It appears you don't have support to open PDFs in this web browser. To view this file, Open with your PDF reader
Abstract
The main goal of the H2020-CARAMEL project is to address the cybersecurity gaps introduced by the new technological domains adopted by modern vehicles applying, among others, advanced Artificial Intelligence and Machine Learning techniques. As a result, CARAMEL enhances the protection against threats related to automated driving, smart charging of Electric Vehicles, and communication among vehicles or between vehicles and the roadside infrastructure. This work focuses on the latter and presents the CARAMEL architecture aiming at assessing the integrity of the information transmitted by vehicles, as well as at improving the security and privacy of communication for connected and autonomous driving. The proposed architecture includes: (1) multi-radio access technology capabilities, with simultaneous 802.11p and LTE-Uu support, enabled by the connectivity infrastructure; (2) a MEC platform, where, among others, algorithms for detecting attacks are implemented; (3) an intelligent On-Board Unit with anti-hacking features inside the vehicle; (4) a Public Key Infrastructure that validates in real-time the integrity of vehicle’s data transmissions. As an indicative application, the interaction between the entities of the CARAMEL architecture is showcased in case of a GPS spoofing attack scenario. Adopted attack detection techniques exploit robust in-vehicle and cooperative approaches that do not rely on encrypted GPS signals, but only on measurements available in the CARAMEL architecture.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 University of Cyprus, KIOS Research and Innovation Center of Excellence, Nicosia, Cyprus (GRID:grid.6603.3) (ISNI:0000000121167908); University of Cyprus, Department of Electrical and Computer Engineering, Nicosia, Cyprus (GRID:grid.6603.3) (ISNI:0000000121167908)
2 Athena Research and Innovation Center, Industrial Systems Institute, Pastras, Greece (GRID:grid.435019.a) (ISNI:0000 0004 0394 1287); University of Patras, Department of Electrical and Computer Engineering, Pastras, Greece (GRID:grid.11047.33) (ISNI:0000 0004 0576 5395)
3 i2CAT Foundation, Barcelona, Spain (GRID:grid.424749.8); Universitat Politècnica de Catalunya, Barcelona, Spain (GRID:grid.6835.8)
4 i2CAT Foundation, Barcelona, Spain (GRID:grid.424749.8)
5 University of Patras, Department of Electrical and Computer Engineering, Pastras, Greece (GRID:grid.11047.33) (ISNI:0000 0004 0576 5395)
6 Atos IT Solutions and Services Iberia S.L., Madrid, Spain (GRID:grid.11047.33)
7 FICOSA, Barcelona, Spain (GRID:grid.425188.2)
8 Panasonic Automotive, Langen, Germany (GRID:grid.425188.2)
9 T-Systems International GmbH, Frankfurt, Germany (GRID:grid.28390.30) (ISNI:0000 0001 0945 6467)