1,571 research outputs found
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrust—a hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
Models of leader elections and their applications
New research about cyber-physical systems is rapidly changing the way we think about critical infrastructures such as the power grid. Changing requirements for the generation, storage, and availability of power are all driving the development of the smart-grid. Many smart-grid projects disperse power generation across a wide area and control devices with a distributed system. However, in a distributed system, the state of processes is hard to determine due to isolation of memory. By using information flow security models, we reason about a process\u27s beliefs of the system state in a distributed system. Information flow analysis aided in the creation of Markov models for the expected behavior of a cyber controller in a smart-grid system using a communication network with omission faults. The models were used as part of an analysis of the distributed system behavior when there are communication faults. With insight gained from these models, existing congestion management techniques were extended to create a feedback mechanism, allowing the cyber-physical system to better react to issues in the communication network --Abstract, page iii
Cybersecurity of the Power Production and Distribution of Critical Infrastructure
The paper presents a structured, comprehensive and universally applicable approach to the management of cyber security of the power production and distribution of critical electricity national infrastructure. In his daily work, the author is competent for the protection and the resilience of the national electric power infrastructure against the threats from cyber space. The exposed approach and methods to the objective in question are successfully applied
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of
Things and ambient intelligence applications. In such networks, secure resource sharing functionality is
accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can
cover the large operational area. However, these systems fail to capture some inherent properties of
VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing
challenging. In this article, we propose MobileTrust – a hybrid trust-based system for secure resource
sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and
upcoming 5G technologies in order to provide robust trust establishment with global scalability. The ad hoc
communication is energy-efficient and protects the system against threats that are not countered by the
current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO
simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are
implemented in the same platform in order to provide a fair comparison. Moreover, MobileTrust is deployed
on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and
road-state parameters of an urban application. The proposed system is developed under the EU-founded
THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware
transportation scenario, bringing closer the vision of sustainable circular economy
Increasing communication reliability in manufacturing environments
This paper is concerned with low cost mechanisms that can increase reliability of machine to machine and machine to cloud communications in increasingly complex manufacturing environments that are prone to disconnections and faults. We propose a novel distributed and cooperative sensing framework that supports localized real time predictive analytics of connectivity patterns and detection of a range of faults together with issuing of notifications and responding on demand queries. We show that our Fault and Disconnection Aware Smart Sensing (FDASS) framework achieves significantly lower packet loss rates and communication delays in the face of unreliable nodes and networks when compared to the state of the art and benchmark approaches
Cyber-physical system based on image recognition to improve traffic flow: A case study
Vehicular traffic in metropolitan areas turns congested along either paths or periods. As a case study, we have considered a mass transport system with a bus fleet that rides over exclusive lanes across streets and avenues in an urban area that does not allow
the circulation of lightweight vehicles, cargo, and motorcycles. This traffic flow becomes congested due to the absence of restriction policies based on criteria. Moreover, the exclusive lanes are at ground level, decreasing lanes for other vehicles. The main objective of this proposal consists of controlling the access to the exclusive lanes by a cyber-physical system following authorization conditions, verifying the permission status of a vehicle by the accurate recognition of license plates to reduce traffic congestion. Therefore, in the case of invading an exclusive lane without permission, the vehicle owner gets a notification of the fine with the respective evidence
- …