284,658 research outputs found

    Cyber-security internals of a Skoda Octavia vRS:a hands on approach

    Get PDF
    The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit (ECU) and the Controller Area Network (CAN) for in-vehicle communications or through a mobile phone or server for out-vehicle communication. Information sent by or to the vehicle can be life-critical (e.g. breaking, acceleration, cruise control, emergency communication, etc. . . ). As vehicular technology advances, in-vehicle networks are connected to external networks through 3 and 4G mobile networks, enabling manufacturer and customer monitoring of different aspects of the car. While these services provide valuable information, they also increase the attack surface of the vehicle, and can enable long and short range attacks. In this manuscript, we evaluate the security of the 2017 Skoda Octavia vRS 4x4. Both physical and remote attacks are considered, the key fob rolling code is successfully compromised, privacy attacks are demonstrated through the infotainment system, the Volkswagen Transport Protocol 2.0 is reverse engineered. Additionally, in-car attacks are highlighted and described, providing an overlook of potentially deadly threats by modifying ECU parameters and components enabling digital forensics investigation are identified

    Push & Pull: autonomous deployment of mobile sensors for a complete coverage

    Full text link
    Mobile sensor networks are important for several strategic applications devoted to monitoring critical areas. In such hostile scenarios, sensors cannot be deployed manually and are either sent from a safe location or dropped from an aircraft. Mobile devices permit a dynamic deployment reconfiguration that improves the coverage in terms of completeness and uniformity. In this paper we propose a distributed algorithm for the autonomous deployment of mobile sensors called Push&Pull. According to our proposal, movement decisions are made by each sensor on the basis of locally available information and do not require any prior knowledge of the operating conditions or any manual tuning of key parameters. We formally prove that, when a sufficient number of sensors are available, our approach guarantees a complete and uniform coverage. Furthermore, we demonstrate that the algorithm execution always terminates preventing movement oscillations. Numerous simulations show that our algorithm reaches a complete coverage within reasonable time with moderate energy consumption, even when the target area has irregular shapes. Performance comparisons between Push&Pull and one of the most acknowledged algorithms show how the former one can efficiently reach a more uniform and complete coverage under a wide range of working scenarios.Comment: Technical Report. This paper has been published on Wireless Networks, Springer. Animations and the complete code of the proposed algorithm are available for download at the address: http://www.dsi.uniroma1.it/~novella/mobile_sensors

    Cellular Underwater Wireless Optical CDMA Network: Potentials and Challenges

    Get PDF
    Underwater wireless optical communications is an emerging solution to the expanding demand for broadband links in oceans and seas. In this paper, a cellular underwater wireless optical code division multiple-access (UW-OCDMA) network is proposed to provide broadband links for commercial and military applications. The optical orthogonal codes (OOC) are employed as signature codes of underwater mobile users. Fundamental key aspects of the network such as its backhaul architecture, its potential applications and its design challenges are presented. In particular, the proposed network is used as infrastructure of centralized, decentralized and relay-assisted underwater sensor networks for high-speed real-time monitoring. Furthermore, a promising underwater localization and positioning scheme based on this cellular network is presented. Finally, probable design challenges such as cell edge coverage, blockage avoidance, power control and increasing the network capacity are addressed.Comment: 11 pages, 10 figure

    Agilla: A Mobile Agent Middleware for Sensor Networks

    Get PDF
    Agilla is a mobile agent middleware for sensor networks. Mobile agents are special processes that can migrate across sensors. They increase network flexibility by enabling active in-network reprogramming. Neighbor lists and tuple spaces are used for agent coordination. Agilla was originally implemented on Mica2 motes, but has been ported to other platforms. Its Mica2 implementation consumes 41.6KB of code and 3.59KB of data memory. Agents can move five hops in less than 1.1s with over 92% success. Agilla was used to develop multiple applications related to fire detection and tracking, cargo container monitoring, and robot navigation

    Design of a Mobile Agent for Monitoring Activities of Users

    Get PDF
    Monitoring is an aspect of network management aimed at ensuring optimal performance of the network and that the users play by the rules. This paper presents the design of a mobile agent for monitoring the activities of users in a network. Users’ activities can be localized on their personal workstation or extended to the enterprise network and the Internet, in which case it can impact on the subscribed bandwidth, which is a shared resource of the corporate entity that they represent. All users hope to work in an environment of unlimited resources, including disk space, RAM and bandwidth. However, though the cost of these computing resources have reduced significantly owning to advances in microelectronic technology, they are still far from being free and inexhaustible. In this research, we design a mobile agent tool that can monitor users’ activities in a network environment with a view to enhancing the effective utilisation of system resources, and in particular, the physical memory. The aim is to enable optimal resource utilisation in the network environment. In this paper, we define a mathematical formulation of user activities, load overhead of mobile agents and itinerary partition to avoid the over-bloating problem. The architecture of the mobile agent is explained. Keywords: Mobile Agent; System resources; Computer network; Code Mobility; Monitorin

    Design of a Mobile Agent for Monitoring Activities of Users

    Get PDF
    Monitoring is an aspect of network management aimed at ensuring optimal performance of the network and that the users play by the rules. This paper presents the design of a mobile agent for monitoring the activities of users in a network. Users’ activities can be localized on their personal workstation or extended to the enterprise network and the Internet, in which case it can impact on the subscribed bandwidth, which is a shared resource of the corporate entity that they represent. All users hope to work in an environment of unlimited resources, including disk space, RAM and bandwidth. However, though the cost of these computing resources have reduced significantly owning to advances in microelectronic technology, they are still far from being free and inexhaustible. In this research, we design a mobile agent tool that can monitor users’ activities in a network environment with a view to enhancing the effective utilisation of system resources, and in particular, the physical memory. The aim is to enable optimal resource utilisation in the network environment. In this paper, we define a mathematical formulation of user activities, load overhead of mobile agents and itinerary partition to avoid the over-bloating problem. The architecture of the mobile agent is explained. Keywords: Mobile Agent, System resources, Computer network, Code Mobility, Monitorin

    Data management of on-line partial discharge monitoring using wireless sensor nodes integrated with a multi-agent system

    Get PDF
    On-line partial discharge monitoring has been the subject of significant research in previous years but little work has been carried out with regard to the management of on-site data. To date, on-line partial discharge monitoring within a substation has only been concerned with single plant items, so the data management problem has been minimal. As the age of plant equipment increases, so does the need for condition monitoring to ensure maximum lifespan. This paper presents an approach to the management of partial discharge data through the use of embedded monitoring techniques running on wireless sensor nodes. This method is illustrated by a case study on partial discharge monitoring data from an ageing HVDC reactor
    corecore