Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention

Author(s):  
Mhafuzul Islam ◽  
Mashrur Chowdhury ◽  
Hongda Li ◽  
Hongxin Hu

A connected vehicle (CV) environment is comprised of diverse computing infrastructure, data communication and dissemination, and data collection systems that are vulnerable to the same cyberattacks as all traditional computing environments. Cyberattacks can jeopardize the expected safety, mobility, energy, and environmental benefits from CV applications. As cyberattacks can lead to severe consequences such as traffic incidents, it has become one of the primary concerns in CV applications. In this paper, we evaluate the impact of cyberattacks on the vehicle-to-infrastructure (V2I) network from a V2I application point of view. Then, we develop a novel V2I cybersecurity architecture, named CVGuard, which can detect and prevent cyberattacks on the V2I applications. In designing CVGuard, key challenges, such as scalability, resiliency and future usability were considered. A case study using a distributed denial of service (DDoS) attack on a V2I application, “Stop Sign Gap Assist (SSGA)” application, shows that CVGuard was effective in mitigating the adverse safety effects created by a DDoS attack. In our case study, because of the DDoS attack, conflicts between the minor and major road vehicles occurred at an unsignalized intersection, which could have caused crashes. A reduction of conflicts between vehicles occurred because CVGuard was in operation. The reduction of conflicts was compared based on the number of conflicts before and after the implementation and operation of the CVGuard security platform. Analysis revealed that the strategies adopted by CVGuard were successful in reducing the conflicts by 60% where a DDoS attack compromised the SSGA application at an unsignalized intersection.

Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5298
Author(s):  
Ladislav Huraj ◽  
Marek Šimon ◽  
Tibor Horák

Smart devices along with sensors are gaining in popularity with the promise of making life easier for the owner. As the number of sensors in an Internet of Things (IoT) system grows, a question arises as to whether the transmission between the sensors and the IoT devices is reliable and whether the user receives alerts correctly and in a timely manner. Increased deployment of IoT devices with sensors increases possible safety risks. It is IoT devices that are often misused to create Distributed Denial of Service (DDoS) attacks, which is due to the weak security of IoT devices against misuse. The article looks at the issue from the opposite point of view, when the target of a DDoS attack are IoT devices in a smart home environment. The article examines how IoT devices and the entire smart home will behave if they become victims of a DDoS attack aimed at the smart home from the outside. The question of security was asked in terms of whether a legitimate user can continue to control and receive information from IoT sensors, which is available during normal operation of the smart home. The case study was done both from the point of view of the attack on the central units managing the IoT sensors directly, as well as on the smart-home personal assistant systems, with which the user can control the IoT sensors. The article presents experimental results for individual attacks performed in the case study and demonstrates the resistance of real IoT sensors against DDoS attack. The main novelty of the article is that the implementation of a personal assistant into the smart home environment increases the resistance of the user’s communication with the sensors. This study is a pilot testing the selected sensor sample to show behavior of smart home under DDoS attack.


Energies ◽  
2019 ◽  
Vol 12 (11) ◽  
pp. 2166 ◽  
Author(s):  
Sara Rajabi Hamedani ◽  
Tom Kuppens ◽  
Robert Malina ◽  
Enrico Bocci ◽  
Andrea Colantoni ◽  
...  

It is unclear whether the production of biochar is economically feasible. As a consequence, firms do not often invest in biochar production plants. However, biochar production and application might be desirable from a societal perspective as it might entail net environmental benefits. Hence, the aim of this work has been to assess and monetize the environmental impacts of biochar production systems so that the environmental aspects can be integrated with the economic and social ones later on to quantify the total return for society. Therefore, a life cycle analysis (LCA) has been performed for two potential biochar production systems in Belgium based on two different feedstocks: (i) willow and (ii) pig manure. First, the environmental impacts of the two biochar production systems are assessed from a life cycle perspective, assuming one ton of biochar as the functional unit. Therefore, LCA using SimaPro software has been performed both on the midpoint and endpoint level. Biochar production from willow achieves better results compared to biochar from pig manure for all environmental impact categories considered. In a second step, monetary valuation has been applied to the LCA results in order to weigh environmental benefits against environmental costs using the Ecotax, Ecovalue, and Stepwise approach. Consequently, sensitivity analysis investigates the impact of variation in NPK savings and byproducts of the biochar production process on monetized life cycle assessment results. As a result, it is suggested that biochar production from willow is preferred to biochar production from pig manure from an environmental point of view. In future research, those monetized environmental impacts will be integrated within existing techno-economic models that calculate the financial viability from an investor’s point of view, so that the total return for society can be quantified and the preferred biochar production system from a societal point of view can be identified.


2010 ◽  
Vol 04 (02) ◽  
pp. 239-283 ◽  
Author(s):  
ELENA SIMPERL

The ability to efficiently and effectively reuse ontologies is commonly acknowledged to play a crucial role in the large scale dissemination of ontologies and ontology-driven technology, being thus a pre-requisite for the ongoing realization of the Semantic Web. In this article, we give an account of ontology reuse from a process point of view. We present a methodology that can be utilized to systematize and monitor ontology engineering processes in scenarios reusing available ontological knowledge in the context of a particular application. Notably, and by contrast to existing approaches in this field, our aim is to provide means to overcome the poor reusability of existing resources — rather than to solve the more general issue of building new, more reusable knowledge components. To do so we investigate the impact of the application context of an ontology — in terms of tasks this ontology has been created for and will be utilized in — has on the feasibility of a reuse-oriented ontology development strategy and provide guidelines that take these aspects into account. The applicability of the methodology is demonstrated through a case study performed in collaboration with an international eRecruitment solution provider.


2013 ◽  
Vol 7 (3) ◽  
pp. 211-221
Author(s):  
Viktor Pacholík

This list deals with the impact of the Halliwick Swimming Concept on subjective experience and psychical states of people with physical impairment. By means of the Halliwick Swimming Concept, that consisted of 10 swimming lessons, we observed the psychical response of the tested persons to individual lessons as well as to the whole programme within a frame of a case study. The acquired data indicate a positive impact of the swimming programme in the field of elimination of negative psychical state in water environment such as anxiety, discomfort and despondency and gradual increase of psychical well-being, activity and feelings of power and energy connected with positive expectations. Most of these changes proved not only in individual lessons, but also from the point of view of the whole programme evaluation. This paper has been written within a project OP VK CZ.1.07/2.4.00/17.0037 „Development of Pedagogical and Research Activities within the Department of Social Sciences in Sport at the FSpS MU“.


Energies ◽  
2021 ◽  
Vol 14 (16) ◽  
pp. 4976
Author(s):  
Karina Bedrunka ◽  
Łukasz Mach ◽  
Anna Kuczuk ◽  
Anna Bohdan

The research carried out describes the provision of COVID-19 funding in individual EU Member States under the ongoing operational programmes of the EU financial perspective in the period 2014–2020. This was followed by identification of the most important areas of support and the amounts allocated to them for Poland and its sixteen voivodeships under the available EU funds from the 2014–2020 perspective. Types and forms of support for health services from the funds of the Regional Operational Programme for the Opolskie Voivodeship 2014–2020 (ROP WO) were analysed in detail. The obtained results showed that Italy, Spain, and Poland provided the largest values of support under the available operational programmes from 2014–2020 to combat the effects of COVID-19. In Poland, funding was mainly provided by the European Regional Development Fund, with the dominant support allocated to entrepreneurship and health care. In the Opolskie voivodeship, which is the case study, the additional financing in the health area concerns: personal protective equipment, equipment, construction works, oxygen installations, and waste water management. In this article, a literature analysis of the issue was conducted prior to the research process, which included theories of post-2007 crises, including the COVID-19 pandemic. The focus is on the theoretical background and research showing the impact of crises from the point of view of social, economic, and ecological dimensions, i.e., from the point of view of sustainable development. It also presents planned and implemented public intervention to offset the negative effects of COVID-19 in 2020 from structural funds in EU countries, including Poland and its 16 voivodeships.


TEM Journal ◽  
2020 ◽  
pp. 899-906

One of the most notorious security issues in the IoT is the Distributed Denial of Service (DDoS) attack. Using a large number of agents, DDoS attack floods the host server with a huge number of requests causing interrupting and blocking the legitimate user requests. This paper proposes a detection and prevention algorithm for DDoS attacks. It is divided into two parts, one for detecting the DDoS attack in the IoT end devices and the other for mitigating the impact of the attack placed on the border router. Also, it has the ability to differentiate the High-rate from the Lowrate DDoS attack accurately and defend against these two types of attacks. It is implemented and tested against different scenarios to dissect their efficiency in detecting and mitigating the DDoS attack.


2019 ◽  
Vol 9 (15) ◽  
pp. 3182 ◽  
Author(s):  
Salvador García-Ayllón ◽  
Antonio Tomás ◽  
José Luis Ródenas

The analysis of damage in cities after an earthquake to implement mitigation strategies of seismic risk is a complex job that is usually full of uncertainties. Numerous variables affect the final result of the observable damage in a set of buildings in an urban area. The use of methodologies capable of providing global explanations beyond the traditional unidisciplinary approach of disciplines, such as structural analysis, earthquake engineering, geotechnics, or seismology, can be very useful for improving the behavior of our cities against earthquakes. This article presents geostatistical post-earthquake analysis, an innovative approach in this field of research based on GIS spatial statistical tools to evaluate the importance of the different variables after an earthquake that may have caused damage in a city. This new framework will be applied to analyze, from a geostatistical perspective, the damage levels observed in the city of Lorca (Spain) after the earthquake of 2011; a case study where various studies have proposed different measures to mitigate the impact of future earthquakes as a consequence of focusing on different phenomena as the main variable for the damage produced. A bivariate GIS assessment will allow spatial correlation of the problems detected from a statistical point of view (inadequate design of buildings, age of the real estate stock, inefficient urban planning configurations, geological risk, etc.) and the different levels of damage that the technicians who participated in the post-earthquake phase evaluated in the city. The results obtained will allow one to hierarchize the importance of the different detected phenomena to prepare the city better against future earthquakes and to elaborate an improved seismic mitigation strategy.


2019 ◽  
Vol 0 (0) ◽  
Author(s):  
Rizwan Aslam Butt ◽  
M. Faheem ◽  
M. Waqar Ashraf ◽  
Attaullah Khawaja ◽  
Basit Raza

AbstractNetwork security is an important component of today’s networks to combat the security attacks. The passive optical network (PON) works at the medium access layer (MAC). A distributed denial of service (DDOS) attack may be launched from the network and transport layers of an Optical Network unit (ONU). Although there are various security techniques to mitigate its impact, however, these techniques cannot mitigate the impact on the MAC Layer of the PON and can cause an ONU to continuously drain too much bandwidth. This will result in reduced bandwidth availability to other ONUs and, thus, causing an increase in US delays and delay variance. In this work we argue that the impact of a DDOS attack can be mitigated by improving the Dynamic bandwidth assignment (DBA) scheme which is used in PON to manage the US bandwidth at the optical line terminal (OLT). The present DBA schemes do not have the capability to combat a security attack. Thus, this study, uses a machine learning approach to learn the ONU traffic demand patterns and presents a security aware DBA (SA-DBA) scheme that detects a rogue (attacker) ONU from its traffic demand pattern and limits its illegitimate bandwidth demand and only allows it the bandwidth assignment to it as per the agreed service level agreement (SLA). The simulation results show that the SA-DBA scheme results in up to 53%, 55% and 90% reduced US delays and up to 84%, 76% and 95% reduced US delay variance of T2, T3 and T4 traffic classes compared to existing insecure DBA schemes.


2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Yu Sun ◽  
Yin Cui

Urban infrastructure is a necessary condition for urban development. Its use generates three benefits which are economic, social, and environmental benefits of urban infrastructure. They are the positive impacts on urban economy, society, and environment generated by the use of urban infrastructure, respectively. This paper evaluates the coupling coordination among these three benefits taking four Chinese autonomous municipalities as examples. These four cities have large-scale urban infrastructure but its basic function has not been fully fulfilled. Whether three benefits of urban infrastructure have been developed in harmony or not was unclear. We analyzed the coordinated development among three benefits by constructing coupling coordination degree model and studied the impacts of three benefits on their coupling coordination degree using panel regression model. The results showed that the levels of coordinated development among three benefits of urban infrastructure were low in these four cities and the impact of social benefit on their coordinated development was largest. Therefore, urban infrastructure social benefit needs to be improved mainly in these four cities.


Sign in / Sign up

Export Citation Format

Share Document