The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Anomaly detection in bipartite graph is of great use in many real applications and therefore it attracts numerous research efforts. This work formulates the supervision on abnormal activities in vehicle inspection stations as an anomaly detection problem in weighted bipartite graph. Relevance scores and normality scores are computed for registration districts and inspection stations. The suspicion...
Despite the fact that numerous studies have indicated that vehicular networks are vulnerable to external and internal attacks, very little effort has been expended in safeguarding communications both between elements within the vehicle and between the vehicle and the outside world. In this paper we present a mechanism that allows communications policy (essentially who can talk with whom and the security...
SafeCOP (Safe Cooperating Cyber-Physical Systems using Wireless Communication) is an European project that targets cyber-physical systems-of-systems whose safe cooperation relies on wireless communication. In particular, SafeCOP will provide an approach to the safety assurance of such systems in the healthcare, maritime, vehicle-to-vehicle and vehicle-to-infrastructure sectors. The vehicle-to-infrastructure...
Enhancing road safety is the main goal of Vehicular Adhoc Networks (VANETs). However, the assumption that all peers are honest, cooperative can lead to catastrophic situations. To deal with such misbehaving peers, trust establishment can be used to enhance the security without affecting network performance. In this paper, we propose an opportunistic alert dissemination mechanism based on the trust...
More and more fantastic buildings with sculptural, challenging constructions are promoted, and they probably have owned or to be connected with very large spaces and highly need the remote control / monitoring / aid on devices, people and vehicles. To enhance detection availability, information integrity, or to rationally develop civilization services, counter sabotage attacks and radio interference,...
Message exchange among vehicles is an integral part of communication in smart cities. Messages are exchanged to inform the other vehicles about emergency situations such as-safety alerts, and location privacy. Due to the usage of an insecure wireless medium, malicious activities in vehicles, i.e., illegal use of the false messages, can astray other vehicles. Security in communication among the vehicles...
The requirements for new web applications supporting different types of devices and purposes are continuously growing. The main advantages of web application development as well as popular development features covering integration with different technologies are considered initially in this paper. Integration and possibilities of application of cloud based web applications in real scenarios with different...
Models@run.time has appeared as a new paradigm for continuously monitoring software systems execution to enable self-adaptation. This adaptation happens whenever a change, a failure or a bug is introduced within the execution environment. It is done by a causal bidirectional connection between design and execution artifacts supported by feedback-loop information. We developed an approach to integrate...
Cognitive Radio Vehicular Ad hoc Networks (CR-VANETs) utilize CR technology to increase frequency bandwidth for vehicular communications. Cooperative Spectrum Sensing (CSS) exploits spatial and temporal diversity for fast and accurate detection of Primary Users (PUs). This paper provides an overview of CSS techniques for CR-VANETs. We review state of the art CSS techniques proposed in literature highlighting...
When most individuals driving to the shopping mall choose the parking lot, they put attentions on not only the service levels of the parking lot but also their own personal preferences. Parking is essentially a choice behavior with preference information. The personal preferences consist of social attributes (e.g., gender, age, income, occupation), driving attributes (e.g., vehicle type, vehicle price,...
In this paper, we propose a secure intra-vehicular wireless communication architecture based on Host Identity Protocol (HIP). It ultimately improves the security of wireless intra-vehicular communication systems. The performance evaluation of the proposed architecture is performed in a ski tunnel which emulates the real underground transportation environment. Our results verify the feasibility of...
In vehicular ad hoc networks (VANETs), vehicles communicate with each other and with roadside units (RSUs) in order to enhance road safety, improve traffic management and provide infotainment services. Along with the growth of VANETs, some challenges are emerging. Although there are many research work on VANETs, cheating attacks are still not well resolved such as selective message relaying attack,...
We present a method for systematic consideration of security attributes in development of cyber-physical systems. We evaluate our method in development of commercial vehicles that were so far unreasonably excluded from automotive security studies (despite the great importance of commercial vehicles for the society). We have conducted analysis of a known zero-cost non-physical attack, fine-tuned to...
Modern vehicles are running complex and safety critical applications distributed over several Electronic Control Units (ECUs). Some ECUs are equipped with communication interfaces providing access to other devices, networks or remote services. Since the number of attack vectors is increasing, an early investigation of the impact of attacks becomes steadily more important. This paper gives an example...
In present time due to increase in number of kidnapping and road accident cases, parents always worry about their children. This paper recommends a SMS based solution which assists parents to track their children location in real time. To track the location GPS module is used and to identify the identity of the child a RFID card is used which is in built in the system. Whenever a child boards a bus,...
VANETs (Vehicular Adhoc Networks) is the Subclass of MANETs (Mobile Adhoc Networks). It provides remote communication among vehicles to roadside equipments and it gives the innovation that uses moving cars as a hub in a system to make the portable system that is each car which is participating is either a remote switch or hub. As, VANETs finds the applications in industry as well as commercial. The...
In recent years, there has been rapid advancement in the field of Vehicular ad-hoc network (VANET). In future, VANET communication will play a major role in enhancing safety and efficiency of the transportation system. If security is not provided in VANET, then it can results in obvious misapplication. Thus, security becomes an important issue in VANET. There are many security attacks like Sybil,...
Many Vehicular Ad Hoc Networks (VANETs) applications require the vehicle's location information to be available at anytime and anywhere within the network. Vehicle-to-vehicle (V2V) communication allows the exchange of mobility data, which includes position, speed and heading information, that can be used for location estimation. However, if the exchanged mobility data contains invalid or wrong information,...
In this paper we study a surveillance system for public transport vehicles, which is based on the collection of on-board videos, and the upload via wireless transmission to a central security system of video segments corresponding to those cameras and time intervals involved in an accident. We assume that vehicles are connected to several wireless interfaces, provided by different Mobile Network Operators...
We consider a surveillance system for public transport vehicles, which is based on the collection of on-board videos, and the upload via mobile network to a central security system of video segments corresponding to those cameras and time intervals involved in an accident. We assume that vehicles are connected to several wireless interfaces, provided by different Mobile Network Operators (MNOs), each...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.