forensics and Security.

[9]  Ioannis A. Kakadiaris,et al.  Three-Dimensional Face Recognition in the Presence of Facial Expressions: An Annotated Deformable Model Approach , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  K. Fujita,et al.  A study of password authentication method against observing attacks , 2008, 2008 6th International Symposium on Intelligent Systems and Informatics.

[11]  Hanmin Liu,et al.  Improvement on the Cold Cranking Capacity of Commercial Vehicle by Using Supercapacitor and Lead-Acid Battery Hybrid , 2009, IEEE Transactions on Vehicular Technology.

[12]  Christof Paar,et al.  Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed , 2009, AFRICACRYPT.

[13]  Pierre Gançarski,et al.  A global averaging method for dynamic time warping, with applications to clustering , 2011, Pattern Recognit..

[14]  Srdjan Capkun,et al.  Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.

[15]  Yvo Desmedt,et al.  Relay Attack , 2005, Encyclopedia of Cryptography and Security.

[16]  Jianbin Hu,et al.  Resisting relay attacks on vehicular Passive Keyless Entry and start systems , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[17]  Kazuomi Oishi,et al.  A Method of Preventing Unauthorized Data Transmission in Controller Area Network , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).

[18]  Alexandra Dmitrienko,et al.  Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer , 2013, CODASPY.

[19]  Tomi Kinnunen,et al.  I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry , 2013, INTERSPEECH.

[20]  Naphtali Rishe,et al.  Thermal Imaging as a Biometrics Approach to Facial Signature Authentication , 2013, IEEE Journal of Biomedical and Health Informatics.

[21]  Zhen Ling,et al.  Blind Recognition of Touched Keys on Mobile Devices , 2014, CCS.

[22]  Geoffrey I. Webb,et al.  Dynamic Time Warping Averaging of Time Series Allows Faster and More Accurate Classification , 2014, 2014 IEEE International Conference on Data Mining.

[23]  Jos Wetzels Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys , 2014, ArXiv.

[24]  Zhilin Zhang,et al.  Photoplethysmography-Based Heart Rate Monitoring in Physical Activities via Joint Sparse Spectrum Reconstruction , 2015, IEEE Transactions on Biomedical Engineering.

[25]  Jonghyun Choi,et al.  Thermal-to-visible face recognition using partial least squares. , 2015, Journal of the Optical Society of America. A, Optics, image science, and vision.

[26]  Measuring Strength of Authentication ( Discussion Draft ) Measuring Strength of Authentication , 2015 .

[27]  Tomi Kinnunen,et al.  Automatic versus human speaker verification: The case of voice mimicry , 2015, Speech Commun..

[28]  Muhammad Ali Akbar,et al.  Secure biometric template generation for multi-factor authentication , 2015, Pattern Recognit..

[29]  Robert Sykora The Future of Autonomous Vehicle Technology as a Public Safety Tool , 2015 .

[30]  Alexander De Luca,et al.  Is secure and usable smartphone authentication asking too much? , 2015, Computer.

[31]  Camille Vuillaume,et al.  Approaches for Secure and Efficient In-Vehicle Key Management , 2016 .

[32]  Kang G. Shin,et al.  Error Handling of In-vehicle Networks Makes Them Vulnerable , 2016, CCS.

[33]  Xiaoqiang Zhang,et al.  A review of li-ion battery equivalent circuit models , 2016 .

[34]  Tadayoshi Kohno,et al.  Automobile Driver Fingerprinting , 2016, Proc. Priv. Enhancing Technol..

[35]  Bruno Bouchard,et al.  A Text-Independent Speaker Authentication System for Mobile Devices , 2017, Cryptogr..

[36]  Ming Yang,et al.  SecTap: Secure Back of Device Input System for Mobile Devices , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[37]  Kyong Tak Cho,et al.  From Attack to Defense: Toward Secure In-vehicle Networks , 2018 .

[38]  Aleksandr Ometov,et al.  Multi-Factor Authentication: A Survey , 2018, Cryptogr..