11 research outputs found

    DESIGN OF EFFICIENT IN-NETWORK DATA PROCESSING AND DISSEMINATION FOR VANETS

    Get PDF
    By providing vehicle-to-vehicle and vehicle-to-infrastructure wireless communications, vehicular ad hoc networks (VANETs), also known as the “networks on wheels”, can greatly enhance traffic safety, traffic efficiency and driving experience for intelligent transportation system (ITS). However, the unique features of VANETs, such as high mobility and uneven distribution of vehicular nodes, impose critical challenges of high efficiency and reliability for the implementation of VANETs. This dissertation is motivated by the great application potentials of VANETs in the design of efficient in-network data processing and dissemination. Considering the significance of message aggregation, data dissemination and data collection, this dissertation research targets at enhancing the traffic safety and traffic efficiency, as well as developing novel commercial applications, based on VANETs, following four aspects: 1) accurate and efficient message aggregation to detect on-road safety relevant events, 2) reliable data dissemination to reliably notify remote vehicles, 3) efficient and reliable spatial data collection from vehicular sensors, and 4) novel promising applications to exploit the commercial potentials of VANETs. Specifically, to enable cooperative detection of safety relevant events on the roads, the structure-less message aggregation (SLMA) scheme is proposed to improve communication efficiency and message accuracy. The scheme of relative position based message dissemination (RPB-MD) is proposed to reliably and efficiently disseminate messages to all intended vehicles in the zone-of-relevance in varying traffic density. Due to numerous vehicular sensor data available based on VANETs, the scheme of compressive sampling based data collection (CS-DC) is proposed to efficiently collect the spatial relevance data in a large scale, especially in the dense traffic. In addition, with novel and efficient solutions proposed for the application specific issues of data dissemination and data collection, several appealing value-added applications for VANETs are developed to exploit the commercial potentials of VANETs, namely general purpose automatic survey (GPAS), VANET-based ambient ad dissemination (VAAD) and VANET based vehicle performance monitoring and analysis (VehicleView). Thus, by improving the efficiency and reliability in in-network data processing and dissemination, including message aggregation, data dissemination and data collection, together with the development of novel promising applications, this dissertation will help push VANETs further to the stage of massive deployment

    Emergency message dissemination schemes based on congestion avoidance in VANET and vehicular FoG computing

    Get PDF
    With the rapid growth in connected vehicles, FoG-assisted vehicular ad hoc network (VANET) is an emerging and novel field of research. For information sharing, a number of messages are exchanged in various applications, including traffic monitoring and area-specific live weather and social aspects monitoring. It is quite challenging where vehicles' speed, direction, and density of neighbors on the move are not consistent. In this scenario, congestion avoidance is also quite challenging to avoid communication loss during busy hours or in emergency cases. This paper presents emergency message dissemination schemes that are based on congestion avoidance scenario in VANET and vehicular FoG computing. In the similar vein, FoG-assisted VANET architecture is explored that can efficiently manage the message congestion scenarios. We present a taxonomy of schemes that address message congestion avoidance. Next, we have included a discussion about comparison of congestion avoidance schemes to highlight the strengths and weaknesses. We have also identified that FoG servers help to reduce the accessibility delays and congestion as compared to directly approaching cloud for all requests in linkage with big data repositories. For the dependable applicability of FoG in VANET, we have identified a number of open research challenges. © 2013 IEEE

    IEEE Access Special Section Editorial: Big Data Technology and Applications in Intelligent Transportation

    Get PDF
    During the last few years, information technology and transportation industries, along with automotive manufacturers and academia, are focusing on leveraging intelligent transportation systems (ITS) to improve services related to driver experience, connected cars, Internet data plans for vehicles, traffic infrastructure, urban transportation systems, traffic collaborative management, road traffic accidents analysis, road traffic flow prediction, public transportation service plan, personal travel route plans, and the development of an effective ecosystem for vehicles, drivers, traffic controllers, city planners, and transportation applications. Moreover, the emerging technologies of the Internet of Things (IoT) and cloud computing have provided unprecedented opportunities for the development and realization of innovative intelligent transportation systems where sensors and mobile devices can gather information and cloud computing, allowing knowledge discovery, information sharing, and supported decision making. However, the development of such data-driven ITS requires the integration, processing, and analysis of plentiful information obtained from millions of vehicles, traffic infrastructures, smartphones, and other collaborative systems like weather stations and road safety and early warning systems. The huge amount of data generated by ITS devices is only of value if utilized in data analytics for decision-making such as accident prevention and detection, controlling road risks, reducing traffic carbon emissions, and other applications which bring big data analytics into the picture

    Modélisation formelle des systèmes de détection d'intrusions

    Get PDF
    L’écosystème de la cybersécurité évolue en permanence en termes du nombre, de la diversité, et de la complexité des attaques. De ce fait, les outils de détection deviennent inefficaces face à certaines attaques. On distingue généralement trois types de systèmes de détection d’intrusions : détection par anomalies, détection par signatures et détection hybride. La détection par anomalies est fondée sur la caractérisation du comportement habituel du système, typiquement de manière statistique. Elle permet de détecter des attaques connues ou inconnues, mais génère aussi un très grand nombre de faux positifs. La détection par signatures permet de détecter des attaques connues en définissant des règles qui décrivent le comportement connu d’un attaquant. Cela demande une bonne connaissance du comportement de l’attaquant. La détection hybride repose sur plusieurs méthodes de détection incluant celles sus-citées. Elle présente l’avantage d’être plus précise pendant la détection. Des outils tels que Snort et Zeek offrent des langages de bas niveau pour l’expression de règles de reconnaissance d’attaques. Le nombre d’attaques potentielles étant très grand, ces bases de règles deviennent rapidement difficiles à gérer et à maintenir. De plus, l’expression de règles avec état dit stateful est particulièrement ardue pour reconnaître une séquence d’événements. Dans cette thèse, nous proposons une approche stateful basée sur les diagrammes d’état-transition algébriques (ASTDs) afin d’identifier des attaques complexes. Les ASTDs permettent de représenter de façon graphique et modulaire une spécification, ce qui facilite la maintenance et la compréhension des règles. Nous étendons la notation ASTD avec de nouvelles fonctionnalités pour représenter des attaques complexes. Ensuite, nous spécifions plusieurs attaques avec la notation étendue et exécutons les spécifications obtenues sur des flots d’événements à l’aide d’un interpréteur pour identifier des attaques. Nous évaluons aussi les performances de l’interpréteur avec des outils industriels tels que Snort et Zeek. Puis, nous réalisons un compilateur afin de générer du code exécutable à partir d’une spécification ASTD, capable d’identifier de façon efficiente les séquences d’événements.Abstract : The cybersecurity ecosystem continuously evolves with the number, the diversity, and the complexity of cyber attacks. Generally, we have three types of Intrusion Detection System (IDS) : anomaly-based detection, signature-based detection, and hybrid detection. Anomaly detection is based on the usual behavior description of the system, typically in a static manner. It enables detecting known or unknown attacks but also generating a large number of false positives. Signature based detection enables detecting known attacks by defining rules that describe known attacker’s behavior. It needs a good knowledge of attacker behavior. Hybrid detection relies on several detection methods including the previous ones. It has the advantage of being more precise during detection. Tools like Snort and Zeek offer low level languages to represent rules for detecting attacks. The number of potential attacks being large, these rule bases become quickly hard to manage and maintain. Moreover, the representation of stateful rules to recognize a sequence of events is particularly arduous. In this thesis, we propose a stateful approach based on algebraic state-transition diagrams (ASTDs) to identify complex attacks. ASTDs allow a graphical and modular representation of a specification, that facilitates maintenance and understanding of rules. We extend the ASTD notation with new features to represent complex attacks. Next, we specify several attacks with the extended notation and run the resulting specifications on event streams using an interpreter to identify attacks. We also evaluate the performance of the interpreter with industrial tools such as Snort and Zeek. Then, we build a compiler in order to generate executable code from an ASTD specification, able to efficiently identify sequences of events

    Development and evaluation of smartphone-based ITS applications for vehicular networks

    Full text link
    [ES] Una de las áreas de investigación que está recibiendo más atención recientemente es la de vehículos autónomos. Los investigadores están en este momento centrados en el tercer de los cinco niveles de autonomía, los cuales son: asistencia en la conducción, automatización parcial, automatización condicional, alta automatización y automatización completa. A pesar de los rápidos progresos que están habiendo en este campo, la adopción de estas soluciones llevará tiempo no sólo debido a cuestiones legales, sino también por el hecho de que los avances tecnológicos se enfrentan a un lento respaldo por parte de los fabricantes. Además, la baja tasa de renovación de vehículos de carretera, dificulta el despliegue de tecnologías innovadoras, como es el caso de la red vehicular. Ocho años después de la introducción de la norma 802.11p para la comunicación vehicular del Instituto de Ingenieros Eléctricos y Electrónicos (IIEE), los vehículos que se usan a diario todavía carecen de la capacidad de comunicarse entre sí. Este hecho impide el uso de las muchas aplicaciones de seguridad del Sistema de Inteligencia de Transporte (SIT) que aprovecha la red vehicular para el intercambio de datos. La forma obvia de manejar este problema es poner las tecnologías disponibles a la disposición de los usuarios comunes para desarrollar soluciones que se puedan implementar fácilmente y, además, económicas. Por esta razón, trasladamos nuestra atención a los dispositivos inteligentes, especialmente a los teléfonos inteligentes, los cuales han recorrido un largo camino desde la primera introducción de teléfonos móviles a finales del siglo XX. Hoy en día casi todos llevan uno en su bolsillo a donde sea que vayan, permitiéndoles no sólo hacer llamadas, sino también medir y controlar diferentes parámetros con la ayuda de los muchos sensores integrados que están disponibles para estos dispositivos compactos pero potentes. Nuestro objetivo es estudiar los efectos de la integración de los teléfonos inteligentes a la red vehicular para desarrollar aplicaciones de seguridad del SIT. La elección de los teléfonos inteligentes aquí no solo está justificada por su amplia disponibilidad y uso, sino también porque están evolucionando hacia terminales de alto rendimiento con microprocesadores de múltiples núcleos cargados dotados de un grupo suficientemente diverso de sensores. En esta tesis proponemos tres diferentes aplicaciones de seguridad SIT para teléfonos inteligentes, diseñados para aprovechar el entorno de red vehicular: una aplicación de generación de advertencia llamada Messiah que alerta a los conductores de la presencia de vehículos de emergencia en las cercanías; una aplicación de Advertencia de Colisión Frontal (ACF) que advierte a los conductores si no se mantiene la distancia de seguridad mínima entre el vehículo que va delante y el que lo sigue; y, por último, una aplicación que tiene como objetivo ayudar a los conductores con asistencia visual durante el adelantamiento, llamada EYES. Todas estas aplicaciones han sido desarrolladas para la plataforma Android, y dependen de la transmisión de datos entre vehículos. Dado que los vehículos que utilizamos día a día no admiten la posibilidad de comunicarse entre sí, también diseñamos GRCBox, que es una unidad integrada de bajo coste que permite la comunicación del Vehículo a Todo (V2X). A partir de nuestro estudio de aplicaciones para dispositivos móviles diseñados para redes vehiculares, descubrimos que el uso de teléfonos inteligentes proporciona una nueva dirección para la investigación relacionada con SIT y redes vehiculares al permitir la adopción rápida de las soluciones existentes, donde los usuarios pueden descargar y usar las aplicaciones con sólo un clic a un botón. Al mismo tiempo, la portabilidad y compacidad de los dispositivos los hace limitados en términos de velocidad, potencia de procesamiento y precisi[CA] Una de les àrees d'investigació que està rebent més atenció recentment és la de vehicles autònoms. Els investigadores estan en este moment centrats en el tercer dels cinc nivells d'autonomia, els quals són: assistència en la conducció, automatització parcial, automatització condicional, alta automatització i automatització completa. Malgrat els ràpids progressos que s'estan donant en este camp, l'adopció d'estes solucions portarà temps no sols degut a qüestions legals, sinó també pel fet que els avanços tecnològics s'enfronten a un lent recolzament per part dels fabricants. A més a més, la baixa taxa de renovació de vehicles de carretera, dificulta el desplegament de tecnologies innovadores com és el cas de la xarxa vehicular. Huit anys després de la introducció de la norma 802.11p per a la comunicació vehicular de l'Institut d'Enginyers Elèctrics i Electrònics (IEEE), els vehicles que s'utilitzen a diari encara manquen de la capacitat de comunicar-se entre sí. Este fet impedeix l'ús de les moltes aplicacions de seguretat del Sistema d'Intel·ligència de Transport (SIT) que aprofita la xarxa vehicular per a l'intercanvi de dades. La forma òbvia de tractar aquest problema és posar les tecnologies disponibles a la disposició dels usuaris comuns per a desenvolupar solucions que es puguen implementar fàcilment, còmodes d'adoptar i, a més a més, econòmiques. Per aquesta raó, traslladem la nostra atenció als dispositius intel·ligents, especialment als telèfons intel·ligents, els quals han recorregut un llarg camí des de la primera introducció de telèfons mòbils a finals del segle XX. Hui en dia quasi tots porten un en la butxaca on siga que vagen, permetent-los no sols fer cridades, sinó també mesurar i controlar diferents paràmetres amb l'ajuda dels molts sensors integrats que estan disponibles per a estos dispositius compactes però potents. El nostre objectiu és estudiar els efectes de la integració dels telèfons intel·ligents a la xarxa vehicular per a desenvolupar aplicacions de seguretat del SIT. L'elecció dels telèfons intel·ligents ací no està sols justificada per la seua àmplia disponibilitat i ús, sinó també perquè estan evolucionant cap a terminals d'alt rendiment amb microprocessadors de múltiples nuclis dotats amb un grup suficientment divers de sensors. En esta tesi proposem tres diferents aplicacions de seguretat SIT per a telèfons intel·ligents, dissenyats per a aprofitar l'entorn de xarxa vehicular: una aplicació de generació d'advertència anomenada Messiah que alerta els conductors de la presència de vehicles d'emergència en les proximitats; una aplicació Advertència de Col·lisió Frontal (ACF) que adverteix els conductors si no mantenen la distància de seguretat mínima entre el vehicle que va davant i el que el segueix; i, per últim, una aplicació que té com objectiu ajudar els conductors amb assistència visual durant l'avançament, anomenat EYES. Totes aquestes aplicacions han sigut desenvolupades per a la plataforma Android, i depenen de la transmissió de dades entre vehicles. Donat que els vehicles que utilitzem a diari no admeten la possibilitat de comunicar-se entre sí, també dissenyem GRCBox, que és una unitat integrada de baix cost que permet la comunicació de Vechicle a Tot (V2X). A partir del nostre estudi d'aplicacions per a dispositius mòbils dissenyats per a xarxes vehiculars, descobrim que l'ús de telèfons intel·ligents proporciona una nova direcció per a la investigació relacionada amb SIT i xarxes vehiculars al permetre l'adopció ràpida de les solucions existents, on els usuaris poden descarregar i utilitzar les aplicacions amb un sol clic a un botó. Però al mateix temps, la portabilitat i la compacitat dels dispositius els fa limitats en termes de velocitat, potència de processament i precisió del sensor integrat, cosa que afecta al rendiment de les aplicacions.[EN] One of the research areas that is receiving a lot of attention recently is autonomous vehicles. Researchers are currently focused on the third level of autonomy out of the five levels, which are: drive assistance, partial automation, conditional automation, high automation, and full automation. Even though rapid progress is being made in this field, the adoption of these solutions will take time not only due to legal issues, but also due to the fact that technological improvements face slow endorsement by manufacturers. Also, the slow renewal rate of vehicles on road hinders the deployment of novel technologies, as is the case of Vehicular Networks (VNs). Eight years after the introduction of the IEEE 802.11p standard for vehicular communication, vehicles used on a daily basis still lack the capability of communicating with one other. This fact impedes the use of the many ITS safety applications that take advantage of VNs for data exchange. The obvious way to handle this problem is to use the available technologies at the disposal of common users to develop solutions that are easily deployable, effortless to adopt, and moreover, cost effective. For this reason we shift our attention to smart devices, specially smartphones, which have come a long way since the first introduction of mobile phones in the late 20th century. Nowadays, nearly everyone carries one in their pocket anywhere they go, allowing them to not only make calls, but also to measure and monitor different parameters with the help of the many on-board sensors that are available to these compact yet powerful devices. Our objective is to study the effects of integrating smartphones to vehicular networks, to develop ITS safety applications. The choice of smartphones here is not only justified by their wide availability and use, but also because they are evolving towards high performance terminals with multi-core microprocessors packed with a sufficiently diverse group of sensors. In this thesis we propose three different ITS safety applications for smartphones, designed to take advantage of the vehicular network environment: a warning generation application called Messiah that alerts drivers of the presence of emergency vehicles in close proximity; a FCW application which warns drivers if a minimum safe distance is not maintained between the vehicle ahead and the one following it; and lastly an application that aims to aid drivers with visual assistance while overtaking, named EYES. All these applications have been developed for the Android platform, and are dependent on the data transmission among vehicles. Since vehicles we use on a day to day basis still do not accommodate the possibility to communicate with one another, we also designed the GRCBox, which is a low cost on-board unit that supports V2X communication. From our study of applications for mobile devices designed for VNs, we found that the use of smartphones provides a new direction to research related to ITS and VNs by allowing a quick adoption of the existing solutions, where users are able to download and use applications just by one click of a button. But at the same time, the portability and compactness of the devices makes them limited in terms of speed, processing power, and accuracy of the on-board sensor, thus affecting the performance of the applications. In our case, the simpler Messiah application performed very well, while the EYES application that is dependent on GPS data, and the FCW application which required heavy processing and use of the camera due to its dependence on plate recognition, were affected by the hardware limitations of the smartphones.Patra, S. (2019). Development and evaluation of smartphone-based ITS applications for vehicular networks [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/124058TESI

    Dynamic services in mobile ad hoc networks

    Get PDF
    The increasing diffusion of wireless-enabled portable devices is pushing toward the design of novel service scenarios, promoting temporary and opportunistic interactions in infrastructure-less environments. Mobile Ad Hoc Networks (MANET) are the general model of these higly dynamic networks that can be specialized, depending on application cases, in more specific and refined models such as Vehicular Ad Hoc Networks and Wireless Sensor Networks. Two interesting deployment cases are of increasing relevance: resource diffusion among users equipped with portable devices, such as laptops, smart phones or PDAs in crowded areas (termed dense MANET) and dissemination/indexing of monitoring information collected in Vehicular Sensor Networks. The extreme dynamicity of these scenarios calls for novel distributed protocols and services facilitating application development. To this aim we have designed middleware solutions supporting these challenging tasks. REDMAN manages, retrieves, and disseminates replicas of software resources in dense MANET; it implements novel lightweight protocols to maintain a desired replication degree despite participants mobility, and efficiently perform resource retrieval. REDMAN exploits the high-density assumption to achieve scalability and limited network overhead. Sensed data gathering and distributed indexing in Vehicular Networks raise similar issues: we propose a specific middleware support, called MobEyes, exploiting node mobility to opportunistically diffuse data summaries among neighbor vehicles. MobEyes creates a low-cost opportunistic distributed index to query the distributed storage and to determine the location of needed information. Extensive validation and testing of REDMAN and MobEyes prove the effectiveness of our original solutions in limiting communication overhead while maintaining the required accuracy of replication degree and indexing completeness, and demonstrates the feasibility of the middleware approach

    The Treatment of Advanced Persistent Threats on Windows Based Systems

    Get PDF
    Advanced Persistent Threat (APT) is the name given to individuals or groups who write malicious software (malware) and who have the intent to perform actions detrimental to the victim or the victims' organisation. This thesis investigates ways in which it is possible to treat APTs before, during and after the malware has been laid down on the victim's computer. The scope of the thesis is restricted to desktop and laptop computers with hard disk drives. APTs have different motivations for their work and this thesis is agnostic towards their origin and intent. Anti-malware companies freely present the work of APTs in many ways but summarise mainly in the form of white papers. Individually, pieces of these works give an incomplete picture of an APT but in aggregate it is possible to construct a view of APT families and pan-APT commonalities by comparing and contrasting the work of many anti-malware companies; it as if there are alot of the pieces of a jigsaw puzzle but there is no box lid available with the complete picture. In addition, academic papers provide proof of concept attacks and observations, some of which may become used by malware writers. Gaps in, and extensions to, the public knowledge may be filled through inference, implication, interpolation and extrapolation and form the basis for this thesis. The thesis presents a view of where APTs lie on windows-based systems. It uses this view to create and build generic views of where APTs lie on Hard Disc Drives on Windows based systems using the Lockheed Martin Cyber Kill Chain. This is then used to treat APTs on Windows based IT systems using purpose-built software in such a way that the malware is negated by. The thesis does not claim to find all malware on but it demonstrates how to increase the cost of doing business for APTs, for example by overwriting unused disc space so APTs cannot place malware there. The software developed was able to find Indicators of Compromise on all eight Hard Disc Drives provided for analysis. Separately, from a corpus of 228 files known to be associated with malware it identified approximately two thirds as Indicators of Compromise
    corecore