blog-46-Cybersecurity-in-the-era-of-Electric-Vehicle_20220831-054744_1
Cybersecurity in the era of Electric Vehicles
Super User
Blog
Authors: Konstantina Tsakiri In the latest WCX (World Congress Experience), organized by SAE (Society of Automotive Engineers) [1], a separate section was dedicated to cybersecurity and the security of charging electric cars. An expert panel, coordinated by the director of engineering at the Eaton Cybersecurity Center of Excellence, John Krzeszewsk...
blog-45-Automotive-Cybersecurity-Standards-and-Regulations-An-Overview-_part2
Automotive Cybersecurity Standards and Regulations: An Overview - Part 2
Super User
Blog
Authors: Dajana Gacic and Mohammad Hamad This is Part 2 of the blog article "Automotive Cybersecurity Standards and Regulations: An Overview"! Make sure to read Part 1 first! ISO Standards The most recent cybersecurity standards developed by International Organization for Standardization for the automotive sector are ISO/SAE 21434 and ISO/DIS 24089...
blog-44-Automotive-Cybersecurity-Standards-and-Regulations-An-Overview-_part1
Automotive Cybersecurity Standards and Regulations: An Overview - Part 1
Super User
Blog
Authors: Dajana Gacic and Mohammad Hamad This is Part 1 of the blog article "Automotive Cybersecurity Standards and Regulations: An Overview"! Stay tuned for Part 2! Introduction The progress in the development of modern vehicles mostly comes because of successful developments in the area like software and electronic components. It is importan...
blog-43-Video-surveillance-in-the-public-transport-legal-framework-allowing-the-collection-and-processing-of-images-onboard-TPG-vehicles_part2
Video surveillance in the public transport: legal framework allowing the collection and processing of images onboard TPG vehicles - Part 2
Super User
Blog
Authors: Matthewson Quentin and Avramov Philippe This is Part 2 of the blog article "Video surveillance in the public transport: legal framework allowing the collection and processing of images onboard TPG vehicles"! Make sure to read Part 1 first! Question. What are the legal bases that legitimizes the processing of personal data through video sur...
blog-42-Video-surveillance-in-the-public-transport-legal-framework-allowing-the-collection-and-processing-of-images-onboard-TPG-vehicles_part-1
Video surveillance in the public transport: legal framework allowing the collection and processing of images onboard TPG vehicles - Part 1
Super User
Blog
Authors: Matthewson Quentin and Avramov Philippe This is Part 1 of the blog article "Video surveillance in the public transport: legal framework allowing the collection and processing of images onboard TPG vehicles"! Stay tuned for Part 2! Question. What are the legal bases that legitimizes the processing of personal data through video surveil...
blog-41-Analysing-V2X-signals-in-the-Simulated-Environment-of-nIoVe
Analyzing V2X signals in the Simulated Environment of nIoVe
Super User
Blog
Authors: Pavlos Dinopoulos Among the core functionalities of V2X analyzer is the attack detection. From architectural point of view, the recommended technique for a Machine Learning Model is to transform to a producer-consumer problem. Producer is the training stage of the model, where the weights are adjusted, and the detection/prediction stage ca...
blog-40-Communication-and-Dissemination-in-research--Part-2
Communication and Dissemination in research – Part 2
Super User
Blog
Author: Christina Malliou The nIoVe dissemination strategy and activities ensure that the project's outcomes, either this refers to the concepts, the scientific results, the results of validation work or the policy and market recommendations, are widely disseminated. However, the goal that was set when the dissemination strategy was first designed ...
blog-39-How-Fuzzing-Complements-Penetration-Testing-Part-II
How Fuzzing Complements Penetration Testing for Optimal Vehicle Cybersecurity – Part II
Super User
Blog
Authors: Argus Security Architecture Team This is Part II of the blog article "How Fuzzing Complements Penetration Testing for Optimal Vehicle Cybersecurity", make sure to read Part I first! This article explains why vehicle manufacturers are introducing fuzzing as a complement to pen testing in order to comply with regulations and achieve optimal ...
blog-38-How-Fuzzing-Complements-Penetration-Testing-Part-I
How Fuzzing Complements Penetration Testing for Optimal Vehicle Cybersecurity – Part I
Super User
Blog
Authors: Argus Security Architecture Team Penetration (pen) testing is a well-known method for exposing cybersecurity vulnerabilities and other potential security gaps depending on the customer objectives, and validating that the security requirements were implemented correctly. Whereas the traditional pen testing is a manual process, fuzzing is an...
blog-37-Web-Application-Penetration-Testing-on-the-Visual-Analytics
Web Application Penetration Testing on the Visual Analytics Suite of the nIoVe Platform
Super User
Blog
Author: Mike AnastasiadisEdited by: Kristina Livitckaia This post describes a penetration testing methodology used to test the security of the nIoVe Visual Analytics Suite (VAS) platform. Following the previous vulnerability assessment post1 describing the testing of the nIoVe infrastructure's security, it was necessary to test the web application ...
blog-36-Communication-and-Dissemination-in-research--Part-1
Communication and Dissemination in research – Part 1
Super User
Blog
Author: Christina Malliou Dissemination and communication currently play a key role in research projects. Their importance has been recognized by the European Union and the frameworks for the current and upcoming projects include and encourage the proper communication and dissemination of the research results. In addition to this, a broader public ...
blog-34-Connected-Automated-Vehicles-for-Public-Transportation--Part-2
Connected Automated Vehicles for Public Transportation – Part 2
Super User
Blog
Authors: The Information Security Group of UNIGE The idea of a dream So far we understand the problems that were raised by TPG's innovation expert, namely regulation, funding, and technology. However, we want to go a bit further. For achieving the dream of a future CAV urban public transportation, we need to realize what it means to go full scale, ...
blog-34-Connected-Automated-Vehicles-for-Public-Transportation--Part-1
Connected Automated Vehicles for Public Transportation – Part 1
Super User
Blog
Authors: The Information Security Group of UNIGE On the sixth of April 2022, Prof. Dimitri Konstantas, from the University of Geneva, gave a talk on the current state of automated vehicles for public transport[1]. Deriving his experience from the coordination of the Horizon 2020 Avenue project[2] and participation in the Horizon 2020 SHOW proj...
blog-33-V2X-Data-interoperability-build-on-ETSI-NGSI-LD-and-Smart-Data-Model_20220512-115921_1
V2X Data interoperability build on ETSI NGSI-LD and Smart Data Models
Super User
Blog
Author:  David Fernández Ros With the goal of interoperability in mind, the nIoVe researchers have focused their efforts on bringing this kind of feature to the nIoVe project through the compilation of the most advanced European aligned techniques in order to ensure to meet the four key requirements to achieve a complete interoperability ...
blog-32-Machine-Deep-Learning-anti-tampering-techniques
Machine/Deep Learning anti-tampering techniques for early identification of CANBus protocol attacks
Super User
Blog
Authors: George Aivatoglou, Nikos OikonomouEdited by Kristina Livitckaia The Internet of Vehicles (IoV) has evolved into a large focus domain for threat actors due to its critical nature. Since the IoV sector is still in its infancy, many aspects are not designed with security in mind and, hence, provide a variety of attack vectors to threat actors...
blog-30-Anomaly-detection-in-sensor-data-revisited
Anomaly detection in sensor data revisited
Super User
Blog
Authors: David Eklund, Simon Bouget, Abdulrahman Kanaa This blog post continues the exploration of anomaly detection in sensor data presented in earlier posts and goes more into detail regarding the results. The nIoVe project aims to develop a holistic framework for the cybersecurity of the Internet of Vehicles (IoV), and in particular self-driving...
blog-31-Ethical-and-legal-design-of-CAVs
Ethical and legal design of CAVs: The need for transparency and the “human at the center” perspective
Super User
Blog
Authors: ICT Legal Consulting Whilst Connected Autonomous Vehicles (CAVs) are considered to be a major benefit to society, careful attention to their legal and ethical design must be given. Several challenges arise when trying to foster trust and public engagement as well as complying with privacy and data protection rules, specifically where littl...
blog-28-Handling-Automotive-Cybersecurity-Vulnerabilities
Handling Automotive Cybersecurity Vulnerabilities
Super User
Blog
Author: Konstantina Tsakiri As vehicles become more sophisticated have introduced an issue to deal with, the cybersecurity risk. Most of the challenges to be faced are inherent to software security since the main parts of the autonomous systems are software and electronics based. The vulnerability to cyber threats of the aforementioned may affect d...
blog-27-Simulation-based-Attack-Data-Generation
Simulation-based Attack Data Generation
Super User
Blog
Authors: Jan Lauinger, Mohammad Hamad, Sebastian Steinhorst   IntroductionThe emerging reality of self-driving cars depends on a massive scale of data provided by integrated sensors and simulation environments. Recently machine learning techniques have become more and more popular in supporting control algorithms within modern cars. The existe...
blog-26-Classification-of-autonomous-vehicles
Classification of autonomous vehicles
Super User
Blog
Author: Matthewson Quentin The appearance of the first autonomous vehicles did not wait for the development of technologies such as radar, cameras, LiDAR scanners or communication (V2V). Indeed, throughout history, numerous projects have led to the development of autonomous vehicles, each capable of a certain degree of autonomy. In 1478, Leonardo d...
blog-25-Vehicular-communications-based-on-ETSI-TR-102-638
Vehicular communications based on ETSI TR 102 638
Super User
Blog
Author: Christina Malliou Vehicular communications take advantage of the Intelligent Transport System (ITS). The overall ITS environment consists of the ITS Stations (ITS-S) that are able to communicate with other infrastructures. These include the communication between vehicles (Vehicle to Vehicle or V2V), the communication between the vehicles an...
blog-24-Vulnerabilities-Management-Countdown
Vulnerabilities Management Countdown
Super User
Blog
Author:  Hadar Almog, Argus Product Manager.Software vulnerabilities are weaknesses or flaws in computer code that could allow an attacker to gain control of a system. For as long as humans continue to write code, vulnerabilities will exist. Thus, it's imperative that organizations invest in effectively detecting and mitigating ...
blog-23-An-Information-Sharing-Platform-supporting-vendors-as-CAV-manufacturers-collaboration-against-cyberattacks
An Information Sharing Platform supporting vendors as CAV manufacturers collaboration against cyberattacks
Super User
Blog
John Giannikos, Christos Raftopoulos, Christos Alexakos Industrial Systems Institute/ATHENA Research Center, Greece Introduction  Internet of Vehicles is a complex system of systems, meaning that it consists of a variety of different systems, devices, and software applications. Especially, in the case of Connected and Autonomous Vehicles (CAV)...
blog-22-Penetration-Test-and-Vulnerability-Assessment-on-the-nIoVe-Ecosystem
Penetration Test and Vulnerability Assessment on the nIoVe Ecosystem
Super User
Blog
Author: Mike Anastasiadis, Centre for Research and Technology-Hellas (CERTH) / This email address is being protected from spambots. You need JavaScript enabled to view it. Edited by: Kristina Livitckaia, Centre for Research and Technology-Hellas (CERTH) / This email address is being protected from spambots. You need JavaScript enabled to view it. Scope This blog describes the penetration testing and vulnerability assessment methodology used to test the nIoVe platform infrastructure. The project's deve...
blog-21-Validating-nIoVe-user-centred-approach-through-expert-interviews
Validating nIoVe user-centered approach through expert interviews
Super User
Blog
Authors: Simon Bouget (This email address is being protected from spambots. You need JavaScript enabled to view it.), Asreen Rostami (This email address is being protected from spambots. You need JavaScript enabled to view it.) The innovative approach adopted by the nIoVe consortium has to be validated with stakeholders of the Internet-of-Vehicle (IoV) ecosystem, to ensure that the work performed in this project will be of real utility to the industry in the future. One part of this validati...
blog-20-Cybersecurity--Data-Privacy
Cybersecurity & Data Privacy Certification framework for CAVs
Super User
Blog
Authors: Meriem Benyahya (This email address is being protected from spambots. You need JavaScript enabled to view it.), Anastasija Collen(This email address is being protected from spambots. You need JavaScript enabled to view it.) and Niels Alexander Nijdam (This email address is being protected from spambots. You need JavaScript enabled to view it.).By: Centre Universitaire d'Information, University of Geneva. This blog post is based on work in progress and a poster presented within CRITIS2021, a conference held on 27-29 September 2021.Protecting...
blog-19-How-can-health-insurance-providers-justify-the-processing-of-health-data-in-the-context-of-automated-vehicles
How can health insurance providers justify the processing of health data in the context of automated vehicles?
Super User
Blog
By ICT Legal Consulting Automated vehicles are becoming increasingly prevalent in our society with many systems being created with more automated features to allow the driver's attention to decrease whilst giving more control to the automated system to drive the vehicle. In saying that, however, it may be that the more automated the vehicle becomes...
blog-18-How-to-Design-Connected-and-Automated-Vehicles
How to Design Connected and Automated Vehicles while taking Legal and Ethical Concerns into consideration
Super User
Blog
Authors: Paolo Balboni, Kate Francis, Anastasia Botsi Edited by: Vito Pavese This blog post is based on a paper presented by Prof. Dr. Paolo Balboni at the SETN 2020 Workshop on AI, Law, and Ethics, hosted by the 11th Hellenic Conference on AI special events section. Connected and Automated Vehicles (CAVs), as is often the case with technologies ba...
blog-9-IoV-as-the-basis-for-sustainable-mobility-part-2
IoV AS THE BASIS FOR SUSTAINABLE MOBILITY AND DYNAMIC LOW EMISSION ZONES (Part ΙΙ)
Super User
Blog
Authors: Antonio J. Jara: This email address is being protected from spambots. You need JavaScript enabled to view it. David Babyack: This email address is being protected from spambots. You need JavaScript enabled to view it. Cities, public administrations, and transports are encouraged to make better and safer mobility systems where traffic is based on IoV technology that uses information as environmental pollution, particulate matter, weather, noise levels, and the influx of people to issue alert...
blog-17-Social-Engineering
Social Engineering
Super User
Blog
Author: Matthewson Quentin Social engineering is a type of attack that uses emotional responses and interactions between persons to gain information or access to specific software, network, or knowledge. Connected Autonomous Vehicles (CAVs) are built and assembled by manufacturers that outsource various parts, sensors, and equipment to other compan...