Operational message
There are currently operational disruptions. Troubleshooting is in progress.
Change search
Link to record
Permanent link

Direct link
Rosenstatter, ThomasORCID iD iconorcid.org/0000-0002-9587-3423
Publications (6 of 6) Show all publications
Rosenstatter, T. & Melnyk, K. (2023). Towards Synthetic Data Generation of VANET Attacks for Efficient Testing. In: 2023 IEEE Intelligent Vehicles Symposium (IV): . Paper presented at 2023 IEEE Intelligent Vehicles Symposium (IV). 4-7 June 2023.
Open this publication in new window or tab >>Towards Synthetic Data Generation of VANET Attacks for Efficient Testing
2023 (English)In: 2023 IEEE Intelligent Vehicles Symposium (IV), 2023Conference paper, Published paper (Refereed)
Abstract [en]

Vehicle-to-Vehicle communication can improve traffic safety and efficiency. This technology, however, increases the attack surface, making new attacks possible. To cope with these threats, researchers have made a great effort to identify and explore the potential of cyberattacks and also proposed various intrusion or misbehaviour detection systems, in particular machine learning-based solutions. Simulations have become essential to design and evaluate such detection systems as there are no real publicly available Vehicular Ad-Hoc Network (VANET) datasets containing a variety of attacks. The drawback is that simulations require a significant amount of computational resources and time for configuration. In this paper, we present an attack simulation and generation framework that allows training the attack generator with either simulated or real VANET attacks. We outline the structure of our proposed framework and describe the setup of a standard-compliant attack simulator that generates valid standardised CAM and DENM messages specified by ETSI in the Cooperative Intelligent Transport Systems (C-ITS) standards. Based on the introduced framework, we demonstrate the feasibility of using deep learning for the generation of VANET attacks, which ultimately allows us to test and verify prototypes without running resource-demanding simulations.

National Category
Communication Systems
Identifiers
urn:nbn:se:ri:diva-66341 (URN)10.1109/iv55152.2023.10186685 (DOI)
Conference
2023 IEEE Intelligent Vehicles Symposium (IV). 4-7 June 2023
Available from: 2023-09-05 Created: 2023-09-05 Last updated: 2025-09-23Bibliographically approved
Jolak, R., Rosenstatter, T., Mohamad, M., Strandberg, K., Sangchoolie, B., Nowdehi, N. & Scandariato, R. (2022). CONSERVE: A framework for the selection of techniques for monitoring containers security. Journal of Systems and Software, 186, Article ID 111158.
Open this publication in new window or tab >>CONSERVE: A framework for the selection of techniques for monitoring containers security
Show others...
2022 (English)In: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 186, article id 111158Article in journal (Refereed) Published
Abstract [en]

Context: Container-based virtualization is gaining popularity in different domains, as it supports continuous development and improves the efficiency and reliability of run-time environments. Problem: Different techniques are proposed for monitoring the security of containers. However, there are no guidelines supporting the selection of suitable techniques for the tasks at hand. Objective: We aim to support the selection and design of techniques for monitoring container-based virtualization environments. Approach:: First, we review the literature and identify techniques for monitoring containerized environments. Second, we classify these techniques according to a set of categories, such as technical characteristic, applicability, effectiveness, and evaluation. We further detail the pros and cons that are associated with each of the identified techniques. Result: As a result, we present CONSERVE, a multi-dimensional decision support framework for an informed and optimal selection of a suitable set of container monitoring techniques to be implemented in different application domains. Evaluation: A mix of eighteen researchers and practitioners evaluated the ease of use, understandability, usefulness, efficiency, applicability, and completeness of the framework. The evaluation shows a high level of interest, and points out to potential benefits. © 2021 The Authors

Place, publisher, year, edition, pages
Elsevier Inc., 2022
Keywords
Attack analysis, Container monitoring, Intrusion detection, Security, Software and systems engineering, Virtualization, Containers, Decision support systems, Efficiency, Monitoring, Virtual reality, Continuous development, Different domains, Efficiency and reliability, Intrusion-Detection, It supports, Software and systems engineerings, Virtualizations
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-57895 (URN)10.1016/j.jss.2021.111158 (DOI)2-s2.0-85121691498 (Scopus ID)
Note

Funding details: 2019-03071; Funding text 1: We would like to thank the participants who took a part in the evaluation of CONSERVE. This research was partially supported by the Swedish VINNOVA FFI project CyReV: Cyber Resilience for Vehicles with diary numbers: 2018-05013 (1st phase) and 2019-03071 (2nd phase).

Available from: 2022-01-10 Created: 2022-01-10 Last updated: 2025-09-23Bibliographically approved
Jolak, R., Rosenstatter, T., Aldaghistani, S. & Scandariato, R. (2022). RIPOSTE: A Collaborative Cyber Attack Response Framework for Automotive Systems. In: : . Paper presented at 48th Euromicro Conference Series on Software Engineering and Advanced Applications (SEAA). IEEE conference proceedings
Open this publication in new window or tab >>RIPOSTE: A Collaborative Cyber Attack Response Framework for Automotive Systems
2022 (English)Conference paper, Published paper (Refereed)
Abstract [en]

The automotive domain has got its own share of advancements in information and communication technology, providing more services and leading to more connectivity. However, more connectivity and openness raise cyber security and safety concerns. Indeed, services that depend on online connectivity can serve as entry points for attacks on different assets of the vehicle. This study explores collaborative ways of selecting response techniques to counter real-time cyber attacks on automotive systems. The aim is to mitigate the attacks more quickly than a single vehicle would be able to do, and increase the survivability chances of the collaborating vehicles. To achieve that, the design science research methodology is employed. As a result, we present RIPOSTE, a framework for collaborative real-time evaluation and selection of suitable response techniques when an attack is in progress. We evaluate the framework from a safety perspective by conducting a qualitative study involving domain experts. The proposed framework is deemed slightly unsafe, and insights into how to improve the overall safety of the framework are provided.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2022
Keywords
automotive security, response techniques, connected cars, vehicle collaboration, resilient systems
National Category
Embedded Systems
Identifiers
urn:nbn:se:ri:diva-61531 (URN)
Conference
48th Euromicro Conference Series on Software Engineering and Advanced Applications (SEAA)
Funder
Vinnova, 2019-03071
Available from: 2022-12-15 Created: 2022-12-15 Last updated: 2025-09-23Bibliographically approved
Vahidi, A., Rosenstatter, T. & Mowla, N. (2022). Systematic Evaluation of Automotive Intrusion Detection Datasets. In: Proceedings of the 6th ACM Computer Sciencein Cars Symposium (CSCS ’22), December 8, 2022, Ingolstadt, Germany. ACM,New York, NY, USA: . Paper presented at CSCS '22: Proceedings of the 6th ACM Computer Science in Cars Symposium. Association for Computing Machinery, Article ID 2.
Open this publication in new window or tab >>Systematic Evaluation of Automotive Intrusion Detection Datasets
2022 (English)In: Proceedings of the 6th ACM Computer Sciencein Cars Symposium (CSCS ’22), December 8, 2022, Ingolstadt, Germany. ACM,New York, NY, USA, Association for Computing Machinery , 2022, article id 2Conference paper, Published paper (Refereed)
Abstract [en]

Some current and next generation security solutions employ machine learning and related technologies. Due to the nature of these applications, correct use of machine learning can be critical. One area that is of particular interest in this regard is the use of appropriate data for training and evaluation. In this work, we investigate different characteristics of datasets for security applications and propose a number of qualitative and quantitative metrics which can be evaluated with limited domain knowledge. We illustrate the need for such metrics by analyzing a number of datasets for anomaly and intrusion detection in automotive systems, covering both internal vehicle network and vehicle-to-vehicle (V2V) communication. We demonstrate how the proposed metrics can be used to learn the strengths and weaknesses in these datasets.

Place, publisher, year, edition, pages
Association for Computing Machinery, 2022
Series
CSCS ’22
Keywords
automotive security, intrusion detection, data quality
National Category
Computer Sciences
Identifiers
urn:nbn:se:ri:diva-62374 (URN)10.1145/3568160.3570226 (DOI)978-1-4503-9786-5 (ISBN)
Conference
CSCS '22: Proceedings of the 6th ACM Computer Science in Cars Symposium
Note

This research was supported by the Vinnova FFI project "CyReV:Cyber Resilience for Vehicles" under the grants 2018-05013 and2019-03071.

Available from: 2023-01-24 Created: 2023-01-24 Last updated: 2025-09-23Bibliographically approved
Rosenstatter, T. & Englund, C. (2018). Modelling the Level of Trust in a Cooperative Automated Vehicle Control System. IEEE Transactions on Intelligent Transportation Systems, 19(4), 1267-1247
Open this publication in new window or tab >>Modelling the Level of Trust in a Cooperative Automated Vehicle Control System
2018 (English)In: IEEE Transactions on Intelligent Transportation Systems, ISSN 1524-9050, E-ISSN 1558-0016, Vol. 19, no 4, p. 1267-1247Article in journal (Refereed) Published
Abstract [en]

Vehicle-to-vehicle communication is a key technology for achieving increased perception for automated vehicles, where the communication enables virtual sensing by means of sensors in other vehicles. In addition, this technology also allows detection and recognition of objects that are out-of-sight. This paper presents a trust system that allows a cooperative and automated vehicle to make more reliable and safe decisions. The system evaluates the current situation and generates a trust index indicating the level of trust in the environment, the ego vehicle, and the surrounding vehicles. This research goes beyond secure communication and concerns the verification of the received data on a system level. The results show that the proposed method is capable of correctly identifying various traffic situations and how the trust index is used while manoeuvring in a platoon merge scenario.

Keywords
autonomous driving, Control systems, cooperative driving, Decision making, GCDC 2016, Kalman filters, Radar, reliability., Sensor systems, trust, vehicle-to-vehicle communication, Vehicular ad hoc networks, Ad hoc networks, Automation, Control system synthesis, Cooperative communication, Mobile telecommunication systems, Object detection, Reliability, Vehicles, Vehicle to vehicle communications
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-32433 (URN)10.1109/TITS.2017.2749962 (DOI)2-s2.0-85030752579 (Scopus ID)
Available from: 2017-10-31 Created: 2017-10-31 Last updated: 2025-09-23Bibliographically approved
Aramrattana, M., Detournay, J., Englund, C., Frimodig, V., Jansson, O. U., Larsson, T., . . . Shahanoor, G. (2018). Team Halmstad Approach to Cooperative Driving in the Grand Cooperative Driving Challenge 2016. IEEE Transactions on Intelligent Transportation Systems, 19(4), 1248-1261
Open this publication in new window or tab >>Team Halmstad Approach to Cooperative Driving in the Grand Cooperative Driving Challenge 2016
Show others...
2018 (English)In: IEEE Transactions on Intelligent Transportation Systems, ISSN 1524-9050, E-ISSN 1558-0016, Vol. 19, no 4, p. 1248-1261Article in journal (Refereed) Published
Abstract [en]

This paper is an experience report of team Halmstad from the participation in a competition organised by the i-GAME project, the Grand Cooperative Driving Challenge 2016. The competition was held in Helmond, The Netherlands, during the last weekend of May 2016. We give an overview of our car's control and communication system that was developed for the competition following the requirements and specifications of the i-GAME project. In particular, we describe our implementation of cooperative adaptive cruise control, our solution to the communication and logging requirements, as well as the high level decision making support. For the actual competition we did not manage to completely reach all of the goals set out by the organizers as well as ourselves. However, this did not prevent us from outperforming the competition. Moreover, the competition allowed us to collect data for further evaluation of our solutions to cooperative driving. Thus, we discuss what we believe were the strong points of our system, and discuss post-competition evaluation of the developments that were not fully integrated into our system during competition time.

Keywords
autonomous driving, cooperative adaptive cruise control, cooperative driving, GCDC 2016, IEEE 802.11p, platooning
National Category
Natural Sciences
Identifiers
urn:nbn:se:ri:diva-33309 (URN)10.1109/TITS.2017.2752359 (DOI)2-s2.0-85041535321 (Scopus ID)
Available from: 2018-03-05 Created: 2018-03-05 Last updated: 2025-09-23Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-9587-3423

Search in DiVA

Show all publications