Skip to main content

Safe Cooperating Cyber-Physical Systems using Wireless Communication

Deliverables

D5.10 Evaluation of the SafeCOP approach as shown by the demonstrators - Final evaluation

Evaluation of the SafeCOP approach as shown by the demonstrators- Final evaluation

D2.4 Report on T2.3 and T2.4 and its relations to demonstrators, and recommendations for safety committees

Report on T2.3 and T2.4 and its relations to demonstrators, and recommendations for safety committees

D6.2 Dissemination, exploitation and certification report year 1

Dissemination, exploitation and certification report year 1

D6.3 Dissemination, exploitation and certification report year 2

Dissemination, exploitation and certification report year 2

D2.2 Report on T2.2 on safety assurance conceptual model and its relations to the demonstrators and recommendations for safety committees

Report on T2.2 on safety assurance conceptual model and its relations to the demonstrators and recommendations for safety committees

D1.1 Requirements and Evaluation Metrics Baseline

Requirements and Evaluation Metrics Baseline

D3.1 State of the art. Report on Task 3.1 on communication protocols

State of the art. Report on Task 3.1 on communication protocols

D2.1 State of the art report (R, PU, M6)

State of the art report (R, PU, M6)

D3.4 Report on T3.4 on distributed cooperation techniques for use case defined in WP3

Report on T3.4 on distributed cooperation techniques for use case defined in WP3

D5.9 Evaluation of the SafeCOP approach as shown by the demonstrators - concept and methodology

Evaluation of the SafeCOP approach as shown by the demonstrators- concept and methodology

D3.3 Report on Task 3.3 on architecture of safety layer on top of communication protocols for the different use cases

Report on Task 3.3 on architecture of safety layer on top of communication protocols for the different use cases

D3.2 Report on T3.2 on safe and secure communication protocols for the different use cases and demonstrators

Report on T3.2 on safe and secure communication protocols for the different use cases and demonstrators

D2.3 Report on mitigation of security threats that may jeopardize safety

Report on mitigation of security threats that may jeopardize safety

D6.4 Final dissemination, exploitation and certification report

Final dissemination, exploitation and certification report

D4.1 Report on SafeCOP Platform architecture, methods and runtime mechanisms

Report on SafeCOP Platform architecture, methods and runtime mechanisms

D4.3 Prototype simulation tools

Prototype simulation tools

D4.2 Prototype runtime mechanisms

Prototype runtime mechanisms

D5.1 Cooperative hospital bed mover demonstrated in lab setting

Cooperative hospital bed mover demonstrated in lab setting

D4.4 Prototype validation and verification tools

Prototype validation and verification tools

Searching for OpenAIRE data...

Publications

The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

Author(s): Paul Pop, Detlef Scholle, Hans Hansson, Gunnar Widforss, Malin Rosqvist
Published in: 2016 Euromicro Conference on Digital System Design (DSD), 2016, Page(s) 532-538
DOI: 10.1109/DSD.2016.25

Communication middleware technologies for industrial distributed control systems: A literature review

Author(s): Ali Balador, Nielas Ericsson, Zeinab Bakhshi
Published in: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-6
DOI: 10.1109/ETFA.2017.8247730

A Reliable Token-Based MAC Protocol for Delay Sensitive Platooning Applications

Author(s): Ali Balador, Annette Bohm, Elisabeth Uhlemann, Carlos T. Calafate, Juan-Carlos Cano
Published in: 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 2015, Page(s) 1-5
DOI: 10.1109/vtcfall.2015.7390813

Proactive attack: A strategy for legitimate eavesdropping

Author(s): Hung Tran, Hans-Jurgen Zepernick
Published in: 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), 2016, Page(s) 457-461
DOI: 10.1109/CCE.2016.7562679

Applying Time Diversity for Improved Reliability in a Real-Time Heterogeneous MAC Protocol

Author(s): Pablo Gutierrez Peon, Elisabeth Uhlemann, Wilfried Steiner, Mats Bjorkman
Published in: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, Page(s) 1-7
DOI: 10.1109/VTCSpring.2017.8108663

Systematic Maintenance of Safety Cases to Reduce Risk

Author(s): Omar Jaradat, Iain Bate
Published in: 4th International Workshop on Assurance Cases for Software-intensive Systems, Issue 4, 2016, Page(s) 17-29
DOI: 10.1007/978-3-319-45480-1_2

Simulation-Based Safety Testing Brake-by-Wire

Author(s): Nils Mullner, Saifullah Khan, Md Habibur Rahman, Wasif Afzal, Mehrdad Saadatmand
Published in: 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2017, Page(s) 61-64
DOI: 10.1109/ICSTW.2017.17

A Token-Based MAC Protocol for Achieving High Reliability in VANET

Author(s): Ali Balador
Published in: BMW Summer School 2016, 2016

Delay attack versus clock synchronization — A time chase

Author(s): Elena Lisova, Elisabeth Uhlemann, Johan Akerberg, Mats Bjorkman
Published in: 2017 IEEE International Conference on Industrial Technology (ICIT), 2017, Page(s) 1136-1141
DOI: 10.1109/ICIT.2017.7915522

Secrecy performance of cognitive cooperative industrial radio networks

Author(s): Truong Xuan Quach, Hung Tran, Elisabeth Uhlemann, Mai Tran Truc
Published in: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-8
DOI: 10.1109/ETFA.2017.8247604

Configuration-aware Contracts

Author(s): Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson
Published in: 4th International Workshop on Assurance Cases for Software-intensive Systems, Issue 4, 2016, Page(s) 43-54
DOI: 10.1007/978-3-319-45480-1_4

Cooperative safety critical CPS platooning in SafeCOP

Author(s): Samer Medawar, Detlef Scholle, Irfan Sljivo
Published in: 2017 6th Mediterranean Conference on Embedded Computing (MECO), 2017, Page(s) 1-5
DOI: 10.1109/MECO.2017.7977210

Using Safety Contracts to Guide the Maintenance of Systems and Safety Cases

Author(s): Omar Tawffeeq Saleem Jaradat, Iain Bate
Published in: 2017 13th European Dependable Computing Conference (EDCC), 2017, Page(s) 95-102
DOI: 10.1109/EDCC.2017.20

Monitoring of clock synchronization in cyber-physical systems: A sensitivity analysis

Author(s): Elena Lisova, Elisabeth Uhlemann, Johan Akerberg, Mats Bjorkman
Published in: 2017 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), 2017, Page(s) 134-139
DOI: 10.1109/IINTEC.2017.8325927

Cognitive radio for improved reliability in a real-time wireless MAC protocol based on TDMA

Author(s): Pablo Gutierrez Peon, Pedro Manuel Rodriguez, Zaloa Fernandez, Francisco Pozo, Elisabeth Uhlemann, Inaki Val, Wilfried Steiner
Published in: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-8
DOI: 10.1109/ETFA.2017.8247602

Optimal energy harvesting time and power allocation policy in CRN under security constraints from eavesdroppers

Author(s): Hung Tran, Truong Xuan Quach, Ha-Vu Tran, Elisabeth Uhlemann
Published in: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017, Page(s) 1-8
DOI: 10.1109/PIMRC.2017.8292734

A risk and threat assessment approaches overview in autonomous systems of systems

Author(s): Aida Causevic
Published in: 2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT), 2017, Page(s) 1-6
DOI: 10.1109/ICAT.2017.8171624

Clock synchronization considerations in security informed safety assurance of autonomous systems of systems

Author(s): Elena Lisova, Aida Causevic, Elisabeth Uhlemann, Mats Bjorkman
Published in: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, 2017, Page(s) 8385-8390
DOI: 10.1109/IECON.2017.8217473

Contract-based assurance for wireless cooperative functions of vehicular systems

Author(s): Svetlana Girs, Irfan Sljivo, Omar Jaradat
Published in: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, 2017, Page(s) 8391-8396
DOI: 10.1109/IECON.2017.8217474

Low Complexity Algorithm for Efficient Relay Assignment in Unicast/Broadcast Wireless Networks

Author(s): Le-Nam Hoang, Elisabeth Uhlemann, Magnus Jonsson
Published in: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, Page(s) 1-6
DOI: 10.1109/VTCSpring.2017.8108261

Relaying with Packet Aggregation for Half-Duplex All-to-All Broadcast in Time-Critical Wireless Networks

Author(s): Le-Nam Hoang, Elisabeth Uhlemann, Magnus Jonsson
Published in: 2017 IEEE Globecom Workshops (GC Wkshps), 2017, Page(s) 1-6
DOI: 10.1109/GLOCOMW.2017.8269134

Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models

Author(s): Zeinab Bakhshi, Ali Balador, Jawad Mustafa
Published in: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2018, Page(s) 173-178
DOI: 10.1109/wcncw.2018.8368997

V2I Cooperation for Traffic Management with SafeCop

Author(s): Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Stefano Delucchi, Massimo Massa, Maurizio Mongelli, Enrico Ferrari, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Dajana Cassioli, Luigi Pomante
Published in: 2016 Euromicro Conference on Digital System Design (DSD), 2016, Page(s) 621-627
DOI: 10.1109/DSD.2016.18

An adaptive strategy to mitigate instability in the ETSI DCC: Experimental validation

Author(s): Elena Cinque, Francesco Valentini, Alessio Iovine, Marco Pratesi
Published in: 2017 15th International Conference on ITS Telecommunications (ITST), 2017, Page(s) 1-6
DOI: 10.1109/ITST.2017.7972223

Worst-case bound analysis for the time-critical MAC behaviors of IEEE 802.15.4e

Author(s): Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
Published in: 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), 2017, Page(s) 1-9
DOI: 10.1109/WFCS.2017.7991967

PELE: Power efficient legitimate eavesdropping via jamming in UAV communications

Author(s): Xiaoming Wang, Kai Li, Salil S. Kanhere, Demin Li, Xiaolu Zhang, Eduardo Tovar
Published in: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), 2017, Page(s) 402-408
DOI: 10.1109/IWCMC.2017.7986320

Towards industry strength mapping of AUTOSAR automotive functionality on multicore architectures - work-in-progress

Author(s): Cosmin Avasalcai, Dhanesh Budhrani, Paul Pop
Published in: Proceedings of the 2017 International Conference on Compilers, Architectures and Synthesis for Embedded Systems Companion - CASES '17, 2017, Page(s) 1-2
DOI: 10.1145/3125501.3125623

TinyWIDS - a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks

Author(s): Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti
Published in: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems - CS2 '18, 2018, Page(s) 13-16
DOI: 10.1145/3178291.3178293

LCD: Low Latency Command Dissemination for a Platoon of Vehicles

Author(s): Kai Li, Wei Ni, Eduardo Tovar, Mohsen Guizani
Published in: 2018 IEEE International Conference on Communications (ICC), 2018, Page(s) 1-6
DOI: 10.1109/icc.2018.8422933

Analyzing hazards in system-of-systems: Described in a quarry site automation context

Author(s): Stephan Baumgart, Joakim Froberg, Sasikumar Punnekkat
Published in: 2017 Annual IEEE International Systems Conference (SysCon), 2017, Page(s) 1-8
DOI: 10.1109/SYSCON.2017.7934783

Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project

Author(s): Alessio Agneessens, Francesco Buemi, Stefano Delucchi, Massimo Massa, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Enrico Ferrari, Dajana Cassioli, Luigi Pomante, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Maurizio Mongelli
Published in: 2016 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (SAMOS), 2016, Page(s) 320-327
DOI: 10.1109/SAMOS.2016.7818365

Side-channel security of superscalar CPUs - evaluating the impact of micro-architectural features

Author(s): Alessandro Barenghi, Gerardo Pelosi
Published in: Proceedings of the 55th Annual Design Automation Conference on - DAC '18, 2018, Page(s) 1-6
DOI: 10.1145/3195970.3196112

LabSMILING: A SaaS Framework, Composed of a Number of Remotely Accessible Testbeds and Related SW Tools, for Analysis, Design and Management of Low Data-Rate Wireless Personal Area Networks Based on IEEE 802.15.4

Author(s): Carlo Centofanti, Luigi Pomante, Marco Santic
Published in: 2019 8th Mediterranean Conference on Embedded Computing (MECO), 2019, Page(s) 1-5
DOI: 10.1109/meco.2019.8760282

Identification of safety regions in vehicle platooning via machine learning

Author(s): Alessandro Fermi, Maurizio Mongelli, Marco Muselli, Enrico Ferrari
Published in: 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), 2018, Page(s) 1-4
DOI: 10.1109/wfcs.2018.8402372

ITS-enabled advanced road weather services and infrastructures for vehicle winter testing, professional traffic fleets and future automated driving

Author(s): Timo Sukuvaara, Kari Mäenpää, Daria Stepanova, Sakari Kantomaa and Virve Karsisto
Published in: 2018

Towards Intelligent Real-Time Road Weather Services Utilizing Mobile Vehicular Data

Author(s): Virve Karsisto, Pertti Nurmi, Timo Sukuvaara and Kari Mäenpää
Published in: 2017

TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks

Author(s): Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti,
Published in: 2018

Interfacing a Brake-by-Wire Simulink Model with SUMO

Author(s): Erik Martin Campana, Nils Mullner, Saad Mubeen
Published in: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018, Page(s) 1-6
DOI: 10.1109/iconic.2018.8601239

Learning-based testing for autonomous systems using spatial and temporal requirements

Author(s): Hojat Khosrowjerdi, Karl Meinke
Published in: Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis - MASES 2018, 2018, Page(s) 6-15
DOI: 10.1145/3243127.3243129

Probabilistic Communication in Car Platoons

Author(s): Tam Ninh Thi Thanh, Tran Hung, Nils Müllner
Published in: 2018

A Safety-Centric Change Management Framework by Tailoring Agile and V-Model Processes

Author(s): Omar Jaradat, Abdallah Salameh
Published in: 2018

Using Safety Contracts to Verify Design Assumptions During Runtime

Author(s): Omar Jaradat, Sasikumar Punnekkat
Published in: 2018

A Business Model for selling components with safety certificates

Author(s): Carl Bergenhem, Daniel Skarin, Fabian Ström
Published in: 2018

A reliable token-based MAC protocol for V2V communication in urban VANET

Author(s): Ali Balador, Annette Bohm, Carlos T. Calafate, Juan-Carlos Cano
Published in: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016, Page(s) 1-6
DOI: 10.1109/PIMRC.2016.7794823

Approaches for Facilities Layer Protocols for Platooning

Author(s): Carl Bergenhem
Published in: 2015 IEEE 18th International Conference on Intelligent Transportation Systems, 2015, Page(s) 1989-1994
DOI: 10.1109/itsc.2015.322

Safe cooperating cyber-physical systems using wireless communication: The SafeCOP approach

Author(s): Paul Pop, Detlef Scholle, Irfan Šljivo, Hans Hansson, Gunnar Widforss, Malin Rosqvist
Published in: Microprocessors and Microsystems, Issue 53, 2017, Page(s) 42-50, ISSN 0141-9331
DOI: 10.1016/j.micpro.2017.07.003

Scheduling for Source Relaying With Packet Aggregation in Industrial Wireless Networks

Author(s): Svetlana Girs, Andreas Willig, Elisabeth Uhlemann, Mats Bjorkman
Published in: IEEE Transactions on Industrial Informatics, Issue 12/5, 2016, Page(s) 1855-1864, ISSN 1551-3203
DOI: 10.1109/tii.2016.2535393

Practical 3-D Beam Pattern Based Channel Modeling for Multi-Polarized Massive MIMO Systems

Author(s): Saeid Aghaeinezhadfirouzja, Hui Liu, Ali Balador
Published in: Sensors, Issue 18/4, 2018, Page(s) 1186, ISSN 1424-8220
DOI: 10.3390/s18041186

Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies

Author(s): Ali Balador, Elisabeth Uhlemann, Carlos Calafate, Juan-Carlos Cano
Published in: Sensors, Issue 18/4, 2018, Page(s) 955, ISSN 1424-8220
DOI: 10.3390/s18040955

Three-Step Two-Way Decode and Forward Relay With Energy Harvesting

Author(s): Nguyen Thi Phuoc Van, Syed Faraz Hasan, Xiang Gui, Subhas Mukhopadhyay, Hung Tran
Published in: IEEE Communications Letters, Issue 21/4, 2017, Page(s) 857-860, ISSN 1089-7798
DOI: 10.1109/LCOMM.2016.2637891

RF energy harvesting: an analysis of wireless sensor networks for reliable communication

Author(s): Hung Tran, Johan Åkerberg, Mats Björkman, Ha-Vu Tran
Published in: Wireless Networks, 2017, ISSN 1022-0038
DOI: 10.1007/s11276-017-1546-6

A Traffic Aware Segment-based Routing protocol for VANETs in urban scenarios


Published in: ISSN 0045-7906
DOI: 10.1016/j.compeleceng.2018.04.017

IEEE 802.15.4e in a Nutshell: Survey and Performance Evaluation


Published in: ISSN 1553-877X
DOI: 10.1109/COMST.2018.2800898

Vehicular networking and road weather related research in Sodankylä

Author(s): T. Sukuvaara, K. Mäenpää, R. Ylitalo
Published in: Geoscientific Instrumentation, Methods and Data Systems Discussions, 2016, Page(s) 1-23, ISSN 2193-0872
DOI: 10.5194/gi-2015-23

Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems

Author(s): Ali Balador, Anis Kouba, Dajana Cassioli, Fotis Foukalas, Ricardo Severino, Daria Stepanova, Giovanni Agosta, Jing Xie, Luigi Pomante, Maurizio Mongelli, Pierluigi Pierini, Stig Petersen, Timo Sukuvaara
Published in: Sensors, Issue 18/11, 2018, Page(s) 4075, ISSN 1424-8220
DOI: 10.3390/s18114075

A density-based contention window control scheme for unicast communications in vehicular ad hoc networks

Author(s): Ali Balador, Carlos Calafate, Juan Carlos Cano, Pietro Manzoni
Published in: International Journal of Ad Hoc and Ubiquitous Computing, Issue 24/1/2, 2017, Page(s) 65, ISSN 1743-8225
DOI: 10.1504/ijahuc.2017.080913

Vehicular-networking- and road-weather-related research in Sodankylä

Author(s): Timo Sukuvaara, Kari Mäenpää, Riika Ylitalo
Published in: Geoscientific Instrumentation, Methods and Data Systems, Issue 5/2, 2016, Page(s) 513-520, ISSN 2193-0864
DOI: 10.5194/gi-5-513-2016

Cognitive radio network with secrecy and interference constraints

Author(s): Hung Tran, Georges Kaddoum, François Gagnon, Louis Sibomana
Published in: Physical Communication, Issue 22, 2017, Page(s) 32-41, ISSN 1874-4907
DOI: 10.1016/j.phycom.2016.12.001

Machine Learning for Dynamic Software Analysis: Potentials and Limits

Author(s): Amel Bennaceur, Dimitra Giannakopoulou, Reiner Hähnle, Karl Meinke
Published in: Dagstuhl Reports, Issue 4, 2016, Page(s) 161-173, ISSN 2192-5283
DOI: 10.4230/dagrep.6.4.161

DynaMO—Dynamic Multisuperframe Tuning for Adaptive IEEE 802.15.4e DSME Networks

Author(s): Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
Published in: IEEE Access, Issue 7, 2019, Page(s) 122522-122535, ISSN 2169-3536
DOI: 10.1109/ACCESS.2019.2937952

CO-CPS: A sample XSTAMPP usage in V2I traffic management scenario based on STAMP model




Functional Safety and Evolvable Architectures for Autonomy

Author(s): Rolf Johansson, Jonas Nilsson, Carl Bergenhem, Sagar Behere, Jörgen Tryggvesson, Stig Ursing, Andreas Söderberg, Martin Törngren, Fredrik Warg
Published in: Automated Driving - Automated Driving Safer and More Efficient Future Driving, Issue Book, 2017, Page(s) 547-560
DOI: 10.1007/978-3-319-31895-0_25

Learning-Based Testing of Cyber-Physical Systems-of-Systems: A Platooning Study

Author(s): Karl Meinke
Published in: 2017, Page(s) 135-151
DOI: 10.1007/978-3-319-66583-2_9

Model-Based Safety and Assessment. Lecture Notes in Computer Science,

Author(s): DeJiu Chen, Zhonghai Lu
Published in: 2017, Page(s) 227-240
DOI: 10.1007/978-3-319-64119-5_15

Tool-Supported Safety-Relevant Component Reuse: From Specification to Argumentation

Author(s): Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson, Stefano Puri
Published in: Reliable Software Technologies – Ada-Europe 2018, Issue 10873, 2018, Page(s) 19-33
DOI: 10.1007/978-3-319-92432-8_2

Learning Systems: Machine-Learning in Software Products and Learning-Based Analysis of Software Systems

Author(s): Falk Howar, Karl Meinke, Andreas Rausch
Published in: Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, Issue 9953, 2016, Page(s) 651-654
DOI: 10.1007/978-3-319-47169-3_50