The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modelling and simulation (Mod-Sim) tools are becoming a crucial component in the design and evaluation of cyber and physical security systems. Many Mod-Sim tools exist for the elucidation of attack scenarios, characterization of facility vulnerabilities, and the construction and maintenance of optimal protection systems. The growing use of Mod-Sim tools for assessment of physical and cyber security...
Future digital avionics systems will work in complex and cluttered environments which require systems engineering solutions for such applications as airport ground surface management. In this paper, we highlight the use of a L1 video tracker for monitoring activities at an airport. We present methods of information fusion, entity detection, and activity analysis using airport videos for runway detection...
In a context of growing attention towards transport security and critical infrastructure protection in Europe, this paper aims to provide a concise overview of security issues which could affect the 5 transport sub-sectors listed by Council Directive 2008/114/EC. Transport system's supply chains are to identify their key assets, functions and operators and interactions between components. The aim...
In recent years, vulnerability of information security of automotive embedded systems has been indicated. Especially, Trojan, which falsifies programs of Electronic Control Unit (ECU), has serious threat for the safety of a car. Therefore, measures against the Trojan are particularly important to secure automotive embedded systems. However, few studies for the Trojan on automotive embedded systems...
In existing trust establishment researches, the decision making accuracy and decision delay of received event message are both the outstanding problems in VANETs. Especially on the decision delay, the delay of alert event might lead to traffic accident and injury. In this paper, we propose an adaptive decision making model which can make decision quickly by the effective and quick assistance of the...
The state-of-the-art improvements in cellular communication and ubiquitous availability of internet have led to significant breakthroughs in intelligent transportation systems where connectivity, autonomous driving and infotainment play a pivotal role in the enhanced driving experience. The Vehicle ad hoc Networks (VANET) have emerged as a distinguished branch of wireless communication pertaining...
Each year the number of passengers travelling around the world is steadily increasing. Hence, the efficient handling of border crossings while maintaining a high security is a demanding challenge for the future. In this work we present the key security components for a novel proposed one-stop-shop (OSS) border control system, which tries to achieve greatest throughput of travelers while applying highest...
Congestion control is an important research issue to ensure safe and reliable vehicle to vehicle communication by using the limited resource available in vehicular ad hoc network. It supports the communication of safe and unsafe messages among vehicles. The present work controls channel congestion dynamically by reducing the rate of transmission of messages among vehicles. The transmission rate of...
Near Field Communication technology is an emerging concept in the field of data transfer and is rapidly catching on the market by replacing technologies such as Bluetooth, infrared and other modes of data sharing because of its ease of use and diverse scopes that are available using this technology. The NFC technology basically is a descendant of RFID (Radio Frequency Identification) technology, which...
Vehicular networks have been considered as an important compliment in providing ubiquitous communication services to the future wireless networks. Existing vehicular ad hoc networks (VANETs) allow the vehicles to access to Internet by dedicated roadside units (RSUs). In order to resolve the problem resulting from limited RSUs, insufficient resources and unsatisfied user experience, we propose to take...
In many emerging security applications, a property of a system, that may reveal important details about its behaviour, needs to be kept secret (opaque) to outside observers (intruders). Motivated by such applications, several authors have formalized, analyzed, and described methods to verify notions of opacity in discrete event systems of interest. This paper offers a review of various definitions...
Vehicular ad hoc networks (VANETs) are the future of vehicular technology and Traffic Information Systems. In VANETs vehicles communicate by different types of beacon messages to inform each other of their position and speed to give them a sense of traffic around them. Vehicles can also send emergency messages in case of accidents or other hazards. The very fast moving nodes have to act quickly based...
Vehicular ad hoc networks (VANETs) are advanced instances of mobile ad hoc networks with the aim of enhancing the safety and efficiency of road traffic. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. Traffic accident notifications) to other vehicles and remind drivers to change their routes immediately or slow down to avoid dangers. However, some concerns on security...
Vehicular Ad hoc Network (VANET) has become an attractive topic in fields of academia and industry due to its potential role in helping to improve traffic management and safety on the road. The information transmitted over a vehicular network is sensitive and can affect important safety decisions. However, they face various types of security attacks, such as Denial of Service (DOS) attacks. DOS and...
Statistical data show that losses caused by railway transportation system accidents are far more severe than those incurred by highway accidents, and most of the railway accidents occur at level crossings. It is necessary and urgent to design a reliable railway crossing security system to effectively reduce the number of accidents. Through the deployment of sensors, this paper discusses how to construct...
In the near future, vehicles will establish a spontaneous connection over a wireless radio channel, coordinating actions and information. Security infrastructure is most important in such a hazardous scope of vehicles communication for coordinating actions and avoiding accidents on the roads. One of the first security issues that need to be established is authentication. Vehicle authentication with...
This paper proposes an application-friendly group signature (GS) model for wireless ad hoc network like Wireless Sensor Networks (WSN) or Vehicle ad hoc Network (VANET). Our new GS properties can be used to carry out potential solution to some real life problems. We modify Boneh, Boyen and Shacham (BBS) short GS to meet a restricted, but arguably sufficient set of privacy properties. In particular,...
Location-based services relying on in-vehicle devices are becoming so common that it is likely that, in the near future, devices of some sorts will be installed on new vehicles by default. The pressure for a rapid adoption of these devices and services is not yet counterbalanced by an adequate awareness about system security and data privacy issues. For example, service providers might collect, elaborate...
Aside from massive advantages in safety and convenience on the road, Vehicular Ad Hoc Networks (VANETs) introduce security risks to the users. Proposals of new security concepts to counter these risks are challenging to verify because of missing real world implementations of VANETs. To fill this gap, we introduce VANETsim, an event-driven simulation platform, specifically designed to investigate application-level...
In a HD traffic bayonet, HD camera captures a few images once the vehicles drive cross the underground sensing coils. Time interval between two adjacent images is usually uncertain. In this paper, a background modeling and foreground extraction scheme is proposed for these images captured in the bayonet. The proposed scheme contains three modules: initial background modeling, foreground extraction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.