354 research outputs found

    Vehicle as a Service (VaaS): Leverage Vehicles to Build Service Networks and Capabilities for Smart Cities

    Full text link
    Smart cities demand resources for rich immersive sensing, ubiquitous communications, powerful computing, large storage, and high intelligence (SCCSI) to support various kinds of applications, such as public safety, connected and autonomous driving, smart and connected health, and smart living. At the same time, it is widely recognized that vehicles such as autonomous cars, equipped with significantly powerful SCCSI capabilities, will become ubiquitous in future smart cities. By observing the convergence of these two trends, this article advocates the use of vehicles to build a cost-effective service network, called the Vehicle as a Service (VaaS) paradigm, where vehicles empowered with SCCSI capability form a web of mobile servers and communicators to provide SCCSI services in smart cities. Towards this direction, we first examine the potential use cases in smart cities and possible upgrades required for the transition from traditional vehicular ad hoc networks (VANETs) to VaaS. Then, we will introduce the system architecture of the VaaS paradigm and discuss how it can provide SCCSI services in future smart cities, respectively. At last, we identify the open problems of this paradigm and future research directions, including architectural design, service provisioning, incentive design, and security & privacy. We expect that this paper paves the way towards developing a cost-effective and sustainable approach for building smart cities.Comment: 32 pages, 11 figure

    2011 GREAT Day Program

    Get PDF
    SUNY Geneseo’s Fifth Annual GREAT Day.https://knightscholar.geneseo.edu/program-2007/1005/thumbnail.jp

    Adaptive large neighborhood search algorithm – performance evaluation under parallel schemes & applications

    Get PDF
    Adaptive Large Neighborhood Search (ALNS) is a fairly recent yet popular single-solution heuristic for solving discrete optimization problems. Even though the heuristic has been a popular choice for researchers in recent times, the parallelization of this algorithm is not widely studied in the literature compared to the other classical metaheuristics. To extend the existing literature, this study proposes several different parallel schemes to parallelize the basic/sequential ALNS algorithm. More specifically, seven different parallel schemes are employed to target different characteristics of the ALNS algorithm and the capability of the local computers. The schemes of this study are implemented in a master-slave architecture to manage and assign loads in processors of the local computers. The overall goal is to simultaneously explore different areas of the search space in an attempt to escape the local minima, taking effective steps toward the optimal solution and, to the end, accelerating the convergence of the ALNS algorithm. The performance of the schemes is tested by solving a capacitated vehicle routing problem (CVRP) with available wellknown test instances. Our computational results indicate that all the parallel schemes are capable of providing a competitive optimality gap in solving CVRP within our investigated test instances. However, the parallel scheme (scheme 1), which runs the ALNS algorithm independently within different slave processors (e.g., without sharing any information with other slave processors) until the synchronization occurs only when one of the processors meets its predefined termination criteria and reports the solution to the master processor, provides the best running time with solving the instances approximately 10.5 times faster than the basic/sequential ALNS algorithm. These findings are applied in a real-life fulfillment process using mixed-mode delivery with trucks and drones. Complex but optimized routes are generated in a short time that is applicable to perform last-mile delivery to customers

    Mobility-aware fog computing in dynamic networks with mobile nodes: A survey

    Get PDF
    Fog computing is an evolving paradigm that addresses the latency-oriented performance and spatio-temporal issues of the cloud services by providing an extension to the cloud computing and storage services in the vicinity of the service requester. In dynamic networks, where both the mobile fog nodes and the end users exhibit time-varying characteristics, including dynamic network topology changes, there is a need of mobility-aware fog computing, which is very challenging due to various dynamisms, and yet systematically uncovered. This paper presents a comprehensive survey on the fog computing compliant with the OpenFog (IEEE 1934) standardised concept, where the mobility of fog nodes constitutes an integral part. A review of the state-of-the-art research in fog computing implemented with mobile nodes is conducted. The review includes the identification of several models of fog computing concept established on the principles of opportunistic networking, social communities, temporal networks, and vehicular ad-hoc networks. Relevant to these models, the contributing research studies are critically examined to provide an insight into the open issues and future research directions in mobile fog computing research

    Digitization of the work environment for sustainable production

    Get PDF
    Global pandemics, devastating wars and natural disasters with increasing frequency and impact are disrupting previously carefully balanced manufacturing networks. All industrial companies are required to examine their operations and adjust accordingly. The increasing cost of resources require enterprises to re-design their value creation processes to be more sustainable, to optimize the supplier network to become more resilient and to accelerate digitizing of operations to enhance operational effectiveness. This year's WGAB research seminar is themed around Digitization of the work environment for sustainable production and seeks to contribute solutions to the current challenges. The scientific discourse aims to advance the sustainable and data-based organization of value creation processes. Exemplary efforts for the sustainable production of 3D printed footwear and the circular supply chain of energy production will be discussed. With advances in sensory data collection in cyber-physical production systems (CPPS), there are new opportunities for sensing the status of manufacturing systems, which enable advanced data analytics to contribute to a sustainable production. Intelligent processes enable sustainable value creation and bi-directional knowledge exchange between humans and machines. With people at the centre of the CPPS, production systems shall be both adaptive and personalized for every worker. People need to be involved in the technological and organizational changes. Simulating the migration from a linear economy to a circular economy supports the trend of regionalized production networks. Digital assistance systems are tested to back up resilient manufacturing. We would like to thank all authors for their efforts in preparing the contributions, which are valuable inputs to the discourse to solve the current challenges

    Security and Trust in Safety Critical Infrastructures

    Get PDF
    Critical infrastructures such as road vehicles and railways are undergoing a major change, which increases the dependency of their operation and control on Information Technology (IT) and makes them more vulnerable to malicious intent. New complex communication infrastructures emerge using the increased connectivity of these safety-critical systems to enable efficient management of operational processes, service provisioning, and information exchange for various (third-party) actors. Railway Command and Control Systems (CCSs) turn with the introduction of digital interlocking into an “Internet of Railway Things”, where safety-critical railway signaling components are deployed on common-purpose platforms and connected via standard IP-based networks. Similarly, the mass adoption of Electric Vehicles (EVs) and the need to supply their batteries with energy for charging has given rise to a Vehicle-to-Grid (V2G) infrastructure, which connects vehicles to power grids and multiple service providers to coordinate charging and discharging processes and maintain grid stability under varying power demands. The Plug-and-Charge feature brought in by the V2G communication standard ISO 15118 allows an EV to access charging and value-added services, negotiate charging schedules, and support the grid as a distributed energy resource in a largely automated way, by leveraging identity credentials installed in the vehicle for authentication and payment. The fast deployment of this advanced functionality is driven by economical and political decisions including the EU Green Deal for climate neutrality. Due to the complex requirements and long standardization and development cycles, the standards and regulations, which play the key role in operating and protecting critical infrastructures, are under pressure to enable the timely and cost-effective adoption. In this thesis, we investigate security and safety of future V2G and railway command and control systems with respect to secure communication, platform assurance as well as safety and security co-engineering. One of the major goals in this context is the continuous collaboration and establishment of the proposed security solutions in upcoming domain-specific standards, thus ensuring their practical applicability and prompt implementation in real-world products. We first analyze the security of V2G communication protocols and requirements for secure service provisioning via charging connections. We propose a new Plug-and-Patch protocol that enables secure update of EVs as a value-added service integrated into the V2G charging loop. Since EVs can also participate in energy trading by storing and feeding previously stored energy to grid, home, or other vehicles, we then investigate fraud detection methods that can be employed to identify manipulations and misbehaving users. In order to provide a strong security foundation for V2G communications, we propose and analyze three security architectures employing a hardware trust anchor to enable trust establishment in V2G communications. We integrate these architectures into standard V2G protocols for load management, e-mobility services and value-added services in the V2G infrastructure, and evaluate the associated performance and security trade-offs. The final aspect of this work is safety and security co-engineering, i.e., integration of safety and security processes vital for the adequate protection of connected safety-critical systems. We consider two application scenarios, Electric Vehicle Charging System (EVCS) and Object Controller (OC) in railway CCS, and investigate how security methods like trusted computing can be applied to provide both required safety and security properties. In the case of EVCS, we bind the trust boundary for safety functionality (certified configuration) to the trust boundary in the security domain and design a new security architecture that enforces safety properties via security assertions. For the railway use case, we focus on ensuring non-interference (separation) between these two domains and develop a security architecture that allows secure co-existence of applications with different criticality on the same hardware platform. The proposed solutions have been presented to the committee ISO/TC 22/SC 31/JWG 1 that develops the ISO 15118 standard series and to the DKE working group “Informationssicherheit für Elektromobilität” responsible for the respective application guidelines. Our security extension has been integrated in the newest edition ISO 15118-20 released in April 2022. Several manufacturers have already started concept validation for their future products using our results. In this way, the presented analyses and techniques are fundamental contributions in improving the state of security for e-mobility and railway applications, and the overall resilience of safety-critical infrastructures to malicious attacks
    • …
    corecore