7,719 research outputs found

    Managing nonuniformities and uncertainties in vehicle-oriented sensor data over next generation networks

    Get PDF
    Detailed and accurate vehicle-oriented sensor data is considered fundamental for efficient vehicle-to-everything V2X communication applications, especially in the upcoming highly heterogeneous, brisk and agile 5G networking era. Information retrieval, transfer and manipulation in real-time offers a small margin for erratic behavior, regardless of its root cause. This paper presents a method for managing nonuniformities and uncertainties found on datasets, based on an elaborate Matrix Completion technique, with superior performance in three distinct cases of vehicle-related sensor data, collected under real driving conditions. Our approach appears capable of handling sensing and communication irregularities, minimizing at the same time the storage and transmission requirements of Multi-access Edge Computing applications

    Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things

    Get PDF
    In this paper, we present evaluation of security awareness of developers and users of cyber-physical systems. Our study includes interviews, workshops, surveys and one practical evaluation. We conducted 15 interviews and conducted survey with 55 respondents coming primarily from industry. Furthermore, we performed practical evaluation of current state of practice for a society-critical application, a commercial vehicle, and reconfirmed our findings discussing an attack vector for an off-line societycritical facility. More work is necessary to increase usage of security strategies, available methods, processes and standards. The security information, currently often insufficient, should be provided in the user manuals of products and services to protect system users. We confirmed it lately when we conducted an additional survey of users, with users feeling as left out in their quest for own security and privacy. Finally, hardware-related security questions begin to come up on the agenda, with a general increase of interest and awareness of hardware contribution to the overall cyber-physical security. At the end of this paper we discuss possible countermeasures for dealing with threats in infrastructures, highlighting the role of authorities in this quest
    corecore