Chapter

FERROMOBILE and Security for Low Moment of Traffic Level Crossing

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Blind intersections have high accident rates due to the poor visibility of oncoming traffic, high traffic speeds, and lack of infrastructure (e.g., stoplights). These intersections are more commonplace in rural areas, where traffic infrastructure is less developed. The Internet of Vehicles (IoV) aims to address such safety concerns through a network of connected and autonomous vehicles (CAVs) that intercommunicate. This paper proposes a Road-Side Unit-based Virtual Intersection Management (RSU-VIM) over 802.11p system consisting of a Field-Programmable Gate Array (FPGA) lightweight RSU that is solar power-based and tailored to rural areas. The RSU utilizes the proposed RSU-VIM algorithm adapted from existing virtual traffic light methodologies to communicate with vehicles over IEEE 802.11p and facilitate intersection traffic, minimizing visibility issues. The implementation of the proposed system has a simulated cloud delay of 0.0841 s and an overall system delay of 0.4067 s with 98.611% reliability.
Article
Full-text available
The Internet of Things is changing all sectors such as manufacturing, agriculture, city infrastructure, and the automotive industry. All these applications ask for secure processors that can be embedded in the IoT devices. Furthermore, these devices are restricted in terms of computing capabilities, memory, and power consumption. A major challenge is how to meet the need for security in such resource-constrained devices. This paper presents a customized version of LEON3, the ReonV RISCV (Reduced Instruction Set Computer-five) processor, dedicated for IoT applications that has strong effective security mechanisms built in at the design stage. Firstly, efficient lightweight cipher designs are elaborated and validated. Then, the proposed cryptographic instructions (PRESENT and PRINCE) are integrated into the default instruction set architecture of the ReonV processor core. The instruction set extensions (ISE) of lightweight cipher modules can be instantiated in software routines exactly as the instructions of the base architecture. A single instruction is needed to implement a full lightweight cryptographic instruction. The customized ReonV RISCV processor is implemented on a Xilinx FPGA platform and is evaluated for Slice LUTs plus FF-pairs, frequency, and throughput. Obtained results show that our proposed concepts not only can achieve good encryption results with high performance and reduced cost but also are secure enough to resist against the most common attacks.
Article
Full-text available
Dedicated Short-Range Communication (DSRC) or IEEE 802.11p/OCB (Out of the Context of a Base-station) is widely considered to be a primary technology for Vehicle-to-Vehicle (V2V) communication, and it is aimed toward increasing the safety of users on the road by sharing information between one another. The requirements of DSRC are to maintain real-time communication with low latency and high reliability. In this paper, we investigate how communication can be used to improve stopping distance performance based on fieldwork results. In addition, we assess the impacts of reduced reliability, in terms of distance independent, distance dependent and density-based consecutive packet losses. A model is developed based on empirical measurements results depending on distance, data rate, and traveling speed. With this model, it is shown that cooperative V2V communications can effectively reduce reaction time and increase safety stop distance, and highlight the importance of high reliability. The obtained results can be further used for the design of cooperative V2V-based driving and safety applications.
Conference Paper
Full-text available
This paper surveys Lightweight Cryptographic solutions for Internet of Things (IoT). This survey covers comprehensively a flow of security measures from Lightweight Cryptographic solutions to comparison among different types of block ciphers. It also includes comparison between Hardware vs Software solutions and different recent approaches of the most trusted and researched block cipher, Advanced Encryption Standard (AES) in terms of architecture, Mix-Column/S-box modify strategy and attacks for IoT security. According to the study, lightweight AES has proved to be a good security solution for constrained IoT devices.
Article
Full-text available
Embedded systems are deployed in various domains, including industrial installations, critical and nomadic environments, private spaces and public infrastructures. Their operation typically involves access, storage and communication of sensitive and/or critical information that requires protection, making the security of their resources and services an imperative design concern. The demand for applicable cryptographic components is therefore strong and growing. However, the limited resources of these devices, in conjunction with the ever-present need for smaller size and lower production costs, hinder the deployment of secure algorithms typically found in other environments and necessitate the adoption of lightweight alternatives. This paper provides a survey of lightweight cryptographic algorithms, presenting recent advances in the field and identifying opportunities for future research. More specifically, we examine lightweight implementations of symmetric-key block ciphers in hardware and software architectures. We evaluate 52 block ciphers and 360 implementations based on their security, performance and cost, classifying them with regard to their applicability to different types of embedded devices and referring to the most important cryptanalysis pertaining to these ciphers.
Conference Paper
Full-text available
The work discussed in the present paper is part of the PANsafer project, whose purpose is to improve safety at level crossings. This project integrates several academic and industrial partners working together on several tasks. Here are described early tasks of the project, aiming at exploring, analyzing and justifying adequate solutions to improve safety at level crossings. The selected solutions will be implemented and evaluated in the framework of the subsequent work-packages of the project. First, a fine statistical analysis is carried out using accident/incident databases. At the same time, a human behaviour study is led in order to determine potential risky behaviours. Then, all the actors involved in the level crossing area are inventoried and a list of the services expected by these actors is established in order to bring out the main functions of the level crossing protection system. The state of the art shows that several solutions, both organizational and technical, are potentially useful to improve safety at level crossings. Moreover, the early studies carried out within PANsafer have listed some potential evolutions, concerning functionalities, law enforcement and normalization. The idea is to dispatch the results of the statistical analysis and its interpretation in the functional scheme of the level crossing environment. In this way, all the weak points within the level crossing environment will be mapped into the functional model in order to underline the functions which have to be enhanced. Therefore, a list of the retained solutions to be implemented is established. Finally, these solutions are specified using UML diagrams to explicit the scenarios that could happen at level crossings. First, we give a static description of the system (use case diagrams); Then? we establish a dynamic description (activity diagrams). Our ultimate goal is to give a detailed specification of the solutions which are going to be implemented and validated.
Conference Paper
Full-text available
Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely though the exploitation of vulnerable information systems and processes. Kinetic cyber attacks are a real and growing threat that is generally being ignored as unrealistic or alarmist. These types of attacks have been validated experimentally in the laboratory environment, they have been used operationally in the context of espionage and sabotage, and they have been used criminally in a number of attacks throughout the world. While these types of attacks have thus far been statistically insignificant, the rapid growth and integration of cyber physical systems into everything from automobiles to SCADA systems implies a significant kinetic cyber threat in the near future. It is imperative that the security community begin to take these types of threats seriously and address vulnerabilities associated with cyber physical systems and other devices that could be utilized to cause kinetic effects through cyber attacks.
Conference Paper
Full-text available
With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher appli- cations the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments such as RFID tags and sensor networks. In this paper we describe an ultra-lightweight block cipher, present. Both security and hardware efficiency have been equally importantduring the design of the cipher and at 1570 GE, the hardware requirements for present are competitive with today's leading compact stream ciphers.
Article
Full-text available
Intelligent transport systems are the rising technology in the near future to build cooperative vehicular networks in which a variety of different ITS applications are expected to communicate with a variety of different units. Therefore, the demand for highly customized communication channel for each or sets of similar ITS applications is increased. This article explores the capabilities of available wireless communication technologies in order to produce a win-win situation while selecting suitable carrier( s) for a single application or a profile of similar applications. Communication requirements for future ITS applications are described to select the best available communication interface for the target application(s).
Thesis
L'objectif principal de cette thèse est la conception de nouvelles cartes chaotiques pour la transmission sécurisée des images dans la couche physique des réseaux de capteurs multimédia sans fil. Pour pallier les défauts des cartes chaotiques standard et créer une dynamique chaotique plus complexe, nous proposons l'hybridation entre deux cartes en cascade. Les cartes chaotiques discrètes utilisées sont : la nouvelle carte cubique qui a été développée, la carte du chat d’Arnold et la carte sinusDans cette thèse, deux nouvelles conceptions de cartes paramétriques en cascade ont été développées ; la carte chaotiques 3D Cubique-Sinus et la carte 2D Cubique-Cat, la première carte a été utilisée comme générateur chaotique de nombre pseudo aléatoire pour le chiffrement d’images avec deux techniques ; la cryptographie et la stéganographie la deuxième carte a été utilisée pour le chiffrement de la modulation d’amplitude en quadrature (QAM).Des simulations de la complexité dynamique ont été effectuées pour les nouvelles cartes proposées ainsi qu’une simulation de transmission en OFDM des images chiffrées.Une analyse des valeurs PSNR et BER pour l’évaluation de la qualité de transmission a été présentée. Les résultats expérimentaux d’analyse de la sécurité des images chiffrée et de la qualité des images obtenues après transmission montrent clairement l’efficacité et la robustesse des méthodes proposées dans cette thèse.Mots clés : Chiffrement chaotique, Multiplexage par répartition orthogonale de la fréquence (OFDM), Sécurité de la couche physique, Stéganographie.
Book
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today’s simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.
Article
Autonomous vehicles offer new traffic behaviors that could revolutionize transportation. Examples include reservation-based intersection control and reduced reaction times that result in greater road capacity. Most studies have used microsimulation models of those new technologies to study their impacts more realistically. However, microsimulation is not tractable for larger networks. Recent developments in simulating reservation-based controls and multiclass cell transmission models for autonomous vehicles in dynamic traffic assignment have allowed studies of larger networks. This paper presents analyses of several highly congested arterial and freeway networks to quantify how reservations and reduced reaction times affect travel times and congestion. Reservations were observed to improve over signals in most situations. However, signals outperformed reservations in a congested network with several close local road and arterial intersections because the capacity allocations of signals were more optimized for the network. Reservations also were less efficient than were traditional merges and diverges for on- and off-ramps. However, the increased capacity from reduced following headways resulted in significant improvements for both freeway and arterial networks. Finally, the authors studied a downtown network, including freeway, arterial, and local roads, and found that the combination of reservations and reduced following headways resulted in a 78% reduction in travel time.
Article
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no longer sufficient to ensure the security of embedded cryptosystems. Among side channel attacks, Differential Fault Analysis is a powerful way to recover secret information from malicious perturbations of a cryptographic hardware. The purpose of the thesis is to extend the scope of fault attacks by providing brand new attacks based on innovative but realistic fault models. Whereas private keys have been rapidly protected against perturbations, recent works addressed the issue of protecting also non-critical elements, such as public keys, since their perturbation may leak secret information. We will investigate on this area by focusing on classical implementations of two very popular cryptosystems : RSA and DSA. In details, we will detail how to exploit faults on the public modulus that occurred during their execution. To the best of our knowledge, these cryptographic algorithms have never been studied according to such a fault model. We have also followed the emergence of new stream ciphers. Since their mathematical structure are stronger, we wanted to evaluate the robustness of their implementation against malicious faults. In this context we studied two of the eSTREAM finalists : Grain-128 and Rabbit. Finally, this thesis emphasizes the difficulty for elaborating efficient countermeasure against faults by describing what have been done for CRT-RSA.
Conference Paper
We study both distinguishing and key-recovery attacksagainst E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correlations is formulated by a recursive expression, which makes it easier to calculate correlations of the finite state machine output sequences up to 26 bits for E0 and allows us to verify the two known correlations to be the largest for the first time. Second, we apply the concept of convolution to the analysis of the distinguisher based on all correlations, and propose an efficient distinguisher due to the linear dependency of the largest correlations. Last, we propose a novel maximum likelihood decoding algorithm based on fast Walsh transform to recover the closest codeword for any linear code of dimension L and length n. It requires time O(n+L· 2L ) and memory min (n,2L ). This can speed up many attacks such as fast correlation attacks. We apply it to E0, and our best key-recovery attack works in 239 time given 239 consecutive bits after O(237) precomputation. This is the best known attack against E0 so far.
Implémentation d’un algorithme léger sur une architecture monoprocesseur pour l’internet des objets (IoT). master thesis, Monastir scientific university (2021) Google Scholar
  • R Brahim
Analyse et conception d’algorithmes de chiffrement à flot
  • C Berbain
Use of fixed and wireless communication technologies in LC safety application
  • R Öörni
  • S Collart-Dutilleul
  • L Khoudour
  • M Heddebaut
La question de la sécurité routière et de la sécurité ferroviaire aux passages à niveau
  • P Mervent
Level Crossings: A Guide for Managers, Designers and Operators
  • I Prosser