4,090 research outputs found

    Fine-grained RNN with Transfer Learning for Energy Consumption Estimation on EVs

    Get PDF
    This work is supported by the Engineering and Physical Sciences Research Council, under PETRAS SRF grant MAGIC (EP/S035362/1) and the University of Glasgow Impact Acceleration Account.Peer reviewedPostprin

    Authentication enhancement in command and control networks: (a study in Vehicular Ad-Hoc Networks)

    Get PDF
    Intelligent transportation systems contribute to improved traffic safety by facilitating real time communication between vehicles. By using wireless channels for communication, vehicular networks are susceptible to a wide range of attacks, such as impersonation, modification, and replay. In this context, securing data exchange between intercommunicating terminals, e.g., vehicle-to-everything (V2X) communication, constitutes a technological challenge that needs to be addressed. Hence, message authentication is crucial to safeguard vehicular ad-hoc networks (VANETs) from malicious attacks. The current state-of-the-art for authentication in VANETs relies on conventional cryptographic primitives, introducing significant computation and communication overheads. In this challenging scenario, physical (PHY)-layer authentication has gained popularity, which involves leveraging the inherent characteristics of wireless channels and the hardware imperfections to discriminate between wireless devices. However, PHY-layerbased authentication cannot be an alternative to crypto-based methods as the initial legitimacy detection must be conducted using cryptographic methods to extract the communicating terminal secret features. Nevertheless, it can be a promising complementary solution for the reauthentication problem in VANETs, introducing what is known as “cross-layer authentication.” This thesis focuses on designing efficient cross-layer authentication schemes for VANETs, reducing the communication and computation overheads associated with transmitting and verifying a crypto-based signature for each transmission. The following provides an overview of the proposed methodologies employed in various contributions presented in this thesis. 1. The first cross-layer authentication scheme: A four-step process represents this approach: initial crypto-based authentication, shared key extraction, re-authentication via a PHY challenge-response algorithm, and adaptive adjustments based on channel conditions. Simulation results validate its efficacy, especially in low signal-to-noise ratio (SNR) scenarios while proving its resilience against active and passive attacks. 2. The second cross-layer authentication scheme: Leveraging the spatially and temporally correlated wireless channel features, this scheme extracts high entropy shared keys that can be used to create dynamic PHY-layer signatures for authentication. A 3-Dimensional (3D) scattering Doppler emulator is designed to investigate the scheme’s performance at different speeds of a moving vehicle and SNRs. Theoretical and hardware implementation analyses prove the scheme’s capability to support high detection probability for an acceptable false alarm value ≤ 0.1 at SNR ≥ 0 dB and speed ≤ 45 m/s. 3. The third proposal: Reconfigurable intelligent surfaces (RIS) integration for improved authentication: Focusing on enhancing PHY-layer re-authentication, this proposal explores integrating RIS technology to improve SNR directed at designated vehicles. Theoretical analysis and practical implementation of the proposed scheme are conducted using a 1-bit RIS, consisting of 64 × 64 reflective units. Experimental results show a significant improvement in the Pd, increasing from 0.82 to 0.96 at SNR = − 6 dB for multicarrier communications. 4. The fourth proposal: RIS-enhanced vehicular communication security: Tailored for challenging SNR in non-line-of-sight (NLoS) scenarios, this proposal optimises key extraction and defends against denial-of-service (DoS) attacks through selective signal strengthening. Hardware implementation studies prove its effectiveness, showcasing improved key extraction performance and resilience against potential threats. 5. The fifth cross-layer authentication scheme: Integrating PKI-based initial legitimacy detection and blockchain-based reconciliation techniques, this scheme ensures secure data exchange. Rigorous security analyses and performance evaluations using network simulators and computation metrics showcase its effectiveness, ensuring its resistance against common attacks and time efficiency in message verification. 6. The final proposal: Group key distribution: Employing smart contract-based blockchain technology alongside PKI-based authentication, this proposal distributes group session keys securely. Its lightweight symmetric key cryptography-based method maintains privacy in VANETs, validated via Ethereum’s main network (MainNet) and comprehensive computation and communication evaluations. The analysis shows that the proposed methods yield a noteworthy reduction, approximately ranging from 70% to 99%, in both computation and communication overheads, as compared to the conventional approaches. This reduction pertains to the verification and transmission of 1000 messages in total

    Multidisciplinary perspectives on Artificial Intelligence and the law

    Get PDF
    This open access book presents an interdisciplinary, multi-authored, edited collection of chapters on Artificial Intelligence (‘AI’) and the Law. AI technology has come to play a central role in the modern data economy. Through a combination of increased computing power, the growing availability of data and the advancement of algorithms, AI has now become an umbrella term for some of the most transformational technological breakthroughs of this age. The importance of AI stems from both the opportunities that it offers and the challenges that it entails. While AI applications hold the promise of economic growth and efficiency gains, they also create significant risks and uncertainty. The potential and perils of AI have thus come to dominate modern discussions of technology and ethics – and although AI was initially allowed to largely develop without guidelines or rules, few would deny that the law is set to play a fundamental role in shaping the future of AI. As the debate over AI is far from over, the need for rigorous analysis has never been greater. This book thus brings together contributors from different fields and backgrounds to explore how the law might provide answers to some of the most pressing questions raised by AI. An outcome of the Católica Research Centre for the Future of Law and its interdisciplinary working group on Law and Artificial Intelligence, it includes contributions by leading scholars in the fields of technology, ethics and the law.info:eu-repo/semantics/publishedVersio

    Planning for Electric Vehicles Coupled with Urban Mobility

    Full text link
    The rising adoption of plug-in electric vehicles (PEVs) leads to the alignment of their electricity and their mobility demands. Therefore, transportation and power infrastructures are becoming increasingly interdependent. In this work, we uncover patterns of PEV mobility by integrating for the first time two unique data sets: (i) mobile phone activity of 1.39 million Bay Area residents and (ii) charging activity of PEVs in 580,000 sessions obtained in the same region. We present a method to estimate individual mobility of PEV drivers at fine temporal and spatial resolution integrating survey data with mobile phone data and income information obtained from census. Thereupon, we recommend changes in PEVs charging times of commuters at their work stations that take into account individual travel needs and shave the pronounced peak in power demand. Informed by the tariff of electricity, we calculate the12 monetary gains to incentivize the adoption of the recommendations. These results open avenues for planning for the future of coupled transportation and electricity needs using personalized data

    When Deep Learning Meets Polyhedral Theory: A Survey

    Full text link
    In the past decade, deep learning became the prevalent methodology for predictive modeling thanks to the remarkable accuracy of deep neural networks in tasks such as computer vision and natural language processing. Meanwhile, the structure of neural networks converged back to simpler representations based on piecewise constant and piecewise linear functions such as the Rectified Linear Unit (ReLU), which became the most commonly used type of activation function in neural networks. That made certain types of network structure \unicode{x2014}such as the typical fully-connected feedforward neural network\unicode{x2014} amenable to analysis through polyhedral theory and to the application of methodologies such as Linear Programming (LP) and Mixed-Integer Linear Programming (MILP) for a variety of purposes. In this paper, we survey the main topics emerging from this fast-paced area of work, which bring a fresh perspective to understanding neural networks in more detail as well as to applying linear optimization techniques to train, verify, and reduce the size of such networks

    Towards electric bus system: planning, operating and evaluating

    Get PDF
    The green transformation of public transportation is an indispensable way to achieve carbon neutrality. Governments and authorities are vigorously implementing electric bus procurement and charging infrastructure deployment programs. At this primary but urgent stage, how to reasonably plan the procurement of electric buses, how to arrange the operation of the heterogeneous fleet, and how to locate and scale the infrastructure are urgent issues to be solved. For a smooth transition to full electrification, this thesis aims to propose systematic guidance for the fleet and charging facilities, to ensure life-cycle efficiency and energy conservation from the planning to the operational phase.One of the most important issues in the operational phase is the charge scheduling for electric buses, a new issue that is not present in the conventional transit system. How to take into account the charging location and time duration in bus scheduling and not cause additional load peaks to the grid is the first issue being addressed. A charging schedule optimization model is constructed for opportunity charging with battery wear and charging costs as optimization objectives. Besides, the uncertainty in energy consumption poses new challenges to daily operations. This thesis further specifies the daily charging schedules with the consideration of energy consumption uncertainty while safeguarding the punctuality of bus services.In the context of e-mobility systems, battery sizing, charging station deployment, and bus scheduling emerge as crucial factors. Traditionally these elements have been approached and organized separately with battery sizing and charging facility deployment termed planning phase problems and bus scheduling belonging to operational phase issues. However, the integrated optimization of the three problems has advantages in terms of life-cycle costs and emissions. Therefore, a consolidated optimization model is proposed to collaboratively optimize the three problems and a life-cycle costs analysis framework is developed to examine the performance of the system from both economic and environmental aspects. To improve the attractiveness and utilization of electric public transportation resources, two new solutions have been proposed in terms of charging strategy (vehicle-to-vehicle charging) and operational efficiency (mixed-flow transport). Vehicle-to-vehicle charging allows energy to be continuously transmitted along the road, reducing reliance on the accessibility and deployment of charging facilities. Mixed flow transport mode balances the directional travel demands and facilities the parcel delivery while ensuring the punctuality and safety of passenger transport

    Enhancement of Charging Resource Utilization of Electric Vehicle Fast Charging Station with Heterogeneous EV Users

    Get PDF
    This thesis presents innovative charging resource allocation and coordination strategies that maximize the limited charging resources at FCS with heterogeneous EV users. It allows opportunistic EV users (OEVs) to exploit available charging resources with dynamic event-driven charging resource allocation and coordination strategies apart from primary EV users (PEVs) (registered or scheduled EV users). Moreover, developed strategies focus on the limited charging resources that are allocated for primary/ registered EV users (PEVs) of the FCS who access the FCS with specific privileges according to prior agreements. But the available resources are not optimally utilized due to various uncertainties associated with the EV charging process such as EV mobility-related uncertainties, EVSE failures, energy price uncertainties, etc. Developed strategies consider that idle chargers and vacant space for EVs at the FCS is an opportunity for further utilizing them with OEVs using innovative charging resource coordination strategies. This thesis develops an FCS-centric performance assessment framework that evaluates the performance of developed strategies in terms of charging resource utilization, charging completion and the quality of service (QoS) aspects of EV users. To evaluate QoS of EV charging process, various parameters such as EV blockage, charging process preemptage, mean waiting time, mean charging time, availability of FCS, charging reliability, etc are derived and analyzed. In addition, the developed innovative charging resource allocation and coordination strategies with resource aggregation and demand elasticity further enhance the charging resource utilization while providing a high QoS in EV charging for both PEVs and OEVs.publishedVersio

    20th SC@RUG 2023 proceedings 2022-2023

    Get PDF
    corecore