Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

DriverAuth: : A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms

Published: 01 June 2019 Publication History

Abstract

On-demand ride and ride-sharing services have revolutionized the point-to-point transportation market and they are rapidly gaining acceptance among customers worldwide. Alone, Uber and Lyft are providing over 11 million rides per day (DMR, 2018a,b). These services are provided using a client-server infrastructure. The client is a smartphone-based application used for: (i) registering riders and drivers, (ii) connecting drivers with riders, (iii) car-sharing to share the expenses, minimize traffic congestion and saving traveling time, (iv) allowing customers to book their rides. The server typically, run by multi-national companies such as Uber, Ola, Lyft, BlaBlaCar, manages drivers and customers registrations, allocates ride-assignments, sets tariffs, guarantees payments, ensures safety and security of riders, etc. However, the reliability of drivers have emerged as a critical problem, and as a consequence, issues related to riders safety and security have started surfacing. The lack of robust driver verification mechanisms has opened a room to an increasing number of misconducts (i.e., drivers subcontracting ride-assignments to an unauthorized person, registered drivers sharing their registration with other people whose eligibility to drive is not justified, etc.) (Horwitz, 2015; USAtoday, 2016).
This paper proposes DriverAuth – a novel risk-based multi-modal biometric-based authentication solution, to make the on-demand ride and ride-sharing services safer and more secure for riders. DriverAuth utilizes three biometric modalities, i.e., swipe, text-independent voice, and face, in a multi-modal fashion to verify the identity of registered drivers. We evaluated DriverAuth on a dataset of 10,320 samples collected from 86 users and achieved a True Acceptance Rate (TAR) of 96.48% at False Acceptance Rate (FAR) of 0.02% using Ensemble Bagged Tree (EBT) classifier. Furthermore, the architecture used to design DriverAuth enables easy integration with most of the existing on-demand ride and ride-sharing systems.

References

[1]
Z. Akhtar, A. Buriro, B. Crispo, T.H. Falk, Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns, Proceedings of IEEE global conference on signal and information processing (GlobalSIP), IEEE, 2017, pp. 1368–1372.
[2]
W.J.A. Al-Nidawi, M.A. Maan, M. Othman, Review on national electronic identification system, Proceedings of forth international conference on advanced computer science applications and technologies (ACSAT), 2015, IEEE, 2015, pp. 228–233.
[3]
H. Aronowitz, Li M., O. Toledo-Ronen, S. Harary, A. Geva, S. Ben-David, A. Rendel, R. Hoory, N. Ratha, S. Pankanti, et al., Multi-modal biometrics for mobile authentication, Proceedings of international joint conference on biometrics (IJCB), IEEE, 2014, pp. 1–8.
[4]
BBC. Uber driver background checks not good enough. http://www.bbc.com/news/technology-34002051; 2015. Online web resource.
[5]
Bell K. Uber makes it harder to give drivers bad ratings. https://mashable.com/2017/11/21/uber-makes-it-harder-to-give-bad-ratings/#DghVf5kP0qqR; 2017. Online web resource.
[6]
Bhuiyan J. Uber is facing a class action lawsuit from u.s. riders alleging assault. https://www.recode.net/2017/11/14/16647706/uber-class-action-lawsuit-riders-sexual-assault-rape-violence-background-checks; 2017. Online web resource.
[7]
B. Biggio, G. Fumera, G.L. Marcialis, F. Roli, Statistical meta-analysis of presentation attacks for secure multibiometric systems, IEEE Tran. Pattern Anal. Mach. Intel. 39 (3) (2017) 561–575.
[8]
Booth R. Uber whistleblower exposes breach in driver-approval process. https://www.theguardian.com/technology/2015/jun/12/uber-whistleblower-exposes-breach-driver-approval-process; 2015. Online web resource.
[9]
A. Buriro, Z. Akhtar, B. Crispo, S. Gupta, Mobile biometrics: towards a comprehensive evaluation methodology, Proceedings of international Carnahan conference on security technology (ICCST), IEEE, 2017, pp. 1–6.
[10]
A. Buriro, B. Crispo, F. Del Frari, J. Klardie, K. Wrona, Itsme: multi-modal and unobtrusive behavioural user authentication for smartphones, Proceedings of international conference on passwords, Springer, 2015, pp. 45–61.
[11]
A. Buriro, B. Crispo, S. Gupta, F. Del Frari, Dialerauth: A motion-assisted touch-based smartphone user authentication scheme, Proceedings of the eighth acm conference on data and application security and privacy, ACM, 2018, pp. 267–276.
[12]
A. Buriro, S. Gupta, B. Crispo, Evaluation of motion-based touch-typing biometrics in online financial environments, Proceedings of the BIOSIG, 2017, 2017.
[13]
DMR. 36 interesting lyft statistics and facts. https://expandedramblings.com/index.php/lyft-statistics/, 2018a. Online web resource.
[14]
DMR. 90 amazing uber statistics, demographics and facts. https://expandedramblings.com/index.php/uber-statistics/, 2018b. Online web resource.
[15]
Dutt DC, Somayaji AB, Bingham MJK, System and method for implicit authentication, United state patent and trade office (USPTO), 2017, US Patent 9,788,203.
[16]
S. Eastwood, S. Yanushkevich, Risk profiler in automated human authentication, Proceedings of IEEE symposium on computational intelligence for engineering solutions (CIES), IEEE, 2014, pp. 140–147.
[17]
S.C. Eastwood, V.P. Shmerko, S.N. Yanushkevich, M. Drahansky, D.O. Gorodnichy, Biometric-enabled authentication machines: a survey of open-set real-world applications, IEEE Trans Hum Mach Syst 46 (2) (2016) 231–242.
[18]
Ellis DPW. PLP, RASTA, MFCC, and inversion in matlab. http://www.ee.columbia.edu/~dpwe/resources/matlab/rastamat/, 2005. Online web resource.
[19]
T. Fawcett, An introduction to ROC analysis, Pattern Recogn. Lett. 27 (8) (2006) 861–874.
[20]
Feng T., Liu Z., Kwon K.A., Shi W., B. Carbunar, Jiang Y., N. Nguyen, Continuous mobile authentication using touchscreen gestures, Proceedings of IEEE conference on technologies for homeland security (HST), IEEE, 2012, pp. 451–456.
[21]
M. Frank, R. Biedert, Ma E., I. Martinovic, Song D., Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication, IEEE Trans Inf Forens Secur 8 (1) (2013) 136–148.
[22]
S. Garcia-Salicetti, C. Beumier, G. Chollet, B. Dorizzi, J.L. Les Jardins, J. Lunter, Ni Y., D. Petrovska-Delacrétaz, Biomet: a multimodal person authentication database including face, voice, fingerprint, hand and signature modalities, Proceedings of international conference on audio-and video-based biometric person authentication, Springer, 2003, pp. 845–853.
[23]
M.I. Gofman, S. Mitra, T.H.K. Cheng, N.T. Smith, Multimodal biometrics for enhanced mobile device security, Commun ACM 59 (4) (2016) 58–65.
[24]
P.J. Grother, M.L. Ngan, G.W. Quinn, Face in video evaluation (FIVE) face recognition of non-cooperative subjects, Technical Report, Ross - Springer, 2017, NIST Interagency/Internal Report (NISTIR)-8173.
[25]
S. Gupta, A. Buriro, B. Crispo, Demystifying authentication concepts in smartphones: ways and types to secure access, Mobile Inf Syst 2018 (2018).
[26]
S. Gupta, A. Buriro, B. Crispo, Driverauth: behavioral biometric-based driver authentication mechanism for on-demand ride and ridesharing infrastructure, ICT Express (2018) in press. https://www.sciencedirect.com/science/article/pii/S2405959517302710.
[27]
Horwitz J. Fake drivers and passengers are boosting uber’s growth in china. https://qz.com/423288/fake-drivers-and-passengers-are-boosting-ubers-growth-in-china, 2015. Online web resource.
[28]
ISO9000:2015, Quality management systems fundamentals and vocabulary, 2015.
[29]
ISO. Iso/iec 24713-2:2008(en). https://www.iso.org/obp/ui/#iso:std:iso-iec:24713:-2:ed-1:v1:en; 2016. Online web resource.
[30]
A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition, IEEE Trans Circ Syst Video Technol 14 (1) (2004) 4–20.
[31]
A.K. Jain, A.A. Ross, K. Nandakumar, Introduction to biometrics, Springer Science & Business Media, 2011.
[32]
J. Kannala, E. Rahtu, Bsif: Binarized statistical image features, Proceedings of twenty-first international conference on pattern recognition (ICPR), IEEE, 2012, pp. 1363–1366.
[33]
Kim T., Park H., Hong S.H., Chung Y., Integrated system of face recognition and sound localization for a smart door phone, IEEE Trans Consum Electron 59 (3) (2013) 598–603.
[34]
Kim W., Suh S., Han J.J., Face liveness detection from a single image via diffusion speed model, IEEE Trans Image Process 24 (8) (2015) 2456–2465.
[35]
Koreman J., Morris A.C., Wu D., Jassim S., Sellahewa H., Ehlers J., Chollet G., Aversano G., Bredin H., Garcia-Salicetti S., et al., Multi-modal biometric authentication on the SecurePhone PDA (2006).
[36]
R.D. Labati, A. Genovese, E. Muñoz, V. Piuri, F. Scotti, G. Sforza, Biometric recognition in automated border control: a survey, ACM Comput Surv 49 (2) (2016) 24.
[37]
Lai K., S.C. Eastwood, W.A. Shier, S.N. Yanushkevich, V.P. Shmerko, Mass evidence accumulation and traveler risk scoring engine in e-border infrastructure, IEEE Trans Intell Transp Syst, (2017).
[38]
Langlois S. Don’t tip your uber driver? it could cost you a 5-star rating. https://www.marketwatch.com/story/dont-tip-your-uber-driver-it-could-cost-you-a-5-star-rating-2015-08-12, 2018. Online web resource.
[39]
Ma S., Huang J., Penalized feature selection and classification in bioinformatics, Briefings in bioinformatics 9 (5) (2008) 392–403.
[40]
Ma W., China’s mobile economy: opportunities in the largest and fastest information consumption boom, John Wiley & Sons, 2016.
[41]
U. Mahbub, S. Sarkar, V.M. Patel, R. Chellappa, Active user authentication for smartphones: a challenge data set and benchmark results, Proceedings of eighth international conference on biometrics theory, applications and systems (BTAS), IEEE, 2016, pp. 1–8.
[42]
S. Marcel, M.S. Nixon, Li S.Z., Handbook of biometric anti-spoofing-trusted biometrics under spoofing attacks, Advances in Computer Vision and Pattern Recognition, Springer, 2014.
[43]
Matlab. Choose classifier options. https://in.mathworks.com/help/stats/choose-a-classifier.html, 2018a. Online web resource.
[44]
Matlab. Classification learner app. https://in.mathworks.com/help/stats/classification-learner-app.html, 2018b. Online web resource.
[45]
C. McCool, S. Marcel, A. Hadid, M. Pietikäinen, P. Matejka, J. Cernockỳ, N. Poh, J. Kittler, A. Larcher, C. Levy, et al., Bi-modal person recognition on a mobile phone: using mobile phone data, Proceedings of international conference on multimedia and expo workshops (ICMEW), IEEE, 2012, pp. 635–640.
[46]
Meng Y., Wong D.S., R. Schlegel, et al., Touch gestures based biometric authentication scheme for touchscreen mobile phones, Proceedings of international conference on information security and cryptology, Springer, 2012, pp. 331–350.
[47]
L. Mezai, F. Hachouf, M. Bengherabi, Fusion of face and voice using the dempster-shafer theory for person verification, Proceedings of seventh international workshop on systems, signal processing and their applications (WOSSPA), IEEE, 2011, pp. 103–106.
[48]
A. Mirsadikov, A. Harrison, B. Mennecke, Tales from the wheel: an it-fueled ride as an uber driver, Proceedings of twenty-second Americas conference on information systems, AMCIS, 2016.
[49]
L.C. Molina, L. Belanche, À. Nebot, Feature selection algorithms: a survey and experimental evaluation, Proceedings of international conference on data mining, ICDM, IEEE, 2002, pp. 306–313.
[50]
Y. Moon, Uber: changing the way the world moves, Case, Harvard Business School, 2015, p. 101.
[51]
K. Patel, H. Han, A.K. Jain, Secure face unlock: Spoof detection on smartphones, IEEE Trans Inf Forens Secur 11 (10) (2016) 2268–2283.
[52]
V.M. Patel, R. Chellappa, D. Chandra, B. Barbello, Continuous user authentication on mobile devices: recent progress and remaining challenges, IEEE Signal Process Mag 33 (4) (2016) 49–61.
[53]
F. Porée, J. Mariéthoz, S. Bengio, F. Bimbot, The BANCA Database and experimental protocol for speaker verification, Technical Report, IDIAP, 2002.
[54]
[55]
N. Rogmann, M. Krieg, Liveness detection in biometrics, Proceedings of international conference of the biometrics special interest group (BIOSIG), IEEE, 2015, pp. 1–14.
[56]
A.A. Ross, A.K. Jain, K. Nandakumar, Information fusion in biometrics, Handbook of Multibiometrics, Springer, 2006, pp. 37–58.
[57]
N. Sae-Bae, N. Memon, K. Isbister, K. Ahmed, Multitouch gesture-based authentication, IEEE Trans Inf Forens Secur 9 (4) (2014) 568–582.
[58]
M. Soltane, N. Doghmane, N. Guersi, Face and speech based multi-modal biometric authentication, Int J Adv Sci Technol 21 (6) (2010) 41–56.
[59]
Uber. Always the ride you want. https://www.uber.com/en-IT/ride/, 2018a. Online web resource.
[60]
Uber. Engineering safety with uber’s real-time id check. https://eng.uber.com/real-time-id-check/, 2018b. Online web resource.
[61]
Uber. How to become an uber driver. https://www.uber.com/info/how-to-become-an-uber-driver/, 2018c. Online web resource.
[62]
Uber. What does the background check include? https://help.uber.com/h/6970e704-95ac-4ed3-9355-e779a86db366, 2018d. Online web resource.
[63]
R.J. Urbanowicz, M. Meeker, W. LaCava, R.S. Olson, J.H. Moore, Relief-based feature selection: introduction and review, J Biomed Inf 85 (2018) 189–203.
[64]
USAtoday. I got taken for a ride by a fake uber driver. don’t become the next victim. https://www.usatoday.com/story/tech/columnist/stevenpetrow/2016/10/12/fake-uber-drivers-dont-become-next-victim/91903508/, 2016. Online web resource.
[65]
Wang S., Hu R., Yu H., Zheng X., R.I. Damper, et al., Augmenting remote multimodal person verification by embedding voice characteristics into face images, Proceedings of international conference on multimedia and expo workshops (ICMEW), IEEE, 2013, pp. 1–6.
[66]
Whosdrivingyou. Fake uber drivers pose real threat. http://www.whosdrivingyou.org/rideshare-incidents, 2017. Online web resource.
[67]
Whosdrivingyou. Reported list of incidents involving uber and lyft. http://www.whosdrivingyou.org/rideshare-incidents, 2018. Online web resource.
[68]
I.H. Witten, E. Frank, M.A. Hall, C.J. Pal, Data mining: Practical machine learning tools and techniques, Morgan Kaufmann, 2016.
[69]
Xu H., Zhou Y., Lyu M.R., Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones, Proceedings of symposium on usable privacy and security, SOUPS, 14568–582, 2014, pp. 187–198.
[70]
Zhang L., Tan S., Yang J., Hearing your voice is not enough: an articulatory gesture based liveness detection for voice authentication, Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, ACM, 2017, pp. 57–71.
[71]
Zhang L., Tan S., Yang J., Chen Y., Voicelive: a phoneme localization based liveness detection for voice authentication on smartphones, Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, ACM, 2016, pp. 1080–1091.

Cited By

View all
  • (2023)How Unique do we Move? Understanding the Human Body and Context Factors for User IdentificationProceedings of Mensch und Computer 202310.1145/3603555.3603574(127-137)Online publication date: 3-Sep-2023
  • (2023)WavoID: Robust and Secure Multi-modal User Identification via mmWave-voice MechanismProceedings of the 36th Annual ACM Symposium on User Interface Software and Technology10.1145/3586183.3606775(1-15)Online publication date: 29-Oct-2023
  • (2023)From Passive Defense to Proactive Defence: Strategies and TechnologiesArtificial Intelligence Security and Privacy10.1007/978-981-99-9785-5_14(190-205)Online publication date: 3-Dec-2023
  • Show More Cited By

Index Terms

  1. DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Computers and Security
    Computers and Security  Volume 83, Issue C
    Jun 2019
    407 pages

    Publisher

    Elsevier Advanced Technology Publications

    United Kingdom

    Publication History

    Published: 01 June 2019

    Author Tags

    1. Smartphone
    2. Sensors
    3. User authentication
    4. Physiological and behavioral biometrics
    5. Risk-based approach

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 28 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)How Unique do we Move? Understanding the Human Body and Context Factors for User IdentificationProceedings of Mensch und Computer 202310.1145/3603555.3603574(127-137)Online publication date: 3-Sep-2023
    • (2023)WavoID: Robust and Secure Multi-modal User Identification via mmWave-voice MechanismProceedings of the 36th Annual ACM Symposium on User Interface Software and Technology10.1145/3586183.3606775(1-15)Online publication date: 29-Oct-2023
    • (2023)From Passive Defense to Proactive Defence: Strategies and TechnologiesArtificial Intelligence Security and Privacy10.1007/978-981-99-9785-5_14(190-205)Online publication date: 3-Dec-2023
    • (2021)Forensic Driver Identification Considering an Unknown SuspectInternational Journal of Applied Mathematics and Computer Science10.34768/amcs-2021-004031:4(587-599)Online publication date: 1-Dec-2021
    • (2021)Robust multimodal biometric authentication algorithms using fingerprint, iris and voice features fusionJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-20042540:1(647-672)Online publication date: 1-Jan-2021
    • (2021)SWIPEGANProceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning10.1145/3468218.3469039(85-90)Online publication date: 28-Jun-2021
    • (2021)Provenance Navigator: Towards More Usable Privacy and Data Management Strategies for Smart AppsSocio-Technical Aspects in Security10.1007/978-3-031-10183-0_2(24-42)Online publication date: 8-Oct-2021

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media