Ändra sökning
Länk till posten
Permanent länk

Direktlänk
Publikationer (4 of 4) Visa alla publikationer
Mohamad, M., Avula, R. R., Folkesson, P., Kleberger, P., Mirzai, A., Skoglund, M. & Damschen, M. (2024). Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines. In: Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2024: . Paper presented at 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2024. Brisbane, Australia. 24 June 2024through 27 June 2024 (pp. 98-105).
Öppna denna publikation i ny flik eller fönster >>Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines
Visa övriga...
2024 (Engelska)Ingår i: Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2024, 2024, s. 98-105Konferensbidrag, Publicerat paper (Övrigt vetenskapligt)
Abstract [en]

he increased importance of cybersecurity in autonomous machinery is becoming evident in the forestry domain. Forestry worksites are becoming more complex with the involvement of multiple systems and system of systems. Hence, there is a need to investigate how to address cybersecurity challenges for autonomous systems of systems in the forestry domain. Using a literature review and adapting standards from similar domains, as well as collaborative sessions with domain experts, we identify challenges towards CE-certified autonomous forestry machines focusing on cybersecurity and safety. Furthermore, we discuss the relationship between safety and cybersecurity risk assessment and their relation to AI, highlighting the need for a holistic methodology for their assurance.

Nationell ämneskategori
Maskinteknik
Identifikatorer
urn:nbn:se:ri:diva-74609 (URN)10.1109/DSN-W60302.2024.00030 (DOI)
Konferens
54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2024. Brisbane, Australia. 24 June 2024through 27 June 2024
Anmärkning

AGRARSENSE is supported by the Chips JU and its members, including the top up funding by Sweden, Czechia, Finland, Ireland, Italy, Latvia, Netherlands, Norway, Poland and Spain (Grant Agreement No.101095835). T

Tillgänglig från: 2024-07-21 Skapad: 2024-07-21 Senast uppdaterad: 2024-10-29Bibliografiskt granskad
Mirzai, A., Avula, R. R. & Damschen, M. (2024). Cybersecurity Risk Assessment of Virtually Coupled Train Sets. xx
Öppna denna publikation i ny flik eller fönster >>Cybersecurity Risk Assessment of Virtually Coupled Train Sets
2024 (Engelska)Ingår i: xxArtikel i tidskrift (Refereegranskat) Epub ahead of print
Abstract [en]

In recent years, the increasing digitalisation and interconnectedness of railway systems have underscored the critical importance of robust cybersecurity measures. Notable cybersecurity incidents, such as the sabotage of more than 20 trains in Poland via simple "radio-stop" commands using low-cost equipment, highlight the vulnerability of these complex systems to disruptions that can have far-reaching consequences. Moreover, the evolving threat landscape, characterised by increasingly sophisticated ransomware and distributed denial-ofservice (DDoS) attacks, poses ongoing challenges that demand continuous vigilance and adaptation. The regulatory response, including stringent EU directives such as the Cybersecurity Act and the NIS 2 Directive, reflects a concerted effort to elevate the cybersecurity standards that impact the transportation sector. The objective of this work is to provide a cybersecurity risk assessment of the Virtually Coupled Train Set (VCTS) design that is developed within the R2DATO EU Rail project. This work leverages the methodologies developed under the Shift2Rail (S2R) initiative, particularly the X2Rail-5 project. The assessment aims to identify potential vulnerabilities and assess the impact of potential threats. Risk and target security level evaluations for VCTS are presented for identifying applicable security requirements from IEC 62443. By applying a risk assessment tool based on IEC 62443-3-2 and CLC/TS 50701 towards regulatory compliance measures, this work seeks to fortify the cybersecurity of railway systems, ensuring safer and more reliable operations in an increasingly digital landscape.

Nationell ämneskategori
Elektroteknik och elektronik
Identifikatorer
urn:nbn:se:ri:diva-76277 (URN)
Tillgänglig från: 2024-12-16 Skapad: 2024-12-16 Senast uppdaterad: 2024-12-16Bibliografiskt granskad
Damschen, M., Häll, R. & Mirzai, A. (2024). WayWise: A rapid prototyping library for connected, autonomous vehicles. Software Impacts, 100682-100682, Article ID 100682.
Öppna denna publikation i ny flik eller fönster >>WayWise: A rapid prototyping library for connected, autonomous vehicles
2024 (Engelska)Ingår i: Software Impacts, ISSN 2665-9638, s. 100682-100682, artikel-id 100682Artikel i tidskrift (Refereegranskat) In press
Abstract [en]

WayWise is an innovative C++ and Qt-based rapid prototyping library designed to advance the development and analysis of connected, autonomous vehicles (CAVs) and Unmanned Arial Systems (UASs). It was deployed on model-sized cars and trucks as well as full-sized mobile machinery, tractors and UASs. It is actively being used in several European research projects. Developed by the RISE Dependable Transport Systems unit, the library facilitates exploration into safety and cybersecurity aspects inherent to various emerging vehicular applications within road traffic and offroad applications. This non-production library emphasizes rapid prototyping, leveraging commercial off-the-shelf hardware and the different protocols for vehicle-control communication, mainly focusing on MAVLINK. The utility of WayWise in rapidly evaluating complex vehicular behaviors is demonstrated through various research projects, thus contributing to the field of autonomous vehicular technology.

Nyckelord
Rapid Prototyping, Autonomous Vehicles, UAV, Drone Technology
Nationell ämneskategori
Datorseende och robotik (autonoma system) Robotteknik och automation
Identifikatorer
urn:nbn:se:ri:diva-74603 (URN)10.1016/j.simpa.2024.100682 (DOI)2-s2.0-85198289088 (Scopus ID)
Projekt
AGRARSENSESUNRISE
Forskningsfinansiär
EU, Horisont Europa, 101095835
Tillgänglig från: 2024-07-09 Skapad: 2024-07-09 Senast uppdaterad: 2024-08-15Bibliografiskt granskad
Mirzai, A., Coban, A. Z., Almgren, M., Aoudi, W. & Bertilsson, T. (2023). Scheduling to the Rescue; Improving ML-Based Intrusion Detection for IoT. In: EUROSEC '23: Proceedings of the 16th European Workshop on System Security. May, 2023.: . Paper presented at EUROSEC '23: 16th European Workshop on System Security. 2023 (pp. 44-50). Association for Computing Machinery
Öppna denna publikation i ny flik eller fönster >>Scheduling to the Rescue; Improving ML-Based Intrusion Detection for IoT
Visa övriga...
2023 (Engelska)Ingår i: EUROSEC '23: Proceedings of the 16th European Workshop on System Security. May, 2023., Association for Computing Machinery , 2023, s. 44-50Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

With their inherent convenience factor, Internet of Things (IoT) devices have exploded in numbers during the last decade, but at the cost of security. Machine learning (ML) based intrusion detection systems (IDS) are increasingly proving necessary tools for attack detection, but requirements such as extensive data collection and model training make these systems computationally heavy for resource-limited IoT hardware. This paper’s main contribution to the cyber security research field is a demonstration of how a dynamic user-level scheduler can improve the performance of IDS suited for lightweight and data-driven ML algorithms towards IoT. The dynamic user-level scheduler allows for more advanced computations, not intended to be executed on resource-limited IoT units, by enabling parallel model retraining locally on the IoT device without halting the IDS. It eliminates the need for any cloud resources as computations are kept locally at the edge. The experiments showed that the dynamic user-level scheduler provides several advantages compared to a previously developed baseline system. Mainly by substantially increasing the system’s throughput, which reduces the time until attacks are detected, as well as dynamically allocating resources based on attack suspicion.

Ort, förlag, år, upplaga, sidor
Association for Computing Machinery, 2023
Serie
EUROSEC ’23
Nyckelord
model training, anomaly-based intrusion detection system, user-level scheduling, internet of things
Nationell ämneskategori
Datorteknik
Identifikatorer
urn:nbn:se:ri:diva-64430 (URN)10.1145/3578357.3589460 (DOI)
Konferens
EUROSEC '23: 16th European Workshop on System Security. 2023
Anmärkning

The research leading to these results has been partially supported by the Swedish Civil Contingencies Agency (MSB) through the projects RICS2, as well as the CELTIC-NEXTAI-NET-PROTECT (C2019/3-4) project and Clavister.

Tillgänglig från: 2023-05-12 Skapad: 2023-05-12 Senast uppdaterad: 2023-05-12Bibliografiskt granskad
Organisationer
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0009-0003-0563-079X

Sök vidare i DiVA

Visa alla publikationer