66,123 research outputs found

    Federated Robust Embedded Systems: Concepts and Challenges

    Get PDF
    The development within the area of embedded systems (ESs) is moving rapidly, not least due to falling costs of computation and communication equipment. It is believed that increased communication opportunities will lead to the future ESs no longer being parts of isolated products, but rather parts of larger communities or federations of ESs, within which information is exchanged for the benefit of all participants. This vision is asserted by a number of interrelated research topics, such as the internet of things, cyber-physical systems, systems of systems, and multi-agent systems. In this work, the focus is primarily on ESs, with their specific real-time and safety requirements. While the vision of interconnected ESs is quite promising, it also brings great challenges to the development of future systems in an efficient, safe, and reliable way. In this work, a pre-study has been carried out in order to gain a better understanding about common concepts and challenges that naturally arise in federations of ESs. The work was organized around a series of workshops, with contributions from both academic participants and industrial partners with a strong experience in ES development. During the workshops, a portfolio of possible ES federation scenarios was collected, and a number of application examples were discussed more thoroughly on different abstraction levels, starting from screening the nature of interactions on the federation level and proceeding down to the implementation details within each ES. These discussions led to a better understanding of what can be expected in the future federated ESs. In this report, the discussed applications are summarized, together with their characteristics, challenges, and necessary solution elements, providing a ground for the future research within the area of communicating ESs

    Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience

    Get PDF
    Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks. This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terrorist’s blueprint

    Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

    Get PDF
    Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations

    SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach

    Full text link
    This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank's control system, which is a stage in the process of water treatment and distribution. Sophisticated cyber-attacks were conducted against the testbed. During the attacks, the network traffic was captured, and features were extracted from the traffic to build a dataset for training and testing different machine learning algorithms. Five traditional machine learning algorithms were trained to detect the attacks: Random Forest, Decision Tree, Logistic Regression, Naive Bayes and KNN. Then, the trained machine learning models were built and deployed in the network, where new tests were made using online network traffic. The performance obtained during the training and testing of the machine learning models was compared to the performance obtained during the online deployment of these models in the network. The results show the efficiency of the machine learning models in detecting the attacks in real time. The testbed provides a good understanding of the effects and consequences of attacks on real SCADA environmentsComment: E-Preprin

    A review of factors which influence pedestrian use of the streets: Task 1 report for an EPSRC funded project on measuring pedestrian accessibility

    Get PDF
    INTRODUCTION This document was written to report the results from Task 1 of the Measuring Pedestrian Accessibility project funded through the EPSRC Future Integrated Transport programme. The project is being carried out by staff at the Institute for Transport Studies (ITS) at the University of Leeds in collaboration with the Pedestrians Association and City of York Council. The overall aim of this project is to identify ways to encourage and enable more people to make more journeys on foot. The specific objectives are to: ‱ quantify attitudes and perceptions held towards walking and the barriers to walking; ‱ study the feasibility of developing a tool that can be used to evaluate pedestrian routes; ‱ undertake validation of the tool. The achievement of these objectives will represent a thorough investigation into the two sides of providing for walking - the physical environment for pedestrians and people's attitudes to walking. Task 1 of the project is an extended literature review and survey of experts to identify an initial list of features that are thought to influence pedestrian use of the streets. The paper that follows is split into a number of sections which look at the different characteristics of pedestrians, factors which affect route choice, factors which affect mode choice, problems faced by pedestrians on our streets and a short review of recent Government (local and national) policy which has influenced pedestrian provision

    Bus Rapid Transit: A Handbook for Partners, MTI Report 06-02

    Get PDF
    In April 2005, the Caltrans Division of Research and Innovation (DRI) asked MTI to assist with the research for and publication of a guidebook for use by Caltrans employees who work with local transit agencies and jurisdictions in planning, designing, and operating Bus Rapid Transit (BRT) systems that involve state facilities. The guidebook was also to assist to transit operators, local governments, community residents, and other stakeholders dealing with the development of BRT systems. Several areas in the state have experienced such projects ( San Diego , Los Angeles , San Francisco , and Alameda County ) and DRI wished to use that experience to guide future efforts and identify needed changes in statutes, policies, and other state concerns. Caltrans convened a Task Team from the Divisions of Research and Innovation, Mass Transportation, and Operations, together with stakeholders representing many of those involved with the BRT activities around the state. Prior to MTI’s involvement, this group produced a white paper on the topic, a series of questions, and an outline of the guidebook that MTI was to write. The MTI team conducted case studies of the major efforts in California, along with less developed studies of some of the other BRT programs under development or in early implementation phases around the state. The purpose was to clarify those issues that need to be addressed in the guidebook, as well as to compile information that would identify items needing legislative or regulatory action and items that Caltrans will need to address through district directives or other internal measures. A literature scan was used to develop a bibliography for future reference. The MTI team also developed a draft Caltrans director’s policy document, which provides the basis for Caltrans’ actions. This ultimately developed to be a project within a project. MTI submitted a draft document to Caltrans as a final product from the Institute. Task team members and Caltrans staff and leadership provided extensive review of the draft Bus Rapid Transit: A Handbook for Partners. Caltrans adopted a new Director’s Policy and published the document, BRT Caltrans. The MTI “wraparound” report presented below discusses in more detail the process that was followed to produce the draft report. The process was in many ways as much a project as the report itself

    Intrusion Detection Systems for Community Wireless Mesh Networks

    Get PDF
    Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive. Unfortunately, computer networks (including mesh networks) are frequently being exploited by increasingly profit-driven and insidious attackers, which can affect their utility for legitimate use. In response to this, a number of countermeasures have been developed, including intrusion detection systems that aim to detect anomalous behaviour caused by attacks. We present a set of socio-technical challenges associated with developing an intrusion detection system for a community wireless mesh network. The attack space on a mesh network is particularly large; we motivate the need for and describe the challenges of adopting an asset-driven approach to managing this space. Finally, we present an initial design of a modular architecture for intrusion detection, highlighting how it addresses the identified challenges
    • 

    corecore