49 research outputs found

    Open Platforms for Connected Vehicles

    Get PDF
    L'abstract è presente nell'allegato / the abstract is in the attachmen

    Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems

    Get PDF
    Cooperative Cyber-Physical Systems (Co-CPSs) can be enabled using wireless communication technologies, which in principle should address reliability and safety challenges. Safety for Co-CPS enabled by wireless communication technologies is a crucial aspect and requires new dedicated design approaches. In this paper, we provide an overview of five Co-CPS use cases, as introduced in our SafeCOP EU project, and analyze their safety design requirements. Next, we provide a comprehensive analysis of the main existing wireless communication technologies giving details about the protocols developed within particular standardization bodies. We also investigate to what extent they address the non-functional requirements in terms of safety, security and real time, in the different application domains of each use case. Finally, we discuss general recommendations about the use of different wireless communication technologies showing their potentials in the selected real-world use cases. The discussion is provided under consideration in the 5G standardization process within 3GPP, whose current efforts are inline to current gaps in wireless communications protocols for Co-CPSs including many future use casesinfo:eu-repo/semantics/publishedVersio

    A comprehensive survey of V2X cybersecurity mechanisms and future research paths

    Get PDF
    Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity come inadvertently with challenges which involve security vulnerabilities and breaches. Addressing security concerns is essential for seamless and safe operation of mission-critical V2X use cases. This paper surveys current literature on V2X security and provides a systematic and comprehensive review of the most relevant security enhancements to date. An in-depth classification of V2X attacks is first performed according to key security and privacy requirements. Our methodology resumes with a taxonomy of security mechanisms based on their proactive/reactive defensive approach, which helps identify strengths and limitations of state-of-the-art countermeasures for V2X attacks. In addition, this paper delves into the potential of emerging security approaches leveraging artificial intelligence tools to meet security objectives. Promising data-driven solutions tailored to tackle security, privacy and trust issues are thoroughly discussed along with new threat vectors introduced inevitably by these enablers. The lessons learned from the detailed review of existing works are also compiled and highlighted. We conclude this survey with a structured synthesis of open challenges and future research directions to foster contributions in this prominent field.This work is supported by the H2020-INSPIRE-5Gplus project (under Grant agreement No. 871808), the ”Ministerio de Asuntos Económicos y Transformacion Digital” and the European Union-NextGenerationEU in the frameworks of the ”Plan de Recuperación, Transformación y Resiliencia” and of the ”Mecanismo de Recuperación y Resiliencia” under references TSI-063000-2021-39/40/41, and the CHIST-ERA-17-BDSI-003 FIREMAN project funded by the Spanish National Foundation (Grant PCI2019-103780).Peer ReviewedPostprint (published version

    Investigating seamless handover in VANET systems

    Get PDF
    Wireless communications have been extensively studied for several decades, which has led to various new advancements, including new technologies in the field of Intelligent Transport Systems. Vehicular Ad hoc Networks or VANETs are considered to be a long-term solution, contributing significantly towards Intelligent Transport Systems in providing access to critical life-safety applications and infotainment services. These services will require ubiquitous connectivity and hence there is a need to explore seamless handover mechanisms. Although VANETs are attracting greater commercial interest, current research has not adequately captured the realworld constraints in Vehicular Ad hoc Network handover techniques. Due to the high velocity of the vehicles and smaller coverage distances, there are serious challenges in providing seamless handover from one Road Side Unit (RSU) to another and this comes at the cost of overlapping signals of adjacent RSUs. Therefore, a framework is needed to be able to calculate the regions of overlap in adjacent RSU coverage ranges to guarantee ubiquitous connectivity. This thesis is about providing such a framework by analysing in detail the communication mechanisms in a VANET network, firstly by means of simulations using the VEINs framework via OMNeT++ and then using analytical analysis of the probability of successful packet reception. Some of the concepts of the Y-Comm architecture such as Network Dwell Time, Time Before Handover and Exit Times have been used to provide a framework to investigate handover issues and these parameters are also used in this thesis to explore handover in highly mobile environments such as VANETs. Initial investigation showed that seamless communication was dependant on the beacon frequency, length of the beacon and the velocity of the vehicle. The effects of each of these parameters are explored in detail and results are presented which show the need for a more probabilistic approach to handover based on cumulative probability of successful packet reception. In addition, this work shows how the length of the beacon affects the rate of change of the Signal-to-Noise ratio or SNR as the vehicle approaches the Road-Side Unit. However, the velocity of the vehicle affects both the cumulative probability as well as the Signal-to-Noise ratio as the vehicle approaches the Road-Side Unit. The results of this work will enable systems that can provide ubiquitous connectivity via seamless handover using proactive techniques because traditional models of handover are unable to cope with the high velocity of the vehicles and relatively small area of coverage in these environments. Finally, a testbed has been set-up at the Middlesex University, Hendon campus for the purpose of achieving a better understanding of VANET systems operating in an urban environment. Using the testbed, it was observed that environmental effects have to be taken into considerations in real-time deployment studies to see how these parameters can affect the performance of VANET systems under different scenarios. This work also highlights the fact that in order to build a practical system better propagation models are required in the urban context for highly mobile environments such as VANETs

    A Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks

    Get PDF
    Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G has enabled Ultra-Reliable Low Latency Communications (URLLC) to CAVs. However, while communication performance has been enhanced, security and privacy issues have increased. Attacks have become more aggressive, and attackers have become more strategic. Public Key Infrastructure (PKI) proposed by standardization bodies cannot solely defend against these attacks. Thus, in complementary of that, sophisticated systems should be designed to detect such attacks and attackers. Machine Learning (ML) has recently emerged as a key enabler to secure future roads. Various V2X Misbehavior Detection Systems (MDSs) have adopted this paradigm. However, analyzing these systems is a research gap, and developing effective ML-based MDSs is still an open issue. To this end, this paper comprehensively surveys and classifies ML-based MDSs as well as discusses and analyses them from security and ML perspectives. It also provides some learned lessons and recommendations for guiding the development, validation, and deployment of ML-based MDSs. Finally, this paper highlighted open research and standardization issues with some future directions

    Caching Techniques in Next Generation Cellular Networks

    Get PDF
    Content caching will be an essential feature in the next generations of cellular networks. Indeed, a network equipped with caching capabilities allows users to retrieve content with reduced access delays and consequently reduces the traffic passing through the network backhaul. However, the deployment of the caching nodes in the network is hindered by the following two challenges. First, the storage space of a cache is limited as well as expensive. So, it is not possible to store in the cache every content that can be possibly requested by the user. This calls for efficient techniques to determine the contents that must be stored in the cache. Second, efficient ways are needed to implement and control the caching node. In this thesis, we investigate caching techniques focussing to address the above-mentioned challenges, so that the overall system performance is increased. In order to tackle the challenge of the limited storage capacity, smart proactive caching strategies are needed. In the context of vehicular users served by edge nodes, we believe a caching strategy should be adapted to the mobility characteristics of the cars. In this regard, we propose a scheme called RICH (RoadsIde CacHe), which optimally caches content at the edge nodes where connected vehicles require it most. In particular, our scheme is designed to ensure in-order delivery of content chunks to end users. Unlike blind popularity decisions, the probabilistic caching used by RICH considers vehicular trajectory predictions as well as content service time by edge nodes. We evaluate our approach on realistic mobility datasets against a popularity-based edge approach called POP, and a mobility-aware caching strategy known as netPredict. In terms of content availability, our RICH edge caching scheme provides an enhancement of up to 33% and 190% when compared with netPredict and POP respectively. At the same time, the backhaul penalty bandwidth is reduced by a factor ranging between 57% and 70%. Caching node is an also a key component in Named Data Networking (NDN) that is an innovative paradigm to provide content based services in future networks. As compared to legacy networks, naming of network packets and in-network caching of content make NDN more feasible for content dissemination. However, the implementation of NDN requires drastic changes to the existing network infrastructure. One feasible approach is to use Software Defined Networking (SDN), according to which the control of the network is delegated to a centralized controller, which configures the forwarding data plane. This approach leads to large signaling overhead as well as large end-to-end (e2e) delays. In order to overcome these issues, in this work, we provide an efficient way to implement and control the NDN node. We propose to enable NDN using a stateful data plane in the SDN network. In particular, we realize the functionality of an NDN node using a stateful SDN switch attached with a local cache for content storage, and use OpenState to implement such an approach. In our solution, no involvement of the controller is required once the OpenState switch has been configured. We benchmark the performance of our solution against the traditional SDN approach considering several relevant metrics. Experimental results highlight the benefits of a stateful approach and of our implementation, which avoids signaling overhead and significantly reduces e2e delays

    Connected and Automated Vehicle Enabled Traffic Intersection Control with Reinforcement Learning

    Get PDF
    Recent advancements in vehicle automation have led to a proliferation of studies in traffic control strategies for the next generation of land vehicles. Current traffic signal based intersection control methods have significant limitations on dealing with rapidly evolving mobility, connectivity and social challenges. Figures for Europe over the period 2007-16 show that 20% of road accidents that have fatalities occur at intersections. Connected and Automated Mobility (CAM) presents a new paradigm for the integration of radically different traffic control methods into cities and towns for increased travel time efficiency and safety. Vehicle-to-Everything (V2X) connectivity between Intelligent Transportation System (ITS) users will make a significant contribution to transforming the current signalised traffic control systems into a more cooperative and reactive control system. This research work proposes a disruptive unsignalised traffic control method using a Reinforcement Learning (RL) algorithm to determine vehicle priorities at intersections and to schedule their crossing with the objectives of reducing congestion and increasing safety. Unlike heuristic rule-based methods, RL agents can learn the complex non-linear relationship between the elements that play a key role in traffic flow, from which an optimal control policy can be obtained. This work also focuses on the data requirements that inform Vehicle-to-Infrastructure (V2I) communication needs of such a system. The proposed traffic control method has been validated on a state-of-the-art simulation tool and a comparison of results with a traditional signalised control method indicated an up to 84% and 41% improvement in terms of reducing vehicle delay times and reducing fuel consumption respectively. In addition to computer simulations, practical experiments have also been conducted on a scaled road network with a single intersection and multiple scaled Connected and Automated Vehicles (CAV) to further validate the proposed control system in a representative but cost-effective setup. A strong correlation has been found between the computer simulation and practical experiment results. The outcome of this research work provides important insights into enabling cooperation between vehicles and traffic infrastructure via V2I communications, and integration of RL algorithms into a safety-critical control system

    A WSSL Implementation for Critical CyberPhysical Systems Applications

    Get PDF
    The advancements in wireless communication technologies have enabled unprecedented pervasiveness and ubiquity of Cyber-Physical Systems (CPS). Such technologies can now empower true Systems-of-Systems (SoS), which cooperate to achieve more complex and efficient functionalities, such as vehicle automation, industry, residential automation, and others. However, for CPS applications to become a reality and fulfill their potential, safety and security must be guaranteed, particularly in critical systems, since they rely heavily on open communication systems, prone to intentional and non-intentional interferences. To address these issues, in this work, we propose designing a Wireless Security and Safety Layer (WSSL) architecture to be implemented in critical CPS applications. WSSL increases the reliability of these critical communications by enabling the detection of communication errors. Otherwise, it increases the CPS security using a message signature process that uniquely identifies the sender. So, this work intends to present the WSSL architecture and its implementation over two different scenarios: over Message Queue Telemetry Transport (MQTT) protocol and inside a simulation environment for communication between Unmanned Aerial Vehicles (UAVs) and Ground Control Stations in case of Beyond Visual Line of Sight (BVLOS) applications. We aim to prove that the WSSL does not significantly increase the system payload and demonstrate its safety and security resources, allowing it to be used in any general or critical CPS.Os avanços nas tecnologias de comunicação sem fios permitiram uma omnipresença e ubiquidade sem precedentes dos Sistemas Ciber-Físicos (CPS). CPS são a combinação de um sistema físico, um sistema cibernético, e a sua rede de comunicação. Tais tecnologias podem agora capacitar verdadeiros Sistemas de Sistemas (SoS) que cooperam para alcançar funcionalidades mais complexas e eficientes, tais como automação de veículos, indústria, automação residencial, e outras. As aplicações CPS são baseadas num ambiente complexo, onde sistemas estão interligados e dispositivos interagem entre si em grande escala. Estas circunstâncias aumentam a superfície de ataque, e os desafios para garantir fiabilidade e segurança. Contudo, para que as aplicações CPS se tornem realidade e alcancem o seu potencial, a segurança do funcionamento e segurança contra intrusões devem ser garantidas, particularmente em sistemas críticos, uma vez que dependem fortemente de sistemas de comunicação abertos, propensos a interferências intencionais e não intencionais. Tais interferências podem ocasionar graves danos ao ambiente e riscos a integridade física e moral das pessoas envolvidas. Neste trabalho, propõe-se a concepção de uma arquitectura WSSL, a ser implementada em aplicações críticas de CPS, para abordar estas questões. Esta arquitectura aumenta a fiabilidade das comunicações críticas, permitindo a detecção de erros de comunicação. Além disso, aumenta a segurança dos CPS utilizando um processo de assinatura de mensagem que identifica de forma única o remetente, garantindo a integridade e autenticidade, pilares cruciais da cibersegurança. Assim, pretende-se apresentar a definição, arquitectura e a implementação da WSSL sobre um protocolo MQTT (do inglês Message Queue Telemetry Transport) para avaliação dos custos associados a sua implementação, e provar que esta não aumenta significativamente a carga útil do sistema. Também é pretendido avaliar seu comportamento e custos a partir da implementação em um ambiente simulado para comunicação entre veículos aéreos não tripulados e estações de controle terrestres . Por fim, deve-se avaliar se os seus recursos de segurança são eficientes na detecção de erros relativos a segurança do funcionamento ou a segurança contra intrusões, permitindo a sua utilização em qualquer CPS, seja ele um CPS crítico ou não.N/

    Project BeARCAT : Baselining, Automation and Response for CAV Testbed Cyber Security : Connected Vehicle & Infrastructure Security Assessment

    Get PDF
    Connected, software-based systems are a driver in advancing the technology of transportation systems. Advanced automated and autonomous vehicles, together with electrification, will help reduce congestion, accidents and emissions. Meanwhile, vehicle manufacturers see advanced technology as enhancing their products in a competitive market. However, as many decades of using home and enterprise computer systems have shown, connectivity allows a system to become a target for criminal intentions. Cyber-based threats to any system are a problem; in transportation, there is the added safety implication of dealing with moving vehicles and the passengers within
    corecore