How to Design Connected and Automated Vehicles while taking Legal and Ethical Concerns into consideration

blog-18-How-to-Design-Connected-and-Automated-Vehicles
Authors: Paolo Balboni, Kate Francis, Anastasia Botsi Edited by: Vito Pavese This blog post is based on a paper presented by Prof. Dr. Paolo Balboni at the SETN 2020 Workshop on AI, Law, and Ethics, hosted by the 11th Hellenic Conference on AI special events section. Connected and Automated Vehicles (CAVs), as is often the case with technologies ba...
Continue reading

IoV AS THE BASIS FOR SUSTAINABLE MOBILITY AND DYNAMIC LOW EMISSION ZONES (Part ΙΙ)

blog-9-IoV-as-the-basis-for-sustainable-mobility-part-2
Authors: Antonio J. Jara: This email address is being protected from spambots. You need JavaScript enabled to view it. David Babyack: This email address is being protected from spambots. You need JavaScript enabled to view it. Cities, public administrations, and transports are encouraged to make better and safer mobility systems where traffic is based on IoV technology that uses information as environmental pollution, particulate matter, weather, noise levels, and the influx of people to issue alert...
Continue reading

IoV AS THE BASIS FOR SUSTAINABLE MOBILITY AND DYNAMIC LOW EMISSION ZONES(Part I)

blog-9-IoV-as-the-basis-for-sustainable-mobility-part-1
Authors: Antonio J. Jara: This email address is being protected from spambots. You need JavaScript enabled to view it. John David Babyack: This email address is being protected from spambots. You need JavaScript enabled to view it. Despite the technological advances carried out in the structure of smart cities, the implementation of IoV (Internet of Vehicles) technology is still in the development phase with pilot tests to create an ecosystem of connected vehicles and autonomous (CAV). We can ...
Continue reading

Social Engineering

blog-17-Social-Engineering
Author: Matthewson Quentin Social engineering is a type of attack that uses emotional responses and interactions between persons to gain information or access to specific software, network, or knowledge. Connected Autonomous Vehicles (CAVs) are built and assembled by manufacturers that outsource various parts, sensors, and equipment to other compan...
Continue reading

Network Anomalies Detection in Real Urban Infrastructure

blog-16-Network-Anomalies-Detection-in-Real-Urban-Infrastructure
Authors: Benedetto Marco Serinelli This email address is being protected from spambots. You need JavaScript enabled to view it.  Anastasija Collen This email address is being protected from spambots. You need JavaScript enabled to view it.  Niels Alexander Nijdam This email address is being protected from spambots. You need JavaScript enabled to view it.  The ambition of the nIoVe project is to improve protection against Connected and Autonomous Vehicle (CAV) cyber-threats. Thus, nIoVe objective is to design a robust, resilient, a...
Continue reading

The Challenges of Securing Autonomous Vehicles

blog-13-The-Challenges-of-Securing-Autonomous-Vehicles
 Authors:  Kenny Sahr - Content & Digital Marketing Manager,                    Uzi Mishan - Argus senior Technical Project Manager Securing autonomous vehicles is a major task for the automotive industry. The more connectivity added to a vehicle, the larger the attack s...
Continue reading

Anomaly detection in autonomous vehicle sensor data

blog-12-Anomaly-detection-in-autonomous-vehicle-sensor-dat_20210623-102226_1
Authors:  Simon Bouget, David Eklund, Abdulrahman Kanaa The nIoVe project aims to develop a holistic framework for the cybersecurity of the Internet of Vehicles (IoV), and in particular self-driving Autonomous Vehicle. As part of this framework, one of the components, the Network and Connected Devices Behaviour Anomaly Detection, process all t...
Continue reading

Enhancing CARLA simulator with CAN bus

blog-14-Enhancing-CARLA-simulator-with-CAN-bus
Author:  Konstantina TsakiriEdited by:  Aikaterini Kokoliou CARLA (Car Learning to Act) [1] is an open-source simulator for urban driving supporting multiple purposes of autonomous driving models, e.g., training, prototyping, and validation. Furthermore, the urban environment provided by CARLA includes a multitude of vehicle models, build...
Continue reading

The Need for a Multilayer Cybersecurity Framework for IoV

blog-15-The-Need-for-a-Multilayer-Cybersecurity-Framework
Author: Mohammad Hamad Edited by: Jan Lauinger  Introduction During the last decade, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems distributed throughout the car, known as Electronic Control Units (ECUs). Each of these ECUs runs several software componen...
Continue reading

Using machine learning to speed up attack attribution on the Internet of Vehicles ecosystem

blog-11--Using-machine-learning-to-speed-up-attack-attribution-on-the-Internet-of-Vehicles-ecosystem
Authors: George Raptis, Christina Katsini Edited by: Christos Alexakos Internet of Vehicles (IoV) ecosystems attract a wide and diverse range of threats such as jamming, eavesdropping, and interference, which could influence system stability, robustness, security, and privacy [1]. Their successful confrontation is critical, considering that such vu...
Continue reading

Simulation of Connected Autonomous Vehicles

blog-8-Simulation-of-Connected-Autonomous-Vehicles
Author: Christina Malliou Connected Autonomous Vehicles (CAVs) rely heavily on data received from their environment and their sensors. The information from the traffic lights or the roadside units (RSUs) allows to handle traffic scenarios, adapt routes, avoid congestion and enhance traffic efficiency or even reduce CO2 emission. Through their senso...
Continue reading

Trust and the ethics of Connected and Automated Vehicles

blog-10--Trust-and-the-ethics-of-Connected-and-Automated-Vehicles
  Authors: Kate Francis, Vito Pavese, Anastasia Botsi As is the case with the vast majority of new and emerging technologies, Connected and Autonomous Vehicles (CAVs) have a significant potential to positively impact society. Once widely adopted, CAVs may contribute to reducing automotive accidents and consequently, fatalities.[1]For...
Continue reading

Using honeypots as an additional layer of security against cyber threats in autonomous vehicles' infrastructure

blog-3-using-honeypots-additional-layer-3
Author: Athanasios Papadakis Edited by: Kristina Livitckaia The autonomous vehicle (AV) ecosystem creates a rapidly emerging domain of advanced research, entrepreneurship, and innovation. Autonomous vehicles range from individual cars to taxis and shuttles and facilitate massive public autonomous transport services development. With the f...
Continue reading

Improving Automotive Cybersecurity with ISO/SAE 21434

blog-1-improving-autom-cybersec-iso-3
Author: Konstantina Tsakiri Edited by: Aikaterini Kokoliou, Kristina Livitckaia In the era of Connected and Autonomous Vehicles (CAVs), as they could be considered a tempting target for cyber-attacks, the vulnerability aspect should be thoroughly considered and analyzed in the vehicles' design and supporting systems and components. ISO/SAE 214...
Continue reading

Improving fluidity in cities with intelligent traffic lights

blog-7-improving-fluidity
 Author: Matthewson Quentin Connected Autonomous Vehicles (CAVs) will get more and more present on the roads in the future. They are a great way to improve traffic fluidity and thus reduce pollution. As long as other non-autonomous vehicles are present, traffic lights will be mandatory to coordinate the flow of cars. Nowadays, in most countrie...
Continue reading

Most critical risks for Web-based applications

blog-6-most-critical-risks-3
Authors: Benedetto Marco Serinelli,Meriem Benyahya,Niels A. Nijdam  The Open Web Application Security Project (OWASP) Top 10 is a standard awareness document1 that widely describes web applications' most critical security risks. The analysis below gives insight into such vulnerabilities, as depicted in Figure 1. Figure 1: Potential risks for W...
Continue reading

Welcome to nIoVe

blog-5-welcome-to-niove-3
nIoVe project is a 36 months European project, co-founded by the European Union's Horizon 2020. nIoVe brings together European excellence in order to build an innovative cybersecurity of CAVs and IoV ecosystem solution to support automotive manufacturers and transport providers. The Consortium is highly interdisciplinary and trans-national. It cons...
Continue reading

nIoVe Project - Virtualized Honeypots and Honeyfarm Demonstration

blog-4-virtualized-honeypots-and-honeyfarm-3
This demonstration shows how the nIoVe operator configures and deploys a virtualized HoneyFarm to a vehicle. The deployed virtual infrastructure is able to capture attack propagation trends through an integrated monitor tool (Wazuh) and analyze the attack mechanisms and behavior of the attackers. You can find also the video available on nIoVe's You...
Continue reading

Identity Management in Internet of Vehicles based on Distributed Ledger Technology

blog-2-identity-management-ioV-3
Author: Jan LauingerEdited by: Mohammad Hamad, Sebastian Steinhorst 1. Introduction With the rise of technology in the automotive industry, vehicles are more and more connected to the cloud and roadside infrastructure, thus, defining the term "Internet of Vehicles" (IoV). In addition to that, environment sensing, enabled by advanced senso...
Continue reading