skip to main content
research-article

Driver Identification Using Optimized Deep Learning Model in Smart Transportation

Authors Info & Claims
Published:14 November 2022Publication History
Skip Abstract Section

Abstract

The Intelligent Transportation System (ITS) is said to revolutionize the travel experience by making it safe, secure, and comfortable for the people. Although vehicles have been automated up to a certain extent, it still has critical security issues that require thorough study and advanced solutions. The security vulnerabilities of ITS allows the attacker to steal the vehicle. Therefore, the identification of drivers is required in order to develop a safe and secure system so that the vehicles can be protected from theft. There are two ways in which a driver can be identified: 1) face recognition of the driver, and 2) based on driving behavior. Face recognition includes image processing of 2-D images and learning of the features, which require high computational power. Drivers are known to have unique driving styles, whose data can be captured by the sensors. Therefore, the second method identifies drivers based on the analysis of the sensor data and it requires comparatively lesser computational power. In this paper, an optimized deep learning model is trained on the sensor data to correctly identify the drivers. The Long Short-Term Memory (LSTM) deep learning model is optimized for better performance. The novelty of the approach in this work is the inclusion of hyperparameter tuning using a nature-inspired optimization algorithm, which is an important and essential step in discovering the optimal hyperparameters for training the model which in turn increases the accuracy. The CAN-BUS dataset is used for experimentation and evaluation of the training model. Evaluation parameters such as accuracy, precision score, F1 score, and ROC AUC curve are considered to evaluate the performance of the model.

REFERENCES

  1. [1] Ren Kui, Wang Qian, Wang Cong, Qin Zhan, and Lin Xiaodong. 2019. The security of autonomous driving: Threats, defenses, and future directions. Proceedings of the IEEE (2019). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Mekki Abdellah El, Bouhoute Afaf, and Berrada Ismail. 2019. Improving driver identification for the next-generation of in-vehicle software systems. IEEE Transactions on Vehicular Technology 68, 8 (2019): 74067415. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Lin Na, Zong Changfu, Tomizuka Masayoshi, Song Pan, Zhang Zexing, and Li Gang. 2014. An overview on study of identification of driver behavior characteristics for automotive control. Mathematical Problems in Engineering (2014). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Hatcher William Grant and Yu Wei. 2018. A survey of deep learning: Platforms, applications and emerging research trends. IEEE Access 6 (2018): 2441124432. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Hochreiter Sepp and Schmidhuber Jürgen. 1997. Long short-term memory. Neural Comput. 9, 8 (November 1997), 17351780. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Mahmood Zahid, Haneef Ossama, Muhammad Nazeer, and Khattak Shahid. 2018. Towards a fully automated car parking system. IET Intelligent Transport Systems 13, 2 (2018), 293302. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Das Prabal Deep and Sengupta Sharmila. 2017. Implementing a next generation system to provide protection to vehicles from thefts and accidents. In 2017 International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT). IEEE, 2017. 16. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Kwak Byung Il, Woo JiYoung, and Kim Huy Kang. 2016. Know your master: Driver profiling-based anti-theft method. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016, 211218. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Zhang Jun, Wu ZhongCheng, Li Fang, Xie Chengjun, Ren Tingting, Chen Jie, and Liu Liu. 2019. A deep learning framework for driving behavior identification on in-vehicle CAN-BUS sensor data. Sensors 19, 6 (2019), 1356. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Saleh Khaled, Hossny Mohammed, and Nahavandi Saeid. 2017. Driving behavior classification based on sensor data fusion using LSTM recurrent neural networks. In 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC). IEEE, 2017. 16. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Wang Qi, Wan Jia, and Li Xuelong. 2018. Robust hierarchical deep learning for vehicular management. IEEE Transactions on Vehicular Technology 68, 5 (2018). 41484156. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Huang Wenhao, Song Guojie, Hong Haikun, and Xie Kunqing. 2014. Deep architecture for traffic flow prediction: Deep belief networks with multitask learning. IEEE Transactions on Intelligent Transportation Systems 15, 5 (2014): 21912201. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Veres Matthew and Moussa Medhat. 2019. Deep learning for intelligent transportation systems: A survey of emerging trends. IEEE Transactions on Intelligent Transportation Systems (2019). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Talathi Sachin S.. 2015. Hyper-parameter optimization of deep convolutional networks for object recognition. In 2015 IEEE International Conference on Image Processing (ICIP). IEEE, 2015. 39823986. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Nakisa Bahareh, Rastgoo Mohammad Naim, Rakotonirainy Andry, Maire Frederic, and Chandran Vinod. 2018. Long short term memory hyperparameter optimization for a neural network based emotion recognition framework. IEEE Access 6 (2018), 4932549338. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Chung Hyejung and Shin Kyung-shik. 2018. Genetic algorithm-optimized long short-term memory network for stock market prediction. Sustainability 10, 10 (2018): 3765. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] ElSaid AbdElRahman, Jamiy Fatima El, Higgins James, Wild Brandon, and Desell Travis. 2018. Using ant colony optimization to optimize long short-term memory recurrent neural networks. In Proceedings of the Genetic and Evolutionary Computation Conference. 2018, 1320. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Chiroma Haruna, Gital Abdulsalam Ya'U., Rana Nadim, Abdulhamid Shafi'i M., Muhammad Amina N., Umar Aishatu Yahaya, and Abubakar Adamu I.. 2019. Nature inspired meta-heuristic algorithms for deep learning: Recent progress and novel perspective. In Science and Information Conference. Springer, Cham, 2019, 5970. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Askarzadeh Alireza. 2016. A novel metaheuristic method for solving constrained engineering optimization problems: Crow Search Algorithm. Computers & Structures 169 (2016), 112. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Martinelli Fabio, Mercaldo Francesco, Orlando Albina, Nardone Vittoria, Santone Antonella, and Sangaiah Arun Kumar. 2018. Human behavior characterization for driving style recognition in vehicle system. Computers & Electrical Engineering (2018). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Rana Rakesh and Singhal Richa. 2015. Chi-square test and its application in hypothesis testing. Journal of the Practice of Cardiovascular Sciences 1, 1 (2015), 69. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Visalakshi S. and Radha V.. 2014. A literature review of feature selection techniques and applications: Review of feature selection in data mining. In 2014 IEEE International Conference on Computational Intelligence and Computing Research. IEEE, 2014. 16. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Zhang Dejun, Zou Lu, Zhou Xionghui, and He Fazhi. 2018. Integrating feature selection and feature extraction methods with deep learning to predict clinical outcome of breast cancer. IEEE Access 6 (2018), 2893628944. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Luong Nguyen Cong, Hoang Dinh Thai, Gong Shimin, Niyato Dusit, Wang Ping, Liang Ying-Chang, and Kim Dong In. 2019. Applications of deep reinforcement learning in communications and networking: A survey. IEEE Communications Surveys & Tutorials 21, 4 (2019), 31333174. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Chen Qi, Wang Wei, Wu Fangyu, De Suparna, Wang Ruili, Zhang Bailing, and Huang Xin. 2019. A survey on an emerging area: Deep learning for smart city data. IEEE Transactions on Emerging Topics in Computational Intelligence 3, 5 (2019), 392410. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Kim Jin-Young and Cho Sung-Bae. 2019. Evolutionary optimization of hyperparameters in deep learning models. In 2019 IEEE Congress on Evolutionary Computation (CEC). IEEE, 2019. 831837. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Chiroma Haruna, Gital Abdulsalam Ya'U., Rana Nadim, Abdulhamid Shafi'i M., Muhammad Amina N., Umar Aishatu Yahaya, and Abubakar Adamu I.. 2019. Nature inspired meta-heuristic algorithms for deep learning: Recent progress and novel perspective. In Science and Information Conference. Springer, Cham, 2019, 5970. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Nwankpa Chigozie, Ijomah Winifred, Gachagan Anthony, and Marshall Stephen. 2018. Activation functions: Comparison of trends in practice and research for deep learning. arXiv preprint arXiv:1811.03378 (2018). DOI:https://arxiv.org/abs/1811.03378v1Google ScholarGoogle Scholar
  29. [29] Goldberg Yoav. 2016. A primer on neural network models for natural language processing. Journal of Artificial Intelligence Research 57 (2016), 345420. DOI:https://arxiv.org/abs/1510.00726Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Choi Dami, Shallue Christopher J., Nado Zachary, Lee Jaehoon, Maddison Chris J., and Dahl George E.. 2019. On empirical comparisons of optimizers for deep learning. arXiv preprint arXiv:1910.05446 (2019).Google ScholarGoogle Scholar
  31. [31] Kingma Diederik P. and Ba Jimmy. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).Google ScholarGoogle Scholar
  32. [32] Hossin Mohammad and Sulaiman M. N.. 2015. A review on evaluation metrics for data classification evaluations. International Journal of Data Mining & Knowledge Management Process 5, 2 (2015), 1. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Gadekallu T. R., Khare N., BhattacharyaSingh S.S., Reddy Maddikunta P. K., Ra I. H., and Alazab M.. 2020. Early detection of diabetic retinopathy using PCA-Firefly based deep learning model. Electronics 9, 2 (2020), 274.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Bhattacharya S., Kaluri R., Singh S., Alazab M., and Tariq U.. 2020. A novel PCA-Firefly based XGBoost classification model for intrusion detection in networks using GPU. Electronics 9, 2 (2020), 219.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Reddy G. T., Reddy M. P. K., Lakshmanna K., Kaluri R., Rajput D. S., Srivastava G., and Baker T.. 2020. Analysis of dimensionality reduction techniques on big data. IEEE Access, 8, 5477654788.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Driver Identification Using Optimized Deep Learning Model in Smart Transportation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 22, Issue 4
      November 2022
      642 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3561988
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 November 2022
      • Online AM: 12 February 2022
      • Accepted: 23 July 2020
      • Revised: 8 June 2020
      • Received: 27 April 2020
      Published in toit Volume 22, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format