3,145 research outputs found
Cyberattacks and Countermeasures For In-Vehicle Networks
As connectivity between and within vehicles increases, so does concern about
safety and security. Various automotive serial protocols are used inside
vehicles such as Controller Area Network (CAN), Local Interconnect Network
(LIN) and FlexRay. CAN bus is the most used in-vehicle network protocol to
support exchange of vehicle parameters between Electronic Control Units (ECUs).
This protocol lacks security mechanisms by design and is therefore vulnerable
to various attacks. Furthermore, connectivity of vehicles has made the CAN bus
not only vulnerable from within the vehicle but also from outside. With the
rise of connected cars, more entry points and interfaces have been introduced
on board vehicles, thereby also leading to a wider potential attack surface.
Existing security mechanisms focus on the use of encryption, authentication and
vehicle Intrusion Detection Systems (IDS), which operate under various
constrains such as low bandwidth, small frame size (e.g. in the CAN protocol),
limited availability of computational resources and real-time sensitivity. We
survey In-Vehicle Network (IVN) attacks which have been grouped under: direct
interfaces-initiated attacks, telematics and infotainment-initiated attacks,
and sensor-initiated attacks. We survey and classify current cryptographic and
IDS approaches and compare these approaches based on criteria such as real time
constrains, types of hardware used, changes in CAN bus behaviour, types of
attack mitigation and software/ hardware used to validate these approaches. We
conclude with potential mitigation strategies and research challenges for the
future
A comprehensive survey of V2X cybersecurity mechanisms and future research paths
Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity come inadvertently with challenges which involve security vulnerabilities and breaches. Addressing security concerns is essential for seamless and safe operation of mission-critical V2X use cases. This paper surveys current literature on V2X security and provides a systematic and comprehensive review of the most relevant security enhancements to date. An in-depth classification of V2X attacks is first performed according to key security and privacy requirements. Our methodology resumes with a taxonomy of security mechanisms based on their proactive/reactive defensive approach, which helps identify strengths and limitations of state-of-the-art countermeasures for V2X attacks. In addition, this paper delves into the potential of emerging security approaches leveraging artificial intelligence tools to meet security objectives. Promising data-driven solutions tailored to tackle security, privacy and trust issues are thoroughly discussed along with new threat vectors introduced inevitably by these enablers. The lessons learned from the detailed review of existing works are also compiled and highlighted. We conclude this survey with a structured synthesis of open challenges and future research directions to foster contributions in this prominent field.This work is supported by the H2020-INSPIRE-5Gplus project (under Grant agreement No. 871808), the ”Ministerio de Asuntos Económicos y Transformacion Digital” and the European Union-NextGenerationEU in the frameworks of the ”Plan de Recuperación, Transformación y Resiliencia” and of the ”Mecanismo de Recuperación y Resiliencia” under references TSI-063000-2021-39/40/41, and the CHIST-ERA-17-BDSI-003 FIREMAN project funded by the Spanish National Foundation (Grant PCI2019-103780).Peer ReviewedPostprint (published version
Propulsion Health Monitoring of a Turbine Engine Disk Using Spin Test Data
This paper considers data collected from an experimental study using high frequency capacitive sensor technology to capture blade tip clearance and tip timing measurements in a rotating turbine engine-like-disk-to predict the disk faults and assess its structural integrity. The experimental results collected at a range of rotational speeds from tests conducted at the NASA Glenn Research Center s Rotordynamics Laboratory are evaluated using multiple data-driven anomaly detection techniques to identify abnormalities in the disk. Further, this study presents a select evaluation of an online health monitoring scheme of a rotating disk using high caliber sensors and test the capability of the in-house spin system
Center for Advanced Space Propulsion Second Annual Technical Symposium Proceedings
The proceedings for the Center for Advanced Space Propulsion Second Annual Technical Symposium are divided as follows: Chemical Propulsion, CFD; Space Propulsion; Electric Propulsion; Artificial Intelligence; Low-G Fluid Management; and Rocket Engine Materials
The challenges and opportunities of artificial intelligence in implementing trustworthy robotics and autonomous systems
Effective Robots and Autonomous Systems (RAS) must be trustworthy. Trust is essential in designing autonomous and semi-autonomous technologies, because “No trust, no use”. RAS should provide high quality of services, with the four key properties that make it trust, i.e. they must be (i) robust for any health issues, (ii) safe for any matters in their surrounding environments, (iii) secure for any threats from cyber spaces, and (iv) trusted for human-machine interaction. We have thoroughly analysed the challenges in implementing the trustworthy RAS in respects of the four properties, and addressed the power of AI in improving the trustworthiness of RAS. While we put our eyes on the benefits that AI brings to human, we should realise the potential risks that could be caused by AI. The new concept of human-centred AI will be the core in implementing the trustworthy RAS. This review could provide a brief reference for the research on AI for trustworthy RAS
Data semantic enrichment for complex event processing over IoT Data Streams
This thesis generalizes techniques for processing IoT data streams, semantically enrich data with contextual information, as well as complex event processing in IoT applications. A case study for ECG anomaly detection and signal classification was conducted to validate the knowledge foundation
CPS Data Streams Analytics based on Machine Learning for Cloud and Fog Computing: A Survey
Cloud and Fog computing has emerged as a promising paradigm for the Internet of things (IoT) and cyber-physical systems (CPS). One characteristic of CPS is the reciprocal feedback loops between physical processes and cyber elements (computation, software and networking), which implies that data stream analytics is one of the core components of CPS. The reasons for this are: (i) it extracts the insights and the knowledge from the data streams generated by various sensors and other monitoring components embedded in the physical systems; (ii) it supports informed decision making; (iii) it enables feedback from the physical processes to the cyber counterparts; (iv) it eventually facilitates the integration of cyber and physical systems. There have been many successful applications of data streams analytics, powered by machine learning techniques, to CPS systems. Thus, it is necessary to have a survey on the particularities of the application of machine learning techniques to the CPS domain. In particular, we explore how machine learning methods should be deployed and integrated in cloud and fog architectures for better fulfilment of the requirements, e.g. mission criticality and time criticality, arising in CPS domains. To the best of our knowledge, this paper is the first to systematically study machine learning techniques for CPS data stream analytics from various perspectives, especially from a perspective that leads to the discussion and guidance of how the CPS machine learning methods should be deployed in a cloud and fog architecture
- …