374 research outputs found

    Collaborative Analysis Framework of Safety and Security for Autonomous Vehicles

    Get PDF
    Human error has been statistically proven to be the primary cause of road accidents. This undoubtedly is a contributory cause of the rising popularity of autonomous vehicles as they are presumably able to maneuver appropriately/optimally on the roads while diminishing the likelihood of human error and its repercussion. However, autonomous vehicles are not ready for widespread adoption because their safety and security issues are yet to be thoroughly investigated/addressed. Little literature could be found on collaborative analysis of safety and security of autonomous vehicles. This paper proposes a framework for analyzing both safety and security issues, which includes an integrated safety and security method (S&S) with international vehicle safety and security standards ISO 26262 and SAE J3061. The applicability of the proposed framework is demonstrated using an example of typical autonomous vehicle model. Using this framework, one can clearly understand the vehicle functions, structure, the associated failures and attacks, and also see the vulnerabilities that are not yet addressed by countermeasures, which helps to improve the in-vehicle safety and security from researching and engineering perspectives

    Strong Customer Authentication : Security Issues and Solution Evaluation

    Get PDF
    In October 2015 PSD2 first adopted by the European Parliament to initiate a new method of payment system. Since then, it receives several amendment time to time. Strong Customer Authentication (SCA), one of the major requirements of PSD2 came into force from September 2019. However, European Banking Authority EBA found it is challenging to comply with this requirement fully, before the given deadline. Technical implementation challenge, complex payment systems across EU, bring-in all related actors under SCA needs to be resolved with profound solution to achieve the PSD2 success. Moreover, contradictory terms of the PSD2 with GDPR and inadequate protection for the user’s privacy prevails account access issues that can be circumvented by the payment service providers. This article investigated the pros and cons of the PSD2, finds feasible solutions for SCA that seamlessly involves all actors in payment system. Despite the fact of technical implementation details, a leading PSP’s SCA compliant solution integrated into an e-invoicing system as an specimen of an SCA compliant model. The model showcases the SCA conformity then test and verifies security of data and privacy of the user

    Distributed Robotic Systems in the Edge-Cloud Continuum with ROS 2: a Review on Novel Architectures and Technology Readiness

    Full text link
    Robotic systems are more connected, networked, and distributed than ever. New architectures that comply with the \textit{de facto} robotics middleware standard, ROS\,2, have recently emerged to fill the gap in terms of hybrid systems deployed from edge to cloud. This paper reviews new architectures and technologies that enable containerized robotic applications to seamlessly run at the edge or in the cloud. We also overview systems that include solutions from extension to ROS\,2 tooling to the integration of Kubernetes and ROS\,2. Another important trend is robot learning, and how new simulators and cloud simulations are enabling, e.g., large-scale reinforcement learning or distributed federated learning solutions. This has also enabled deeper integration of continuous interaction and continuous deployment (CI/CD) pipelines for robotic systems development, going beyond standard software unit tests with simulated tests to build and validate code automatically. We discuss the current technology readiness and list the potential new application scenarios that are becoming available. Finally, we discuss the current challenges in distributed robotic systems and list open research questions in the field

    Holistic System Design for Distributed National eHealth Services

    Get PDF
    publishedVersio

    IEEE Access Special Section Editorial: Big Data Technology and Applications in Intelligent Transportation

    Get PDF
    During the last few years, information technology and transportation industries, along with automotive manufacturers and academia, are focusing on leveraging intelligent transportation systems (ITS) to improve services related to driver experience, connected cars, Internet data plans for vehicles, traffic infrastructure, urban transportation systems, traffic collaborative management, road traffic accidents analysis, road traffic flow prediction, public transportation service plan, personal travel route plans, and the development of an effective ecosystem for vehicles, drivers, traffic controllers, city planners, and transportation applications. Moreover, the emerging technologies of the Internet of Things (IoT) and cloud computing have provided unprecedented opportunities for the development and realization of innovative intelligent transportation systems where sensors and mobile devices can gather information and cloud computing, allowing knowledge discovery, information sharing, and supported decision making. However, the development of such data-driven ITS requires the integration, processing, and analysis of plentiful information obtained from millions of vehicles, traffic infrastructures, smartphones, and other collaborative systems like weather stations and road safety and early warning systems. The huge amount of data generated by ITS devices is only of value if utilized in data analytics for decision-making such as accident prevention and detection, controlling road risks, reducing traffic carbon emissions, and other applications which bring big data analytics into the picture

    Cyber-Physical Embedded Systems with Transient Supervisory Command and Control: A Framework for Validating Safety Response in Automated Collision Avoidance Systems

    Get PDF
    The ability to design and engineer complex and dynamical Cyber-Physical Systems (CPS) requires a systematic view that requires a definition of level of automation intent for the system. Since CPS covers a diverse range of systemized implementations of smart and intelligent technologies networked within a system of systems (SoS), the terms “smart” and “intelligent” is frequently used in describing systems that perform complex operations with a reduced need of a human-agent. The difference between this research and most papers in publication on CPS is that most other research focuses on the performance of the CPS rather than on the correctness of its design. However, by using both human and machine agency at different levels of automation, or autonomy, the levels of automation have profound implications and affects to the reliability and safety of the CPS. The human-agent and the machine-agent are in a tidal lock of decision-making using both feedforward and feedback information flows in similar processes, where a transient shift within the level of automation when the CPS is operating can have undesired consequences. As CPS systems become more common, and higher levels of autonomy are embedded within them, the relationship between human-agent and machine-agent also becomes more complex, and the testing methodologies for verification and validation of performance and correctness also become more complex and less clear. A framework then is developed to help the practitioner to understand the difficulties and pitfalls of CPS designs and provides guidance to test engineering design of soft computational systems using combinations of modeling, simulation, and prototyping

    Evolving Bitcoin Custody

    Full text link
    The broad topic of this thesis is the design and analysis of Bitcoin custody systems. Both the technology and threat landscape are evolving constantly. Therefore, custody systems, defence strategies, and risk models should be adaptive too. We introduce Bitcoin custody by describing the different types, design principles, phases and functions of custody systems. We review the technology stack of these systems and focus on the fundamentals; key-management and privacy. We present a perspective we call the systems view. It is an attempt to capture the full complexity of a custody system, including technology, people, and processes. We review existing custody systems and standards. We explore Bitcoin covenants. This is a mechanism to enforce constraints on transaction sequences. Although previous work has proposed how to construct and apply Bitcoin covenants, these require modifying the consensus rules of Bitcoin, a notoriously difficult task. We introduce the first detailed exposition and security analysis of a deleted-key covenant protocol, which is compatible with current consensus rules. We demonstrate a range of security models for deleted-key covenants which seem practical, in particular, when applied in autonomous (user-controlled) custody systems. We conclude with a comparative analysis with previous proposals. Covenants are often proclaimed to be an important primitive for custody systems, but no complete design has been proposed to validate that claim. To address this, we propose an autonomous custody system called Ajolote which uses deleted-key covenants to enforce a vault sequence. We evaluate Ajolote with; a model of its state dynamics, a privacy analysis, and a risk model. We propose a threat model for custody systems which captures a realistic attacker for a system with offline devices and user-verification. We perform ceremony analysis to construct the risk model.Comment: PhD thesi

    FUEL OR FIZZLE: THE ROLE OF COLLABORATION NETWORK CENTRALITY ON TEACHER BURNOUT

    Get PDF
    Professional burnout refers to the development of negative emotions, cynical thoughts, and physical and mental exhaustion as a response to stressors associated with one’s career. Within the teaching profession, professional burnout has been associated with an increase in teacher attrition. In an effort to promote a positive school environment where teachers feel supported and committed to the profession, many administrators have implemented structured collaborative opportunities within their buildings. While personal relationships within the school network can provide a mitigating effect against professional burnout, the possibility exists that teacher leaders can be overcentralized and negatively impacted by the maintained relationships. By potentially forcing centralization on critical team members and emphasizing them as the “go-to” person for collaboration, schools may be inadvertently putting their best at risk for burnout. Using a mixed-methods design, the following study investigates the perceived benefits and constraints of centrality within the school network on reported burnout. The social networks at four elementary schools were analyzed to determine the level of connectivity for each certified staff member. Participants were asked to identify the colleagues with whom they collaborate. Using Social Network Analysis, the level of centrality (as measured by number of network connections both received and directed) was calculated for each participant based on number of network ties both received and directed. Centrality scores were included with previously identified variables associated with teacher burnout including level of perceived stress, perception of school environment, principal support, and other demographic data in a series of hypothesis tests to assess the relationship between network connectivity and reported burnout. A series of semi-structured interviews were conducted with a selection of participants to further explore the impact of network connections on participant burnout. The results of this exploratory study found that not all collegial relationships are beneficial. A significant positive relationship between number of collaborative ties directed toward a teacher and their depersonalization score on the Maslach Burnout Inventory was identified, indicating that individuals who are frequently identified as a collaborator report higher burnout. The findings from this study produce a unique perspective on collaboration within the school network. As has been reported previously, level of connectivity within the school network as measured by the number of teachers one can identify as collaborators appears to mitigate (or not significantly increase) a teacher’s risk of professional burnout. However, being identified as a collaborator by a large number of teachers (in-degree) significantly increases one’s risk for depersonalization behaviors

    A Journal-Driven Bibliography of Digital Humanities

    Get PDF
    Digital Humanities Quarterly (DHQ) seeks Level II funding to develop a bibliographic resource through which the journal can create, manage, export, and publish high-quality bibliographic data from DHQ articles and their citations, as well as from the broader digital humanities research domain. Drawing on data from this resource, we will develop visualizations through which readers can explore citation networks and find related articles. We will also publish the full bibliography as a public web-based service that reflects the profile of current digital humanities research. The bibliography will be maintained and expanded through incoming DHQ articles and citations, and through contributions from the DH community. DHQ is an open-access online journal published by the Alliance of Digital Humanities Organizations (ADHO), hosted at Brown University and Indiana University, and serves as a crucial point of encounter between digital humanities research and the wider humanities community
    • …
    corecore