12,005 research outputs found

    iTETRIS: An Integrated Wireless and Traffic Platform for Real-Time Road Traffic Management Solutions

    Get PDF
    Wireless vehicular cooperative systems have been identified as an attractive solution to improve road traffic management, thereby contributing to the European goal of safer, cleaner, and more efficient and sustainable traffic solutions. V2V-V2I communication technologies can improve traffic management through real-time exchange of data among vehicles and with road infrastructure. It is also of great importance to investigate the adequate combination of V2V and V2I technologies to ensure the continuous and costefficient operation of traffic management solutions based on wireless vehicular cooperative solutions. However, to adequately design and optimize these communication protocols and analyze the potential of wireless vehicular cooperative systems to improve road traffic management, adequate testbeds and field operational tests need to be conducted. Despite the potential of Field Operational Tests to get the first insights into the benefits and problems faced in the development of wireless vehicular cooperative systems, there is yet the need to evaluate in the long term and large dimension the true potential benefits of wireless vehicular cooperative systems to improve traffic efficiency. To this aim, iTETRIS is devoted to the development of advanced tools coupling traffic and wireless communication simulators

    On the Secure and Resilient Design of Connected Vehicles: Methods and Guidelines

    Get PDF
    Vehicles have come a long way from being purely mechanical systems to systems that consist of an internal network of more than 100 microcontrollers and systems that communicate with external entities, such as other vehicles, road infrastructure, the manufacturer’s cloud and external applications. This combination of resource constraints, safety-criticality, large attack surface and the fact that millions of people own and use them each day, makes securing vehicles particularly challenging as security practices and methods need to be tailored to meet these requirements.This thesis investigates how security demands should be structured to ease discussions and collaboration between the involved parties and how requirements engineering can be accelerated by introducing generic security requirements. Practitioners are also assisted in choosing appropriate techniques for securing vehicles by identifying and categorising security and resilience techniques suitable for automotive systems. Furthermore, three specific mechanisms for securing automotive systems and providing resilience are designed and evaluated. The first part focuses on cyber security requirements and the identification of suitable techniques based on three different approaches, namely (i) providing a mapping to security levels based on a review of existing security standards and recommendations; (ii) proposing a taxonomy for resilience techniques based on a literature review; and (iii) combining security and resilience techniques to protect automotive assets that have been subject to attacks. The second part presents the design and evaluation of three techniques. First, an extension for an existing freshness mechanism to protect the in-vehicle communication against replay attacks is presented and evaluated. Second, a trust model for Vehicle-to-Vehicle communication is developed with respect to cyber resilience to allow a vehicle to include trust in neighbouring vehicles in its decision-making processes. Third, a framework is presented that enables vehicle manufacturers to protect their fleet by detecting anomalies and security attacks using vehicle trust and the available data in the cloud

    Collaborative perception architecture in smart cities

    Get PDF
    Autonomous Driving Systems have become a reality in our society. Everyday, progress is made to increase vehicles' autonomy to drive without restrictions in roads and cities. To achieve that, researchers are always seeking for new methods to ensure the safety of the vehicles. A promising strategy is to improve the quality of the collected perception data as it directly influences the overall performance of the autonomous system. However, despite the advances achieved in detection methods and algorithms, perception is currently physically restricted by the available on-board sensors and their line-of-sight. To overcome this limitation, the autonomous system should not only capture on-board perception data, but also enhance it with data exchanged with other agents in the environment. This is known in research as Collaborative Perception, where mobile and stationary agents share object detection and sensor data inside an Intelligent Transport Systems network. This master's thesis brings together a collection of ETSI standards with the goal of developing a well-defined architecture for future implementation of a Secure Collaborative Perception Network in the context of Smart Cities. The architecture has been designed using the open-source software Capella Arcadia following a Model Based Software Engineering methodology

    C-ITS road-side unit deployment on highways with ITS road-side systems : a techno-economic approach

    Get PDF
    Connectivity and cooperation are considered important prerequisites to automated driving, as they are crucial elements in increasing the safety of future automated vehicles and their full integration in the overall transport system. Although many European Member States, as part of the C-Roads Platform, have implemented and are still implementing Road-side Units (RSUs) for Cooperative Intelligent Transportation Systems (C-ITS) within pilot deployment projects, the platform aspires a wide extension of deployments in the coming years. Therefore, this paper investigates techno-economic aspects of C-ITS RSU deployments from a road authority viewpoint. A two-phased approach is used, in which firstly the optimal RSU locations are determined, taking into account existing road-side infrastructure. Secondly, a cost model translates the amount of RSUs into financial results. It was found that traffic density has a significant impact on required RSU density, hence impacting costs. Furthermore, major cost saving can be obtained by leveraging existing road-side infrastructure. The proposed methodology is valuable for other member states, and in general, to any other country aspiring to roll out C-ITS road infrastructure. Results can be used to estimate required investment costs based on legacy infrastructure, as well as to benchmark with the envisioned benefits from the deployed C-ITS services

    A Secured Multi Agent Architecture for Grid Computing

    Get PDF
    Grid computing provides big possibilities like resource sharing, resource virtualization, and capacity planning since diverse resources that are geographically dispersed are virtualized as a single entity. The associated security concerns are one of the key obstacles preventing grid computing from being broadly adopted and used. Users in a grid are concerned about the security of their assets and the privacy of their data. A host's security in terms of its data or virtual servers may be jeopardised when it interacts with a grid. By providing multilateral security, i.e., security for both the Grid client and the Grid supplier, our building design expands the degree of assurance that can be placed on the accuracy of a Grid calculation and the assurance of client-provided resources. We discuss the issue of ensuring security and present the multi-agent security construction analysis. The paper outlines a multi-agent strategy for protecting the grid environment's resources. The strategy is put forth to address the grid computing industry's growing, serious security issue. The paper defines a multi-agent security architecture that integrates the capabilities of agents with the Grid Security Infrastructure's basic security mechanism (GSI). A security Master agent and a few security task execution agents make up the strategy

    Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)

    Get PDF
    This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications

    Key technologies for safe and autonomous drones

    Get PDF
    Drones/UAVs are able to perform air operations that are very difficult to be performed by manned aircrafts. In addition, drones' usage brings significant economic savings and environmental benefits, while reducing risks to human life. In this paper, we present key technologies that enable development of drone systems. The technologies are identified based on the usages of drones (driven by COMP4DRONES project use cases). These technologies are grouped into four categories: U-space capabilities, system functions, payloads, and tools. Also, we present the contributions of the COMP4DRONES project to improve existing technologies. These contributions aim to ease drones’ customization, and enable their safe operation.This project has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 826610. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Spain, Austria, Belgium, Czech Republic, France, Italy, Latvia, Netherlands. The total project budget is 28,590,748.75 EUR (excluding ESIF partners), while the requested grant is 7,983,731.61 EUR to ECSEL JU, and 8,874,523.84 EUR of National and ESIF Funding. The project has been started on 1st October 2019

    Co-operative Transport System and investigation of the co-operation

    Get PDF
    This paper deals with Intelligent Transport Systems (ITS) and the concept of a Co-operative Transport System (CTS), in which the communication and the knowledge sharing is much more important. This distributed knowledge allows improving road transport operations more safety and efficiency. After showing some issues about development and advantages of a CTS, the communication part is discussed among CTS elements. The most important parts and usefulness of CTSs are shown with some examples, e.g. TRACKSS, which is based on the knowledge sharing sensors on the road network

    Computational Challenges in Cooperative Intelligent Urban Transport

    Get PDF
    This report documents the talks and group work of Dagstuhl Seminar 16091 “Computational Challenges in Cooperative Intelligent Urban Transport”. This interdisciplinary seminar brought researchers together from many fields including computer science, transportation, operations research, mathematics, machine learning and artificial intelligence. The seminar included two formats of talks: several minute research statements and longer overview talks. The talks given are documented here with abstracts. Furthermore, this seminar consisted of significant amounts of group work that is also documented with short abstracts detailing group discussions and planned outcomes
    • 

    corecore