Skip to main content

A Novel Adaptive Cybersecurity Framework for the Internet-of-Vehicles

Deliverables

nIoVe’s web site - v1

Website structure report and branding/dissemination material and channels. Associated Task: T8.1.

nIoVe’s web site - v2

Website structure report and branding/dissemination material and channels. The report updated D8.3. Associated Task: T8.1.

Detailed dissemination and communication plan - v1

Strategy documentation for dissemination & stakeholder engagement during project lifetime. Associated Task: T8.1.

Detailed dissemination and communication plan - v2

Strategy documentation for dissemination & stakeholder engagement during project lifetime. The report updated D8.1. Associated Task: T8.1.

CAVs Cybersecurity threats digest and analysis

Report of systematic analysis of the cybersecurity landscape with a focus on digital security of CAVs. Associated Task: T2.1.

nIoVe Pilots Installations & Lessons Learned - v1

The first iteration of the pilot, led by NAVYA. The report will be revised in the course of the project (one just before the end of the first reporting period (M18) and one just before the end of the second reporting period (M35)). Associated Task: T7.2.

Searching for OpenAIRE data...

Publications

On the analysis of open-source datasets: validating IDS implementation for well-known and zero-day attack detection

Author(s): Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam
Published in: The 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC), The 16th International Conference on Future Networks and Communications (FNC), The 11th International Conference on Sustainable Energy Information Technology, 2021
Publisher: Elsevier
DOI: 10.1016/j.procs.2021.07.024

Toward Generating a DoS and Scan Statistical Network Traffic Metrics for Building Intrusion Detection Solution Based on Machine and Deep Learning: I-Sec-IDS Datasets

Author(s): Serinelli, Benedetto Marco
Published in: International Conference on Computational Intelligence and Network Security (ICCINS-2022), 2022
Publisher: ICCINS-2022
DOI: 10.5281/zenodo.6657210

FoRePlan: Supporting Digital Forensics Readiness Planning for Internet of Vehicles

Author(s): CHRISTINA KATSINI, GEORGE E. RAPTIS, CHRISTOS ALEXAKOS, DIMITRIOS SERPANOS
Published in: PCI 2021: 25th Pan-Hellenic Conference on Informatics, 2021, ISBN 9781450395557
Publisher: Association for Computing Machinery
DOI: 10.1145/3503823.3503891

Towards a Blockchain-based Identity and Trust Management Framework for the IoV Ecosystem

Author(s): Anastasia Theodouli, Konstantinos Moschou, Konstantinos Votis, Dimitrios Tzovaras, Jan Lauinger, Sebastian Steinhorst
Published in: 2020 Global Internet of Things Summit (GIoTS), 2020, Page(s) 1-6, ISBN 978-1-7281-6728-2
Publisher: IEEE
DOI: 10.1109/GIOTS49054.2020.9119623

SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication

Author(s): Mohammad Hamad; Emanuel Regnath; Jan Lauinger; Vassilis Prevelakis; Sebastian Steinhorst
Published in: 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021, Page(s) 529-534
Publisher: IEEE
DOI: 10.23919/date51398.2021.9474070

Complex Engineering Systems as an enabler for security in Internet of Vehicles: The nIoVe approach

Author(s): Angeliki Zacharaki, Ioannis Paliokas, Konstantinos Votis, Christos Alexakos, Dimitrios Serpanos, Dimitrios Tzovaras
Published in: 2019 First International Conference on Societal Automation (SA), 2019, Page(s) 1-8, ISBN 978-1-7281-3345-4
Publisher: IEEE
DOI: 10.1109/sa47457.2019.8938044

Attack Data Generation Framework for Autonomous Vehicle Sensors

Author(s): Jan Lauinger, Andreas Finkenzeller, Henrik Lautebach, Mohammad Hamad, Sebastian Steinhorst
Published in: 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 15581101, 2022, Page(s) 128-131, ISSN 1558-1101
Publisher: IEEE
DOI: 10.23919/date54114.2022.9774542

Towards Automated Matching of Cyber Threat Intelligence Reports based on Cluster Analysis in an Internet-of-Vehicles Environment

Author(s): George E. Raptis, Christina Katsini, Christos Alexakos
Published in: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021, Page(s) 366-371, ISBN 978-1-6654-0285-9
Publisher: IEEE
DOI: 10.1109/csr51186.2021.9527983

A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management

Author(s): Jan Lauinger, Jens Ernstberger, Emanuel Regnath, Mohammad Hamad, and Sebastian Steinhorst
Published in: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2021), 2021, ISBN 978-1-6654-3578-9
Publisher: IEEE
DOI: 10.1109/icbc51069.2021.9461082

Security and trust preserving inter‐ and intra‐cloud VM migrations

Author(s): Mudassar Aslam, Simon Bouget, Shahid Raza
Published in: International Journal of Network Management, 2020, ISSN 1055-7148
Publisher: John Wiley & Sons Inc.
DOI: 10.1002/nem.2103

Reshaping the Intelligent Transportation Scene: Challenges of an Operational and Safe Internet of Vehicles

Author(s): Christos Alexakos, Konstantinos Votis, Dimitrios Tzovaras, Dimitrios Serpanos
Published in: Computer, 15580814, 2022, Page(s) 104-107, ISSN 1558-0814
Publisher: IEEE
DOI: 10.1109/mc.2021.3125075

Crowd Monitoring in Smart Destinations Based on GDPR-Ready Opportunistic RF Scanning and Classification of WiFi Devices to Identify and Classify Visitors’ Origins

Author(s): Alberto Berenguer; David Fernández Ros; Andrea Gómez-Oliva; Josep A. Ivars-Baidal; Antonio J. Jara; Jaime Laborda; Jose-Norberto Mazón; Angel Perles
Published in: Electronics, 20799292, 2022, Page(s) 835, ISSN 2079-9292
Publisher: Electronics
DOI: 10.3390/electronics11060835

Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments

Author(s): Meriem Benyahya, Anastasija Collen, Sotiria Kechagia, Niels Alexander Nijdam
Published in: Computers & Security, 01674048, 2022, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2022.102904

The Interface of Privacy and Data Security in Automated City Shuttles: The GDPR Analysis

Author(s): M. Benyahya, S. Kechagia, A. Collen, and N. A. Nijdam
Published in: Journal Applied Sciences, 20763417, 2022, ISSN 2076-3417
Publisher: MDPI
DOI: 10.3390/app12094413

Shared Mobility for Transport and Its Environmental Impact VeSIPreS: A Vehicular Soft Integrity Preservation Scheme for Shared Mobility

Author(s): Valaenthin Tratter, Mudassar Aslam, and Shahid Raza
Published in: Journal of Advanced Transportation, 20423195, 2021, ISSN 2042-3195
Publisher: Wiley Hindawi
DOI: 10.1155/2021/5569331

Temporal-based intrusion detection for IoV

Author(s): Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis
Published in: it - Information Technology, 62/5-6, 2020, Page(s) 227-239, ISSN 2196-7032
Publisher: De Gruyter Oldenbourg
DOI: 10.1515/itit-2020-0009

CAVeCTIR: Matching Cyber Threat Intelligence Reports on Connected and Autonomous Vehicles Using Machine Learning

Author(s): Raptis, G.E.; Katsini, C.; Alexakos, C.; Kalogeras, A.; Serpanos, D
Published in: Applied Sciences, 20763417, 2022, Page(s) 11631, ISSN 2076-3417
Publisher: Basel: MDPI AG, 2011-
DOI: 10.3390/app122211631

Can I Sleep Safely in My Smarthome? A Novel Framework on Automating Dynamic Risk Assessment in IoT Environments

Author(s): Anastasija Collen, Niels Alexander Nijdam
Published in: Electronics, 20799292, 2022, ISSN 2079-9292
Publisher: MDPI
DOI: 10.3390/electronics11071123

Towards an Increased Detection Sensitivity of Time-Delay Attacks on Precision Time Protocol

Author(s): LEA SCHÖNBERGER, MOHAMMAD HAMAD, JAVIERVELASQUEZ GOMEZ, SEBASTIAN STEINHORST, SELMASAIDI
Published in: IEEE Access, 21693536, 2021, Page(s) 157398 - 157410, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3127852

Enabling Digital Forensics Readiness for Internet of Vehicles

Author(s): C. Alexakos; Christina Katsini; K. Votis; Antonios Lalas; Dimitrios Tzovaras; D. Serpanos
Published in: 23rd EURO Working Group on Transportation Meeting, EWGT 2020, 23521465, 2021, Page(s) 339-346, ISSN 2352-1465
Publisher: ELSEVIER B.V.
DOI: 10.1016/j.trpro.2021.01.040

Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System

Author(s): Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam
Published in: Procedia Computer Science, 175, 2020, Page(s) 560-565, ISSN 1877-0509
Publisher: Elsevier B.V.
DOI: 10.1016/j.procs.2020.07.080

Quantitative System-Level Security Verification of the IoV Infrastructure

Author(s): Lauinger, Jan; Aslam, Mudassar; Hamad, Mohammad; Raza, Shahid; Steinhorst, Sebastian
Published in: 2021
Publisher: arXiv
DOI: 10.48550/arxiv.2101.06137

Designing Connected and Automated Vehicles around Legal and Ethical Concerns – Data Protection as a Corporate Social Responsibility

Author(s): Balboni, P., Botsi, A., Francis, K., Taborda Barata, M.
Published in: 11th EETN Conference on Artificial Intelligence 2020 (SETN2020 Workshops), 2020
Publisher: WAIEL2020
DOI: 10.5281/zenodo.7291693