43 research outputs found

    An intelligent intrusion detection system for external communications in autonomous vehicles

    Get PDF
    Advancements in computing, electronics and mechanical systems have resulted in the creation of a new class of vehicles called autonomous vehicles. These vehicles function using sensory input with an on-board computation system. Self-driving vehicles use an ad hoc vehicular network called VANET. The network has ad hoc infrastructure with mobile vehicles that communicate through open wireless channels. This thesis studies the design and implementation of a novel intelligent intrusion detection system which secures the external communication of self-driving vehicles. This thesis makes the following four contributions: It proposes a hybrid intrusion detection system to protect the external communication in self-driving vehicles from potential attacks. This has been achieved using fuzzification and artificial intelligence. The second contribution is the incorporation of the Integrated Circuit Metrics (ICMetrics) for improved security and privacy. By using the ICMetrics, specific device features have been used to create a unique identity for vehicles. Our work is based on using the bias in on board sensory systems to create ICMetrics for self-driving vehicles. The incorporation of fuzzy petri net in autonomous vehicles is the third contribution of the thesis. Simulation results show that the scheme can successfully detect denial-of-service attacks. The design of a clustering based hierarchical detection system has also been presented to detect worm hole and Sybil attacks. The final contribution of this research is an integrated intrusion detection system which detects various attacks by using a central database in BusNet. The proposed schemes have been simulated using the data extracted from trace files. Simulation results have been compared and studied for high levels of detection capability and performance. Analysis shows that the proposed schemes provide high detection rate with a low rate of false alarm. The system can detect various attacks in an optimised way owing to a reduction in the number of features, fuzzification

    A systematic literature review on the relationship between autonomous vehicle technology and traffic-related mortality.

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ํ–‰์ •๋Œ€ํ•™์› ๊ธ€๋กœ๋ฒŒํ–‰์ •์ „๊ณต, 2023. 2. ์ตœํƒœํ˜„.The society is anticipated to gain a lot from Autonomous Vehicles (AV), such as improved traffic flow and a decrease in accidents. They heavily rely on improvements in various Artificial Intelligence (AI) processes and strategies. Though some researchers in this field believe AV is the key to enhancing safety, others believe AV creates new challenges when it comes to ensuring the security of these new technology/systems and applications. The article conducts a systematic literature review on the relationship between autonomous vehicle technology and traffic-related mortality. According to inclusion and exclusion criteria, articles from EBSCO, ProQuest, IEEE Explorer, Web of Science were chosen, and they were then sorted. The findings reveal that the most of these publications have been published in advanced transport-related journals. Future improvements in the automobile industry and the development of intelligent transportation systems could help reduce the number of fatal traffic accidents. Technologies for autonomous cars provide effective ways to enhance the driving experience and reduce the number of traffic accidents. A multitude of driving-related problems, such as crashes, traffic, energy usage, and environmental pollution, will be helped by autonomous driving technology. More research is needed for the significant majority of the studies that were assessed. They need to be expanded so that they can be tested in real-world or computer-simulated scenarios, in better and more realistic scenarios, with better and more data, and in experimental designs where the results of the proposed strategy are compared to those of industry standards and competing strategies. Therefore, additional study with improved methods is needed. Another major area that requires additional research is the moral and ethical choices made by AVs. Government, policy makers, manufacturers, and designers all need to do many actions in order to deploy autonomous vehicles on the road effectively. The government should develop laws, rules, and an action plan in particular. It is important to create more effective programs that might encourage the adoption of emerging technology in transportation systems, such as driverless vehicles. In this regard, user perception becomes essential since it may inform designers about current issues and observations made by people. The perceptions of autonomous car users in developing countries like Azerbaijan haven't been thoroughly studied up to this point. The manufacturer has to fix the system flaw and needs a good data set for efficient operation. In the not-too-distant future, the widespread use of highly automated vehicles (AVs) may open up intriguing new possibilities for resolving persistent issues in current safety-related research. Further research is required to better understand and quantify the significant policy implications of Avs, taking into consideration factors like penetration rate, public adoption, technological advancements, traffic patterns, and business models. It only needs to take into account peer-reviewed, full-text journal papers for the investigation, but it's clear that a larger database and more documents would provide more results and a more thorough analysis.์ž์œจ์ฃผํ–‰์ฐจ(AV)๋ฅผ ํ†ตํ•ด ๊ตํ†ต ํ๋ฆ„์ด ๊ฐœ์„ ๋˜๊ณ  ์‚ฌ๊ณ ๊ฐ€ ์ค„์–ด๋“œ๋Š” ๋“ฑ ์‚ฌํšŒ๊ฐ€ ์–ป๋Š” ๊ฒƒ์ด ๋งŽ์„ ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ๊ทธ๋“ค์€ ๋‹ค์–‘ํ•œ ์ธ๊ณต์ง€๋Šฅ(AI) ํ”„๋กœ์„ธ์Šค์™€ ์ „๋žต์˜ ๊ฐœ์„ ์— ํฌ๊ฒŒ ์˜์กดํ•œ๋‹ค. ์ด ๋ถ„์•ผ์˜ ์ผ๋ถ€ ์—ฐ๊ตฌ์ž๋“ค์€ AV๊ฐ€ ์•ˆ์ „์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š” ์—ด์‡ ๋ผ๊ณ  ๋ฏฟ์ง€๋งŒ, ๋‹ค๋ฅธ ์—ฐ๊ตฌ์ž๋“ค์€ AV๊ฐ€ ์ด๋Ÿฌํ•œ ์ƒˆ๋กœ์šด ๊ธฐ์ˆ /์‹œ์Šคํ…œ ๋ฐ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋ณด์•ˆ์„ ๋ณด์žฅํ•˜๋Š” ๊ฒƒ๊ณผ ๊ด€๋ จํ•˜์—ฌ ์ƒˆ๋กœ์šด ๋ฌธ์ œ๋ฅผ ์•ผ๊ธฐํ•œ๋‹ค๊ณ  ๋ฏฟ๋Š”๋‹ค. ์ด ๋…ผ๋ฌธ์€ ์ž์œจ์ฃผํ–‰์ฐจ ๊ธฐ์ˆ ๊ณผ ๊ตํ†ต ๊ด€๋ จ ์‚ฌ๋ง๋ฅ  ์‚ฌ์ด์˜ ๊ด€๊ณ„์— ๋Œ€ํ•œ ์ฒด๊ณ„์ ์ธ ๋ฌธํ—Œ ๊ฒ€ํ† ๋ฅผ ์ˆ˜ํ–‰ํ•œ๋‹ค. ํฌํ•จ ๋ฐ ์ œ์™ธ ๊ธฐ์ค€์— ๋”ฐ๋ผ EBSCO, ProQuest, IEEE Explorer ๋ฐ Web of Science์˜ ๊ธฐ์‚ฌ๋ฅผ ์„ ํƒํ•˜๊ณ  ๋ถ„๋ฅ˜ํ–ˆ๋‹ค.์—ฐ๊ตฌ ๊ฒฐ๊ณผ๋Š” ์ด๋Ÿฌํ•œ ์ถœํŒ๋ฌผ์˜ ๋Œ€๋ถ€๋ถ„์ด ๊ณ ๊ธ‰ ์šด์†ก ๊ด€๋ จ ์ €๋„์— ๊ฒŒ์žฌ๋˜์—ˆ์Œ์„ ๋ณด์—ฌ์ค€๋‹ค. ๋ฏธ๋ž˜์˜ ์ž๋™์ฐจ ์‚ฐ์—…์˜ ๊ฐœ์„ ๊ณผ ์ง€๋Šฅํ˜• ๊ตํ†ต ์‹œ์Šคํ…œ์˜ ๊ฐœ๋ฐœ์€ ์น˜๋ช…์ ์ธ ๊ตํ†ต ์‚ฌ๊ณ ์˜ ์ˆ˜๋ฅผ ์ค„์ด๋Š” ๋ฐ ๋„์›€์ด ๋  ์ˆ˜ ์žˆ๋‹ค. ์ž์œจ์ฃผํ–‰ ์ž๋™์ฐจ ๊ธฐ์ˆ ์€ ์šด์ „ ๊ฒฝํ—˜์„ ํ–ฅ์ƒ์‹œํ‚ค๊ณ  ๊ตํ†ต ์‚ฌ๊ณ ์˜ ์ˆ˜๋ฅผ ์ค„์ผ ์ˆ˜ ์žˆ๋Š” ํšจ๊ณผ์ ์ธ ๋ฐฉ๋ฒ•์„ ์ œ๊ณตํ•œ๋‹ค. ์ถฉ๋Œ, ๊ตํ†ต, ์—๋„ˆ์ง€ ์‚ฌ์šฉ, ํ™˜๊ฒฝ ์˜ค์—ผ๊ณผ ๊ฐ™์€ ์ˆ˜๋งŽ์€ ์šด์ „ ๊ด€๋ จ ๋ฌธ์ œ๋“ค์€ ์ž์œจ ์ฃผํ–‰ ๊ธฐ์ˆ ์— ์˜ํ•ด ๋„์›€์„ ๋ฐ›์„ ๊ฒƒ์ด๋‹ค. ํ‰๊ฐ€๋œ ๋Œ€๋ถ€๋ถ„์˜ ์—ฐ๊ตฌ์— ๋Œ€ํ•ด ๋” ๋งŽ์€ ์—ฐ๊ตฌ๊ฐ€ ํ•„์š”ํ•˜๋‹ค. ์‹ค์ œ ๋˜๋Š” ์ปดํ“จํ„ฐ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ์‹œ๋‚˜๋ฆฌ์˜ค, ๋” ์ข‹๊ณ  ํ˜„์‹ค์ ์ธ ์‹œ๋‚˜๋ฆฌ์˜ค, ๋” ์ข‹๊ณ  ๋” ๋งŽ์€ ๋ฐ์ดํ„ฐ, ๊ทธ๋ฆฌ๊ณ  ์ œ์•ˆ๋œ ์ „๋žต ๊ฒฐ๊ณผ๊ฐ€ ์‚ฐ์—… ํ‘œ์ค€ ๋ฐ ๊ฒฝ์Ÿ ์ „๋žต์˜ ๊ฒฐ๊ณผ์™€ ๋น„๊ต๋˜๋Š” ์‹คํ—˜ ์„ค๊ณ„์—์„œ ํ…Œ์ŠคํŠธ๋  ์ˆ˜ ์žˆ๋„๋ก ํ™•์žฅ๋˜์–ด์•ผ ํ•œ๋‹ค. ๋”ฐ๋ผ์„œ ๊ฐœ์„ ๋œ ๋ฐฉ๋ฒ•์— ๋Œ€ํ•œ ์ถ”๊ฐ€ ์—ฐ๊ตฌ๊ฐ€ ํ•„์š”ํ•˜๋‹ค. ์ถ”๊ฐ€ ์—ฐ๊ตฌ๊ฐ€ ํ•„์š”ํ•œ ๋˜ ๋‹ค๋ฅธ ์ฃผ์š” ๋ถ„์•ผ๋Š” AV์˜ ๋„๋•์ , ์œค๋ฆฌ์  ์„ ํƒ์ด๋‹ค. ์ •๋ถ€, ์ •์ฑ… ์ž…์•ˆ์ž, ์ œ์กฐ์—…์ฒด ๋ฐ ์„ค๊ณ„์ž๋Š” ๋ชจ๋‘ ์ž์œจ ์ฃผํ–‰ ์ฐจ๋Ÿ‰์„ ํšจ๊ณผ์ ์œผ๋กœ ๋„๋กœ์— ๋ฐฐ์น˜ํ•˜๊ธฐ ์œ„ํ•ด ๋งŽ์€ ์กฐ์น˜๋ฅผ ์ทจํ•ด์•ผ ํ•œ๋‹ค. ์ •๋ถ€๋Š” ํŠนํžˆ ๋ฒ•, ๊ทœ์น™, ์‹คํ–‰ ๊ณ„ํš์„ ๊ฐœ๋ฐœํ•ด์•ผ ํ•œ๋‹ค. ์šด์ „์ž ์—†๋Š” ์ฐจ๋Ÿ‰๊ณผ ๊ฐ™์€ ์šด์†ก ์‹œ์Šคํ…œ์—์„œ ์ƒˆ๋กœ์šด ๊ธฐ์ˆ ์˜ ์ฑ„ํƒ์„ ์žฅ๋ คํ•  ์ˆ˜ ์žˆ๋Š” ๋ณด๋‹ค ํšจ๊ณผ์ ์ธ ํ”„๋กœ๊ทธ๋žจ์„ ๋งŒ๋“œ๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•˜๋‹ค. ์ด์™€ ๊ด€๋ จํ•˜์—ฌ, ์„ค๊ณ„์ž์—๊ฒŒ ํ˜„์žฌ ์ด์Šˆ์™€ ์‚ฌ๋žŒ์— ์˜ํ•œ ๊ด€์ฐฐ์„ ์•Œ๋ ค์ค„ ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ์‚ฌ์šฉ์ž ์ธ์‹์ด ํ•„์ˆ˜์ ์ด ๋œ๋‹ค.์ œ์กฐ์—…์ฒด๋Š” ์‹œ์Šคํ…œ ๊ฒฐํ•จ์„ ์ˆ˜์ •ํ•ด์•ผ ํ•˜๋ฉฐ ํšจ์œจ์ ์ธ ์ž‘๋™์„ ์œ„ํ•ด ์ข‹์€ ๋ฐ์ดํ„ฐ ์„ธํŠธ๊ฐ€ ํ•„์š”ํ•˜๋‹ค. ๋ฉ€์ง€ ์•Š์€ ๋ฏธ๋ž˜์—, ๊ณ ๋„๋กœ ์ž๋™ํ™”๋œ ์ฐจ๋Ÿ‰(AV)์˜ ๊ด‘๋ฒ”์œ„ํ•œ ์‚ฌ์šฉ์€ ํ˜„์žฌ์˜ ์•ˆ์ „ ๊ด€๋ จ ์—ฐ๊ตฌ์—์„œ ์ง€์†์ ์ธ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ํฅ๋ฏธ๋กœ์šด ์ƒˆ๋กœ์šด ๊ฐ€๋Šฅ์„ฑ์„ ์—ด์–ด์ค„ ์ˆ˜ ์žˆ๋‹ค. ๋ณด๊ธ‰๋ฅ , ๊ณต๊ณต ์ฑ„ํƒ, ๊ธฐ์ˆ  ๋ฐœ์ „, ๊ตํ†ต ํŒจํ„ด ๋ฐ ๋น„์ฆˆ๋‹ˆ์Šค ๋ชจ๋ธ๊ณผ ๊ฐ™์€ ์š”์†Œ๋ฅผ ๊ณ ๋ คํ•˜์—ฌ Avs์˜ ์ค‘์š”ํ•œ ์ •์ฑ… ์˜ํ–ฅ์„ ๋” ์ž˜ ์ดํ•ดํ•˜๊ณ  ์ •๋Ÿ‰ํ™”ํ•˜๊ธฐ ์œ„ํ•œ ์ถ”๊ฐ€ ์—ฐ๊ตฌ๊ฐ€ ํ•„์š”ํ•˜๋‹ค. ์กฐ์‚ฌ๋ฅผ ์œ„ํ•ด ๋™๋ฃŒ ๊ฒ€ํ† ๋ฅผ ๊ฑฐ์นœ ์ „๋ฌธ ์ €๋„ ๋…ผ๋ฌธ๋งŒ ๊ณ ๋ คํ•˜๋ฉด ๋˜์ง€๋งŒ, ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๊ฐ€ ์ปค์ง€๊ณ  ๋ฌธ์„œ๊ฐ€ ๋งŽ์•„์ง€๋ฉด ๋” ๋งŽ์€ ๊ฒฐ๊ณผ์™€ ๋” ์ฒ ์ €ํ•œ ๋ถ„์„์ด ์ œ๊ณต๋  ๊ฒƒ์ด ๋ถ„๋ช…ํ•˜๋‹ค.Abstract 3 Table of Contents 6 List of Tables 7 List of Figures 7 List of Appendix 7 CHAPTER 1: INTRODUCTION 8 1.1. Background 8 1.2. Purpose of Research 13 CHAPTER 2: AUTONOMOUS VEHICLES 21 2.1. Intelligent Traffic Systems 21 2.2. System Architecture for Autonomous Vehicles 22 2.3. Key components in AV classification 27 CHAPTER 3: METHODOLOGY AND DATA COLLECTION PROCEDURE 35 CHAPTER 4: FINDINGS AND DISCUSSION 39 4.1. RQ1: Do autonomous vehicles reduce traffic-related deaths 40 4.2. RQ2: Are there any challenges to using autonomous vehicles 63 4.3. RQ3: As a developing country, how effective is the use of autonomous vehicles for reducing traffic mortality 72 CHAPTER 5: CONCLUSION 76 5.1. Summary 76 5.2. Implications and Recommendations 80 5.3. Limitation of the study 91 Bibliography 93 List of Tables Table 1: The 6 Levels of Autonomous Vehicles Table 2: Search strings Table 3: Inclusion and exclusion criteria List of Figures Figure 1: Traffic Death Comparison with Europe Figure 2: Research strategy and study selection process List of Appendix Appendix 1: List of selected articles์„

    Lightweight mutual authentication and privacy preservation schemes for IOT systems.

    Get PDF
    Internet of Things (IoT) presents a holistic and transformative approach for providing services in different domains. IoT creates an atmosphere of interaction between humans and the surrounding physical world through various technologies such as sensors, actuators, and the cloud. Theoretically, when everything is connected, everything is at risk. The rapid growth of IoT with the heterogeneous devices that are connected to the Internet generates new challenges in protecting and preserving userโ€™s privacy and ensuring the security of our lives. IoT systems face considerable challenges in deploying robust authentication protocols because some of the IoT devices are resource-constrained with limited computation and storage capabilities to implement the currently available authentication mechanism that employs computationally expensive functions. The limited capabilities of IoT devices raise significant security and privacy concerns, such as ensuring personal information confidentiality and integrity and establishing end-to-end authentication and secret key generation between the communicating device to guarantee secure communication among the communicating devices. The ubiquity nature of the IoT device provides adversaries more attack surfaces which can lead to tragic consequences that can negatively impact our everyday connected lives. According to [1], authentication and privacy protection are essential security requirements. Therefore, there is a critical need to address these rising security and privacy concerns to ensure IoT systems\u27 safety. This dissertation identifies gaps in the literature and presents new mutual authentication and privacy preservation schemes that fit the needs of resource-constrained devices to improve IoT security and privacy against common attacks. This research enhances IoT security and privacy by introducing lightweight mutual authentication and privacy preservation schemes for IoT based on hardware biometrics using PUF, Chained hash PUF, dynamic identities, and userโ€™s static and continuous biometrics. The communicating parties can anonymously communicate and mutually authenticate each other and locally establish a session key using dynamic identities to ensure the userโ€™s unlinkability and untraceability. Furthermore, virtual domain segregation is implemented to apply security policies between nodes. The chained-hash PUF mechanism technique is implemented as a way to verify the senderโ€™s identity. At first, this dissertation presents a framework called โ€œA Lightweight Mutual Authentication and Privacy-Preservation framework for IoT Systemsโ€ and this framework is considered the foundation of all presented schemes. The proposed framework integrates software and hardware-based security approaches that satisfy the NIST IoT security requirements for data protection and device identification. Also, this dissertation presents an architecture called โ€œPUF Hierarchal Distributed Architectureโ€ (PHDA), which is used to perform the device name resolution. Based on the proposed framework and PUF architecture, three lightweight privacy-preserving and mutual authentication schemes are presented. The Three different schemes are introduced to accommodate both stationary and mobile IoT devices as well as local and distributed nodes. The first scheme is designed for the smart homes domain, where the IoT devices are stationary, and the controller node is local. In this scheme, there is direct communication between the IoT nodes and the controller node. Establishing mutual authentication does not require the cloud service\u27s involvement to reduce the system latency and offload the cloud traffic. The second scheme is designed for the industrial IoT domain and used smart poultry farms as a use case of the Industrial IoT (IIoT) domain. In the second scheme, the IoT devices are stationary, and the controller nodes are hierarchical and distributed, supported by machine-to-machine (M2M) communication. The third scheme is designed for smart cities and used IoV fleet vehicles as a use case of the smart cities domain. During the roaming service, the mutual authentication process between a vehicle and the distributed controller nodes represented by the Roadside Units (RSUs) is completed through the cloud service that stores all vehicle\u27s security credentials. After that, when a vehicle moves to the proximity of a new RSU under the same administrative authority of the most recently visited RSU, the two RSUs can cooperate to verify the vehicle\u27s legitimacy. Also, the third scheme supports driver static and continuous authentication as a driver monitoring system for the sake of both road and driver safety. The security of the proposed schemes is evaluated and simulated using two different methods: security analysis and performance analysis. The security analysis is implemented through formal security analysis and informal security analysis. The formal analysis uses the Burrowsโ€“Abadiโ€“Needham logic (BAN) and model-checking using the automated validation of Internet security protocols and applications (AVISPA) toolkit. The informal security analysis is completed by: (1) investigating the robustness of the proposed schemes against the well-known security attacks and analyze its satisfaction with the main security properties; and (2) comparing the proposed schemes with the other existing authentication schemes considering their resistance to the well-known attacks and their satisfaction with the main security requirements. Both the formal and informal security analyses complement each other. The performance evaluation is conducted by analyzing and comparing the overhead and efficiency of the proposed schemes with other related schemes from the literature. The results showed that the proposed schemes achieve all security goals and, simultaneously, efficiently and satisfy the needs of the resource-constrained IoT devices

    State of the art of audio- and video based solutions for AAL

    Get PDF
    Working Group 3. Audio- and Video-based AAL ApplicationsIt is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living (AAL) technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred to as the use of innovative and advanced Information and Communication Technologies to create supportive, inclusive and empowering applications and environments that enable older, impaired or frail people to live independently and stay active longer in society. AAL capitalizes on the growing pervasiveness and effectiveness of sensing and computing facilities to supply the persons in need with smart assistance, by responding to their necessities of autonomy, independence, comfort, security and safety. The application scenarios addressed by AAL are complex, due to the inherent heterogeneity of the end-user population, their living arrangements, and their physical conditions or impairment. Despite aiming at diverse goals, AAL systems should share some common characteristics. They are designed to provide support in daily life in an invisible, unobtrusive and user-friendly manner. Moreover, they are conceived to be intelligent, to be able to learn and adapt to the requirements and requests of the assisted people, and to synchronise with their specific needs. Nevertheless, to ensure the uptake of AAL in society, potential users must be willing to use AAL applications and to integrate them in their daily environments and lives. In this respect, video- and audio-based AAL applications have several advantages, in terms of unobtrusiveness and information richness. Indeed, cameras and microphones are far less obtrusive with respect to the hindrance other wearable sensors may cause to oneโ€™s activities. In addition, a single camera placed in a room can record most of the activities performed in the room, thus replacing many other non-visual sensors. Currently, video-based applications are effective in recognising and monitoring the activities, the movements, and the overall conditions of the assisted individuals as well as to assess their vital parameters (e.g., heart rate, respiratory rate). Similarly, audio sensors have the potential to become one of the most important modalities for interaction with AAL systems, as they can have a large range of sensing, do not require physical presence at a particular location and are physically intangible. Moreover, relevant information about individualsโ€™ activities and health status can derive from processing audio signals (e.g., speech recordings). Nevertheless, as the other side of the coin, cameras and microphones are often perceived as the most intrusive technologies from the viewpoint of the privacy of the monitored individuals. This is due to the richness of the information these technologies convey and the intimate setting where they may be deployed. Solutions able to ensure privacy preservation by context and by design, as well as to ensure high legal and ethical standards are in high demand. After the review of the current state of play and the discussion in GoodBrother, we may claim that the first solutions in this direction are starting to appear in the literature. A multidisciplinary 4 debate among experts and stakeholders is paving the way towards AAL ensuring ergonomics, usability, acceptance and privacy preservation. The DIANA, PAAL, and VisuAAL projects are examples of this fresh approach. This report provides the reader with a review of the most recent advances in audio- and video-based monitoring technologies for AAL. It has been drafted as a collective effort of WG3 to supply an introduction to AAL, its evolution over time and its main functional and technological underpinnings. In this respect, the report contributes to the field with the outline of a new generation of ethical-aware AAL technologies and a proposal for a novel comprehensive taxonomy of AAL systems and applications. Moreover, the report allows non-technical readers to gather an overview of the main components of an AAL system and how these function and interact with the end-users. The report illustrates the state of the art of the most successful AAL applications and functions based on audio and video data, namely (i) lifelogging and self-monitoring, (ii) remote monitoring of vital signs, (iii) emotional state recognition, (iv) food intake monitoring, activity and behaviour recognition, (v) activity and personal assistance, (vi) gesture recognition, (vii) fall detection and prevention, (viii) mobility assessment and frailty recognition, and (ix) cognitive and motor rehabilitation. For these application scenarios, the report illustrates the state of play in terms of scientific advances, available products and research project. The open challenges are also highlighted. The report ends with an overview of the challenges, the hindrances and the opportunities posed by the uptake in real world settings of AAL technologies. In this respect, the report illustrates the current procedural and technological approaches to cope with acceptability, usability and trust in the AAL technology, by surveying strategies and approaches to co-design, to privacy preservation in video and audio data, to transparency and explainability in data processing, and to data transmission and communication. User acceptance and ethical considerations are also debated. Finally, the potentials coming from the silver economy are overviewed.publishedVersio

    Towards perceptual intelligence : statistical modeling of human individual and interactive behaviors

    Get PDF
    Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Architecture, 2000.Includes bibliographical references (p. 279-297).This thesis presents a computational framework for the automatic recognition and prediction of different kinds of human behaviors from video cameras and other sensors, via perceptually intelligent systems that automatically sense and correctly classify human behaviors, by means of Machine Perception and Machine Learning techniques. In the thesis I develop the statistical machine learning algorithms (dynamic graphical models) necessary for detecting and recognizing individual and interactive behaviors. In the case of the interactions two Hidden Markov Models (HMMs) are coupled in a novel architecture called Coupled Hidden Markov Models (CHMMs) that explicitly captures the interactions between them. The algorithms for learning the parameters from data as well as for doing inference with those models are developed and described. Four systems that experimentally evaluate the proposed paradigm are presented: (1) LAFTER, an automatic face detection and tracking system with facial expression recognition; (2) a Tai-Chi gesture recognition system; (3) a pedestrian surveillance system that recognizes typical human to human interactions; (4) and a SmartCar for driver maneuver recognition. These systems capture human behaviors of different nature and increasing complexity: first, isolated, single-user facial expressions, then, two-hand gestures and human-to-human interactions, and finally complex behaviors where human performance is mediated by a machine, more specifically, a car. The metric that is used for quantifying the quality of the behavior models is their accuracy: how well they are able to recognize the behaviors on testing data. Statistical machine learning usually suffers from lack of data for estimating all the parameters in the models. In order to alleviate this problem, synthetically generated data are used to bootstrap the models creating 'prior models' that are further trained using much less real data than otherwise it would be required. The Bayesian nature of the approach let us do so. The predictive power of these models lets us categorize human actions very soon after the beginning of the action. Because of the generic nature of the typical behaviors of each of the implemented systems there is a reason to believe that this approach to modeling human behavior would generalize to other dynamic human-machine systems. This would allow us to recognize automatically people's intended action, and thus build control systems that dynamically adapt to suit the human's purposes better.by Nuria M. Oliver.Ph.D

    A Detection and Mitigation System for Unintended Acceleration: An Integrated Hybrid Data-driven and Model-based Approach

    Get PDF
    This study presents an integrated hybrid data-driven and model-based approach to detecting abnormal driving conditions. Vehicle data (e.g., velocity and gas pedal position) and traffic data (e.g., positions and velocities of cars nearby) are proposed for use in the detection process. In this study, the abnormal driving condition mainly refers to unintended acceleration (UA), which is the unintended, unexpected, uncontrolled acceleration of a vehicle. It is often accompanied by an apparent loss of braking effectiveness. UA has become one of the most complained-about vehicle problems in recent history. The data-driven algorithm aims to use historical data to develop a model that describes the boundary between normal and abnormal vehicle behavior in the vehicle data space. At first, several detection models were created by analyzing historical vehicle data at specific moments such as acceleration peaks and gear shifting. After that, these models were incorporated into a detection system. The system decided if a UA event had occurred by sending real-time vehicle data to the models and comprehensively analyzing their diagnostic results. Besides the data-driven algorithm, a driver model-based approach is proposed. An adaptive and rational driver model based on game theory was developed for a human driver. It was combined with a vehicle model to predict future vehicle behavior. The differences between real driving behavior and predicted driving behavior were recorded and analyzed by the detection system. An unusually large difference indicated a high probability of an abnormal event. Both the data-driven approach and the model-based approach were tested in the Simulink/dSPACE environment. It allowed a human driver to use analog steering wheels and pedals to control a virtual vehicle in real time and made tests more realistic. Vehicle models and traffic models were created in dSPACE to study the influences of UA and ineffective brakes in various roadway driving situations. Test results show that the integrated system was capable of detecting UA in one second with high accuracy. Finally, a brake assist system was designed to cooperate with the detection system, which reduced the risk of accidents

    State of the Art of Audio- and Video-Based Solutions for AAL

    Get PDF
    It is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred to as the use of innovative and advanced Information and Communication Technologies to create supportive, inclusive and empowering applications and environments that enable older, impaired or frail people to live independently and stay active longer in society. AAL capitalizes on the growing pervasiveness and effectiveness of sensing and computing facilities to supply the persons in need with smart assistance, by responding to their necessities of autonomy, independence, comfort, security and safety. The application scenarios addressed by AAL are complex, due to the inherent heterogeneity of the end-user population, their living arrangements, and their physical conditions or impairment. Despite aiming at diverse goals, AAL systems should share some common characteristics. They are designed to provide support in daily life in an invisible, unobtrusive and user-friendly manner. Moreover, they are conceived to be intelligent, to be able to learn and adapt to the requirements and requests of the assisted people, and to synchronise with their specific needs. Nevertheless, to ensure the uptake of AAL in society, potential users must be willing to use AAL applications and to integrate them in their daily environments and lives. In this respect, video- and audio-based AAL applications have several advantages, in terms of unobtrusiveness and information richness. Indeed, cameras and microphones are far less obtrusive with respect to the hindrance other wearable sensors may cause to oneโ€™s activities. In addition, a single camera placed in a room can record most of the activities performed in the room, thus replacing many other non-visual sensors. Currently, video-based applications are effective in recognising and monitoring the activities, the movements, and the overall conditions of the assisted individuals as well as to assess their vital parameters. Similarly, audio sensors have the potential to become one of the most important modalities for interaction with AAL systems, as they can have a large range of sensing, do not require physical presence at a particular location and are physically intangible. Moreover, relevant information about individualsโ€™ activities and health status can derive from processing audio signals. Nevertheless, as the other side of the coin, cameras and microphones are often perceived as the most intrusive technologies from the viewpoint of the privacy of the monitored individuals. This is due to the richness of the information these technologies convey and the intimate setting where they may be deployed. Solutions able to ensure privacy preservation by context and by design, as well as to ensure high legal and ethical standards are in high demand. After the review of the current state of play and the discussion in GoodBrother, we may claim that the first solutions in this direction are starting to appear in the literature. A multidisciplinary debate among experts and stakeholders is paving the way towards AAL ensuring ergonomics, usability, acceptance and privacy preservation. The DIANA, PAAL, and VisuAAL projects are examples of this fresh approach. This report provides the reader with a review of the most recent advances in audio- and video-based monitoring technologies for AAL. It has been drafted as a collective effort of WG3 to supply an introduction to AAL, its evolution over time and its main functional and technological underpinnings. In this respect, the report contributes to the field with the outline of a new generation of ethical-aware AAL technologies and a proposal for a novel comprehensive taxonomy of AAL systems and applications. Moreover, the report allows non-technical readers to gather an overview of the main components of an AAL system and how these function and interact with the end-users. The report illustrates the state of the art of the most successful AAL applications and functions based on audio and video data, namely lifelogging and self-monitoring, remote monitoring of vital signs, emotional state recognition, food intake monitoring, activity and behaviour recognition, activity and personal assistance, gesture recognition, fall detection and prevention, mobility assessment and frailty recognition, and cognitive and motor rehabilitation. For these application scenarios, the report illustrates the state of play in terms of scientific advances, available products and research project. The open challenges are also highlighted. The report ends with an overview of the challenges, the hindrances and the opportunities posed by the uptake in real world settings of AAL technologies. In this respect, the report illustrates the current procedural and technological approaches to cope with acceptability, usability and trust in the AAL technology, by surveying strategies and approaches to co-design, to privacy preservation in video and audio data, to transparency and explainability in data processing, and to data transmission and communication. User acceptance and ethical considerations are also debated. Finally, the potentials coming from the silver economy are overviewed

    KEER2022

    Get PDF
    Avanttรญtol: KEER2022. DiversitiesDescripciรณ del recurs: 25 juliol 202

    4th International Symposium on Ambient Intelligence (ISAmI 2013)

    Get PDF
    Ambient Intelligence (AmI) is a recent paradigm emerging from Artificial Intelligence (AI), where computers are used as proactive tools assisting people with their day-to-day activities, making everyoneโ€™s life more comfortable. Another main concern of AmI originates from the human computer interaction domain and focuses on offering ways to interact with systems in a more natural way by means user friendly interfaces. This field is evolving quickly as can be witnessed by the emerging natural language and gesture based types of interaction. The inclusion of computational power and communication technologies in everyday objects is growing and their embedding into our environments should be as invisible as possible. In order for AmI to be successful, human interaction with computing power and embedded systems in the surroundings should be smooth and happen without people actually noticing it. The only awareness people should have arises from AmI: more safety, comfort and wellbeing, emerging in a natural and inherent way. ISAmI is the International Symposium on Ambient Intelligence and aiming to bring together researchers from various disciplines that constitute the scientific field of Ambient Intelligence to present and discuss the latest results, new ideas, projects and lessons learned, namely in terms of software and applications, and aims to bring together researchers from various disciplines that are interested in all aspects of this area

    Proceedings of the Seventeenth Annual Conference on Manual Control

    Get PDF
    Manual control is considered, with concentration on perceptive/cognitive man-machine interaction and interface
    corecore