Endre søk
Link to record
Permanent link

Direct link
Publikasjoner (4 av 4) Visa alla publikasjoner
Mohamad, M., Avula, R. R., Folkesson, P., Kleberger, P., Mirzai, A., Skoglund, M. & Damschen, M. (2024). Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines. In: Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2024: . Paper presented at 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2024. Brisbane, Australia. 24 June 2024through 27 June 2024 (pp. 98-105).
Åpne denne publikasjonen i ny fane eller vindu >>Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines
Vise andre…
2024 (engelsk)Inngår i: Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2024, 2024, s. 98-105Konferansepaper, Publicerat paper (Annet vitenskapelig)
Abstract [en]

he increased importance of cybersecurity in autonomous machinery is becoming evident in the forestry domain. Forestry worksites are becoming more complex with the involvement of multiple systems and system of systems. Hence, there is a need to investigate how to address cybersecurity challenges for autonomous systems of systems in the forestry domain. Using a literature review and adapting standards from similar domains, as well as collaborative sessions with domain experts, we identify challenges towards CE-certified autonomous forestry machines focusing on cybersecurity and safety. Furthermore, we discuss the relationship between safety and cybersecurity risk assessment and their relation to AI, highlighting the need for a holistic methodology for their assurance.

HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-74609 (URN)10.1109/DSN-W60302.2024.00030 (DOI)
Konferanse
54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2024. Brisbane, Australia. 24 June 2024through 27 June 2024
Merknad

AGRARSENSE is supported by the Chips JU and its members, including the top up funding by Sweden, Czechia, Finland, Ireland, Italy, Latvia, Netherlands, Norway, Poland and Spain (Grant Agreement No.101095835). T

Tilgjengelig fra: 2024-07-21 Laget: 2024-07-21 Sist oppdatert: 2024-10-29bibliografisk kontrollert
Mirzai, A., Avula, R. R. & Damschen, M. (2024). Cybersecurity Risk Assessment of Virtually Coupled Train Sets. xx
Åpne denne publikasjonen i ny fane eller vindu >>Cybersecurity Risk Assessment of Virtually Coupled Train Sets
2024 (engelsk)Inngår i: xxArtikkel i tidsskrift (Fagfellevurdert) Epub ahead of print
Abstract [en]

In recent years, the increasing digitalisation and interconnectedness of railway systems have underscored the critical importance of robust cybersecurity measures. Notable cybersecurity incidents, such as the sabotage of more than 20 trains in Poland via simple "radio-stop" commands using low-cost equipment, highlight the vulnerability of these complex systems to disruptions that can have far-reaching consequences. Moreover, the evolving threat landscape, characterised by increasingly sophisticated ransomware and distributed denial-ofservice (DDoS) attacks, poses ongoing challenges that demand continuous vigilance and adaptation. The regulatory response, including stringent EU directives such as the Cybersecurity Act and the NIS 2 Directive, reflects a concerted effort to elevate the cybersecurity standards that impact the transportation sector. The objective of this work is to provide a cybersecurity risk assessment of the Virtually Coupled Train Set (VCTS) design that is developed within the R2DATO EU Rail project. This work leverages the methodologies developed under the Shift2Rail (S2R) initiative, particularly the X2Rail-5 project. The assessment aims to identify potential vulnerabilities and assess the impact of potential threats. Risk and target security level evaluations for VCTS are presented for identifying applicable security requirements from IEC 62443. By applying a risk assessment tool based on IEC 62443-3-2 and CLC/TS 50701 towards regulatory compliance measures, this work seeks to fortify the cybersecurity of railway systems, ensuring safer and more reliable operations in an increasingly digital landscape.

HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-76277 (URN)
Tilgjengelig fra: 2024-12-16 Laget: 2024-12-16 Sist oppdatert: 2024-12-16bibliografisk kontrollert
Damschen, M., Häll, R. & Mirzai, A. (2024). WayWise: A rapid prototyping library for connected, autonomous vehicles. Software Impacts, 100682-100682, Article ID 100682.
Åpne denne publikasjonen i ny fane eller vindu >>WayWise: A rapid prototyping library for connected, autonomous vehicles
2024 (engelsk)Inngår i: Software Impacts, ISSN 2665-9638, s. 100682-100682, artikkel-id 100682Artikkel i tidsskrift (Fagfellevurdert) In press
Abstract [en]

WayWise is an innovative C++ and Qt-based rapid prototyping library designed to advance the development and analysis of connected, autonomous vehicles (CAVs) and Unmanned Arial Systems (UASs). It was deployed on model-sized cars and trucks as well as full-sized mobile machinery, tractors and UASs. It is actively being used in several European research projects. Developed by the RISE Dependable Transport Systems unit, the library facilitates exploration into safety and cybersecurity aspects inherent to various emerging vehicular applications within road traffic and offroad applications. This non-production library emphasizes rapid prototyping, leveraging commercial off-the-shelf hardware and the different protocols for vehicle-control communication, mainly focusing on MAVLINK. The utility of WayWise in rapidly evaluating complex vehicular behaviors is demonstrated through various research projects, thus contributing to the field of autonomous vehicular technology.

Emneord
Rapid Prototyping, Autonomous Vehicles, UAV, Drone Technology
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-74603 (URN)10.1016/j.simpa.2024.100682 (DOI)2-s2.0-85198289088 (Scopus ID)
Prosjekter
AGRARSENSESUNRISE
Forskningsfinansiär
EU, Horizon Europe, 101095835
Tilgjengelig fra: 2024-07-09 Laget: 2024-07-09 Sist oppdatert: 2024-08-15bibliografisk kontrollert
Mirzai, A., Coban, A. Z., Almgren, M., Aoudi, W. & Bertilsson, T. (2023). Scheduling to the Rescue; Improving ML-Based Intrusion Detection for IoT. In: EUROSEC '23: Proceedings of the 16th European Workshop on System Security. May, 2023.: . Paper presented at EUROSEC '23: 16th European Workshop on System Security. 2023 (pp. 44-50). Association for Computing Machinery
Åpne denne publikasjonen i ny fane eller vindu >>Scheduling to the Rescue; Improving ML-Based Intrusion Detection for IoT
Vise andre…
2023 (engelsk)Inngår i: EUROSEC '23: Proceedings of the 16th European Workshop on System Security. May, 2023., Association for Computing Machinery , 2023, s. 44-50Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

With their inherent convenience factor, Internet of Things (IoT) devices have exploded in numbers during the last decade, but at the cost of security. Machine learning (ML) based intrusion detection systems (IDS) are increasingly proving necessary tools for attack detection, but requirements such as extensive data collection and model training make these systems computationally heavy for resource-limited IoT hardware. This paper’s main contribution to the cyber security research field is a demonstration of how a dynamic user-level scheduler can improve the performance of IDS suited for lightweight and data-driven ML algorithms towards IoT. The dynamic user-level scheduler allows for more advanced computations, not intended to be executed on resource-limited IoT units, by enabling parallel model retraining locally on the IoT device without halting the IDS. It eliminates the need for any cloud resources as computations are kept locally at the edge. The experiments showed that the dynamic user-level scheduler provides several advantages compared to a previously developed baseline system. Mainly by substantially increasing the system’s throughput, which reduces the time until attacks are detected, as well as dynamically allocating resources based on attack suspicion.

sted, utgiver, år, opplag, sider
Association for Computing Machinery, 2023
Serie
EUROSEC ’23
Emneord
model training, anomaly-based intrusion detection system, user-level scheduling, internet of things
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-64430 (URN)10.1145/3578357.3589460 (DOI)
Konferanse
EUROSEC '23: 16th European Workshop on System Security. 2023
Merknad

The research leading to these results has been partially supported by the Swedish Civil Contingencies Agency (MSB) through the projects RICS2, as well as the CELTIC-NEXTAI-NET-PROTECT (C2019/3-4) project and Clavister.

Tilgjengelig fra: 2023-05-12 Laget: 2023-05-12 Sist oppdatert: 2023-05-12bibliografisk kontrollert
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0009-0003-0563-079X
v. 2.45.0