Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS

A Novel Adaptive Cybersecurity Framework for the Internet-of-Vehicles

Deliverables

nIoVe’s web site - v1

Website structure report and branding/dissemination material and channels. Associated Task: T8.1.

nIoVe's web site - v3

Website structure report and branding/dissemination material and channels. This report updated D8.3 and D8.12. Associated Task: T8.1.

nIoVe’s web site - v2

Website structure report and branding/dissemination material and channels. The report updated D8.3. Associated Task: T8.1.

Adaptive Graphical user Interfaces - v1

A public software deliverable, led by CERTH, featuring the Adaptive Graphical User Interfaces. The report will be revised in the course of the project (one just after the end of the first reporting period (M25) and one just before the end of the second reporting period (M35)). Associated Task: T6.4.

Detailed dissemination and communication plan - v3

Strategy documentation for dissemination stakeholder engagement during project lifetime This report updated D81 and D89 Associated Task T81

Detailed dissemination and communication plan - v1

Strategy documentation for dissemination & stakeholder engagement during project lifetime. Associated Task: T8.1.

System Integration & Final nIoVe Prototype - v1

A public software led by CERTH featuring the nIoVe Prototype The report will be revised in the course of the project one just before the end of the first reporting period M23 and one just before the end of the second reporting period M33 Associated Task T62

Detailed dissemination and communication plan - v2

Strategy documentation for dissemination & stakeholder engagement during project lifetime. The report updated D8.1. Associated Task: T8.1.

CAVs Cybersecurity threats digest and analysis

Report of systematic analysis of the cybersecurity landscape with a focus on digital security of CAVs Associated Task T21

Security, Privacy & Data Protection Guidelines for nIoVe

A public report led by ICT documenting the Security Privacy Data Protection Guidelines for nIoVe Associated Task 75

CBA/CEA analysis of nIoVe solutions

A public report led by HOPU documenting the Cost Benefit Analysis and Cost Effectiveness Analysis Associated Task T74

Contributions to the standardization bodies, consortium and Alliances - v2

A public report describing in details contributions to the standardization bodies consortiums and Alliances The report updated D87 Associated Task T84

nIoVe Final Dissemination, Exploitation and Standardization report

Final report of the project that includes nIoVe Final Dissemination Exploitation and Standardization information Associated Task T83

Survey on existing CAVs security and privacy standards

A public report describing in details security and privacy standards of CAVs Associated Task T84

Contributions to the standardization bodies, consortium and Alliances - v1

A public report describing in details contributions to the standardization bodies consortiums and Alliances The report will be revised in the course of the project one just before the end of the first reporting period M24 and one just before the end of the second reporting period M36 Associated Task T84

Interoperability Coordination & Open Standards - v1

A public report led by HOPU documenting the optimal plan for developing metadata frameworks to enable data interoperability and exchange of information between subsystems The report will be revised in the course of the project one just after the end of the first reporting period M26 and one just before the end of the second reporting period M35 Associated Task 63

Report of Stakeholder Requirements, Needs & Interests

Report of the user requirements of the project Associated Tasks T22

Integration Roadmap of the Cybersecurity Solution for the IoV

A public report led by RISE documenting the stepped integration process and the methods the various nIoVe components will be technically validated before final release Associated Task T61

Interoperability Coordination & Open Standards - v2

A public report led by HOPU documenting the optimal plan for developing metadata frameworks to enable data interoperability and exchange of information between subsystems The report updated D63 Associated Task 63

Business Models & Final plan for the use and exploitation of foreground

A public report led by HOPU documenting the final exploitation strategy and business plans Associated Task T83

Definition of the Cybersecurity certification protocol and tools for CAVs

A public report led by ICTLC documenting the Cybersecurity certification protocol and tools for CAVs Associated Task 76

Report on Dissemination Activities, Public Participation and Awareness

A public report led by SEEMS documenting the dissemination strategy and plan Associated Task T81

nIoVe Pilots Installations & Lessons Learned - v1

The first iteration of the pilot, led by NAVYA. The report will be revised in the course of the project (one just before the end of the first reporting period (M18) and one just before the end of the second reporting period (M35)). Associated Task: T7.2.

CAVs Market analysis and nIoVe exploitation strategy - v1

A public report led by HOPU documenting the Market analysis for cybersecurity across the IoV The report will be revised in the course of the project one just before the end of the first reporting period M24 and one just before the end of the second reporting period M35 Associated Task T82

Detailed dissemination and communication plan - v4

Strategy documentation for dissemination stakeholder engagement during project lifetime This report updated D81 D89 and D810 Associated Task T81

Threat Intelligence Repository - v2

A public software deliverable led by TUM, featuring the Threat Intelligence Repository. The report updated D6.5. Associated Task: T6.5.

Hypothesis testing toolkit - v2

A confidential, only for members of the consortium software, led by SEEMS, featuring the Hypothesis Testing Toolkit. The report updated D4.2. Associated Task: T4.2.

Continuous Big Data Monitoring Tool - v2

A confidential, only for members of the consortium software, led by UniGe, featuring the Continuous Big Data Monitoring Tool. The report updated D4.3. Associated Task: T4.3.

Threat Intelligence Repository - v1

A public software deliverable, led by TUM, featuring the Threat Intelligence Repository. The report will be revised in the course of the project (one just after the end of the first reporting period (M28) and one just before the end of the second reporting period (M34)). Associated Task: T6.5.

Visual Analytics Suite for Situational Awareness Engine - v2

A confidential, only for members of the consortium software, led by CERTH, featuring the Visual Analytics Suite for Situational Awareness Engine. The report updated D4.4. Associated Task: T4.4.

Publications

On the analysis of open-source datasets: validating IDS implementation for well-known and zero-day attack detection

Author(s): Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam
Published in: The 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC), The 16th International Conference on Future Networks and Communications (FNC), The 11th International Conference on Sustainable Energy Information Technology, 2021
Publisher: Elsevier
DOI: 10.1016/j.procs.2021.07.024

Toward Generating a DoS and Scan Statistical Network Traffic Metrics for Building Intrusion Detection Solution Based on Machine and Deep Learning: I-Sec-IDS Datasets

Author(s): Serinelli, Benedetto Marco
Published in: International Conference on Computational Intelligence and Network Security (ICCINS-2022), 2022
Publisher: ICCINS-2022
DOI: 10.5281/zenodo.6657210

FoRePlan: Supporting Digital Forensics Readiness Planning for Internet of Vehicles

Author(s): CHRISTINA KATSINI, GEORGE E. RAPTIS, CHRISTOS ALEXAKOS, DIMITRIOS SERPANOS
Published in: PCI 2021: 25th Pan-Hellenic Conference on Informatics, 2021, ISBN 9781450395557
Publisher: Association for Computing Machinery
DOI: 10.1145/3503823.3503891

Towards a Blockchain-based Identity and Trust Management Framework for the IoV Ecosystem

Author(s): Anastasia Theodouli, Konstantinos Moschou, Konstantinos Votis, Dimitrios Tzovaras, Jan Lauinger, Sebastian Steinhorst
Published in: 2020 Global Internet of Things Summit (GIoTS), 2020, Page(s) 1-6, ISBN 978-1-7281-6728-2
Publisher: IEEE
DOI: 10.1109/GIOTS49054.2020.9119623

SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication

Author(s): Mohammad Hamad; Emanuel Regnath; Jan Lauinger; Vassilis Prevelakis; Sebastian Steinhorst
Published in: 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021, Page(s) 529-534
Publisher: IEEE
DOI: 10.23919/date51398.2021.9474070

Complex Engineering Systems as an enabler for security in Internet of Vehicles: The nIoVe approach

Author(s): Angeliki Zacharaki, Ioannis Paliokas, Konstantinos Votis, Christos Alexakos, Dimitrios Serpanos, Dimitrios Tzovaras
Published in: 2019 First International Conference on Societal Automation (SA), 2019, Page(s) 1-8, ISBN 978-1-7281-3345-4
Publisher: IEEE
DOI: 10.1109/sa47457.2019.8938044

Attack Data Generation Framework for Autonomous Vehicle Sensors

Author(s): Jan Lauinger, Andreas Finkenzeller, Henrik Lautebach, Mohammad Hamad, Sebastian Steinhorst
Published in: 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), Issue 15581101, 2022, Page(s) 128-131, ISSN 1558-1101
Publisher: IEEE
DOI: 10.23919/date54114.2022.9774542

Towards Automated Matching of Cyber Threat Intelligence Reports based on Cluster Analysis in an Internet-of-Vehicles Environment

Author(s): George E. Raptis, Christina Katsini, Christos Alexakos
Published in: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021, Page(s) 366-371, ISBN 978-1-6654-0285-9
Publisher: IEEE
DOI: 10.1109/csr51186.2021.9527983

A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management

Author(s): Jan Lauinger, Jens Ernstberger, Emanuel Regnath, Mohammad Hamad, and Sebastian Steinhorst
Published in: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2021), 2021, ISBN 978-1-6654-3578-9
Publisher: IEEE
DOI: 10.1109/icbc51069.2021.9461082

Security and trust preserving inter‐ and intra‐cloud VM migrations

Author(s): Mudassar Aslam, Simon Bouget, Shahid Raza
Published in: International Journal of Network Management, 2020, ISSN 1055-7148
Publisher: John Wiley & Sons Inc.
DOI: 10.1002/nem.2103

Reshaping the Intelligent Transportation Scene: Challenges of an Operational and Safe Internet of Vehicles

Author(s): Christos Alexakos, Konstantinos Votis, Dimitrios Tzovaras, Dimitrios Serpanos
Published in: Computer, Issue 15580814, 2022, Page(s) 104-107, ISSN 1558-0814
Publisher: IEEE
DOI: 10.1109/mc.2021.3125075

Crowd Monitoring in Smart Destinations Based on GDPR-Ready Opportunistic RF Scanning and Classification of WiFi Devices to Identify and Classify Visitors’ Origins

Author(s): Alberto Berenguer; David Fernández Ros; Andrea Gómez-Oliva; Josep A. Ivars-Baidal; Antonio J. Jara; Jaime Laborda; Jose-Norberto Mazón; Angel Perles
Published in: Electronics, Issue 20799292, 2022, Page(s) 835, ISSN 2079-9292
Publisher: Electronics
DOI: 10.3390/electronics11060835

Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments

Author(s): Meriem Benyahya, Anastasija Collen, Sotiria Kechagia, Niels Alexander Nijdam
Published in: Computers & Security, Issue 01674048, 2022, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2022.102904

The Interface of Privacy and Data Security in Automated City Shuttles: The GDPR Analysis

Author(s): M. Benyahya, S. Kechagia, A. Collen, and N. A. Nijdam
Published in: Journal Applied Sciences, Issue 20763417, 2022, ISSN 2076-3417
Publisher: MDPI
DOI: 10.3390/app12094413

Shared Mobility for Transport and Its Environmental Impact VeSIPreS: A Vehicular Soft Integrity Preservation Scheme for Shared Mobility

Author(s): Valaenthin Tratter, Mudassar Aslam, and Shahid Raza
Published in: Journal of Advanced Transportation, Issue 20423195, 2021, ISSN 2042-3195
Publisher: Wiley Hindawi
DOI: 10.1155/2021/5569331

Temporal-based intrusion detection for IoV

Author(s): Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis
Published in: it - Information Technology, Issue 62/5-6, 2020, Page(s) 227-239, ISSN 2196-7032
Publisher: De Gruyter Oldenbourg
DOI: 10.1515/itit-2020-0009

CAVeCTIR: Matching Cyber Threat Intelligence Reports on Connected and Autonomous Vehicles Using Machine Learning

Author(s): Raptis, G.E.; Katsini, C.; Alexakos, C.; Kalogeras, A.; Serpanos, D
Published in: Applied Sciences, Issue 20763417, 2022, Page(s) 11631, ISSN 2076-3417
Publisher: Basel: MDPI AG, 2011-
DOI: 10.3390/app122211631

Can I Sleep Safely in My Smarthome? A Novel Framework on Automating Dynamic Risk Assessment in IoT Environments

Author(s): Anastasija Collen, Niels Alexander Nijdam
Published in: Electronics, Issue 20799292, 2022, ISSN 2079-9292
Publisher: MDPI
DOI: 10.3390/electronics11071123

Towards an Increased Detection Sensitivity of Time-Delay Attacks on Precision Time Protocol

Author(s): LEA SCHÖNBERGER, MOHAMMAD HAMAD, JAVIERVELASQUEZ GOMEZ, SEBASTIAN STEINHORST, SELMASAIDI
Published in: IEEE Access, Issue 21693536, 2021, Page(s) 157398 - 157410, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3127852

Enabling Digital Forensics Readiness for Internet of Vehicles

Author(s): C. Alexakos; Christina Katsini; K. Votis; Antonios Lalas; Dimitrios Tzovaras; D. Serpanos
Published in: 23rd EURO Working Group on Transportation Meeting, EWGT 2020, Issue 23521465, 2021, Page(s) 339-346, ISSN 2352-1465
Publisher: ELSEVIER B.V.
DOI: 10.1016/j.trpro.2021.01.040

Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System

Author(s): Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam
Published in: Procedia Computer Science, Issue 175, 2020, Page(s) 560-565, ISSN 1877-0509
Publisher: Elsevier B.V.
DOI: 10.1016/j.procs.2020.07.080

Digital Forensic Readiness in Internet ofVehicles: The Denial-of-Service on CAN bus Case Study

Author(s): Katsini C, Raptis GE, Livitckaia K, Votis K, Alexakos C
Published in: Annals of Forensic Science and Research, 2022, ISSN 2637-4900
Publisher: MedDocs Publishers LLC

Quantitative System-Level Security Verification of the IoV Infrastructure

Author(s): Lauinger, Jan; Aslam, Mudassar; Hamad, Mohammad; Raza, Shahid; Steinhorst, Sebastian
Published in: 2021
Publisher: arXiv
DOI: 10.48550/arxiv.2101.06137

Designing Connected and Automated Vehicles around Legal and Ethical Concerns – Data Protection as a Corporate Social Responsibility

Author(s): Balboni, P., Botsi, A., Francis, K., Taborda Barata, M.
Published in: 11th EETN Conference on Artificial Intelligence 2020 (SETN2020 Workshops), 2020
Publisher: WAIEL2020
DOI: 10.5281/zenodo.7291693

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available