

2020
- URLBibTeXEndNoteArgyropoulos, Nikolaos, Pouria Sayyad Khodashenas, Orestis Mavropoulosa, Eirini Karapistoli, Anastasios Lytos, Paris Alexandros Karypidis, and Peter Hofmann Klaus. “Addressing Cybersecurity In The Next Generation Mobility Ecosystem With Caramel”. In, 23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020,Paphos, Cyprus, 2020. https://ewgt2020.eu/wp-content/uploads/extended_abstract/EWGT2020_abstract_144.pdf.
@conference{Argyropoulos2020Addressing,
author = {Argyropoulos, Nikolaos and Sayyad Khodashenas, Pouria and Mavropoulosa, Orestis and Karapistoli, Eirini and Lytos, Anastasios and Karypidis, Paris Alexandros and Klaus, Peter Hofmann},
keywords = {cybersecurity},
publisher = {23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020,Paphos, Cyprus},
title = {Addressing Cybersecurity in the Next Generation Mobility Ecosystem with CARAMEL},
year = 2020
}%0 Generic
%1 Argyropoulos2020Addressing
%A Argyropoulos, Nikolaos
%A Sayyad Khodashenas, Pouria
%A Mavropoulosa, Orestis
%A Karapistoli, Eirini
%A Lytos, Anastasios
%A Karypidis, Paris Alexandros
%A Klaus, Peter Hofmann
%D 2020
%I 23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020,Paphos, Cyprus
%T Addressing Cybersecurity in the Next Generation Mobility Ecosystem with CARAMEL
%U https://ewgt2020.eu/wp-content/uploads/extended_abstract/EWGT2020_abstract_144.pdf - URLBibTeXEndNoteKhadka, A, G. Efstathopoulos, P Karypidis, and A Lytos. “A Benchmarking Framework For Cyber-Attacks On Autonomous Vehicles”. In, 23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020,Paphos, Cyprus, 2020. https://ewgt2020.eu/wp-content/uploads/extended_abstract/EWGT2020_abstract_203.pdf.
@conference{Khadka2020Benchmarking,
author = {Khadka, A and Efstathopoulos, G. and Karypidis, P and Lytos, A},
keywords = {cybersecurity},
publisher = {23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020,Paphos, Cyprus},
title = {A benchmarking framework for cyber-attacks on autonomous vehicles},
year = 2020
}%0 Generic
%1 Khadka2020Benchmarking
%A Khadka, A
%A Efstathopoulos, G.
%A Karypidis, P
%A Lytos, A
%D 2020
%I 23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020,Paphos, Cyprus
%T A benchmarking framework for cyber-attacks on autonomous vehicles
%U https://ewgt2020.eu/wp-content/uploads/extended_abstract/EWGT2020_abstract_203.pdf - AbstractURLBibTeXEndNotePiperigkos, Nikos, and Aris S Lalos. “Impact Of False Data Injection Attacks On Decentralized Electric Vehicle Charging Protocols”. In, 23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020,Paphos, Cyprus, 2020. https://ewgt2020.eu/wp-content/uploads/extended_abstract/EWGT2020_abstract_210.pdf.Electric vehicles (EVs) gain great attention nowadays since the electrification of private and public transport has a great potential to reduce greenhouse gas emissions and mitigate oil dependency. However, the influx of a large number of electrical loads without any coordination could have adverse affects to the electrical grid. More importantly, the complexity in the coordination of a large number of EVs, pose critical challenges in ensuring overall system integrity. A typical attack found in the controllers of connected EVs is false data injection (FDI), which can be utilized to distort real energy demand and supply figures. Energy distribution requests may therefore be erroneous. The lack of a proper coordination scheme, robust to such cyber attacks could cause voltage magnitude drops and unacceptable load peaks. In this work, we study the impact of FDI attacks, on various decentralized charging protocol with reduced computational requirements. The proposed decentralized EV charging algorithms only require from each EV to solve a local problem, hence the proposed implementation require low computational resources. An extensive evaluation study highlights the strengths and weaknesses of the presented solutions which are based on iterative convex optimization solvers .
@conference{piperigkos2020impact,
abstract = {Electric vehicles (EVs) gain great attention nowadays since the electrification of private and public transport has a great potential to reduce greenhouse gas emissions and mitigate oil dependency. However, the influx of a large number of electrical loads without any coordination could have adverse affects to the electrical grid. More importantly, the complexity in the coordination of a large number of EVs, pose critical challenges in ensuring overall system integrity. A typical attack found in the controllers of connected EVs is false data injection (FDI), which can be utilized to distort real energy demand and supply figures. Energy distribution requests may therefore be erroneous. The lack of a proper coordination scheme, robust to such cyber attacks could cause voltage magnitude drops and unacceptable load peaks. In this work, we study the impact of FDI attacks, on various decentralized charging protocol with reduced computational requirements. The proposed decentralized EV charging algorithms only require from each EV to solve a local problem, hence the proposed implementation require low computational resources. An extensive evaluation study highlights the strengths and weaknesses of the presented solutions which are based on iterative convex optimization solvers .},
author = {Piperigkos, Nikos and Lalos, Aris S},
keywords = {cybersecurity},
publisher = {23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020,Paphos, Cyprus},
title = {Impact of false data injection attacks on decentralized electric vehicle charging protocols},
year = 2020
}%0 Generic
%1 piperigkos2020impact
%A Piperigkos, Nikos
%A Lalos, Aris S
%D 2020
%I 23rd EURO Working Group on Transportation Meeting, EWGT 2020, 16-18 September 2020,Paphos, Cyprus
%T Impact of false data injection attacks on decentralized electric vehicle charging protocols
%U https://ewgt2020.eu/wp-content/uploads/extended_abstract/EWGT2020_abstract_210.pdf
%X Electric vehicles (EVs) gain great attention nowadays since the electrification of private and public transport has a great potential to reduce greenhouse gas emissions and mitigate oil dependency. However, the influx of a large number of electrical loads without any coordination could have adverse affects to the electrical grid. More importantly, the complexity in the coordination of a large number of EVs, pose critical challenges in ensuring overall system integrity. A typical attack found in the controllers of connected EVs is false data injection (FDI), which can be utilized to distort real energy demand and supply figures. Energy distribution requests may therefore be erroneous. The lack of a proper coordination scheme, robust to such cyber attacks could cause voltage magnitude drops and unacceptable load peaks. In this work, we study the impact of FDI attacks, on various decentralized charging protocol with reduced computational requirements. The proposed decentralized EV charging algorithms only require from each EV to solve a local problem, hence the proposed implementation require low computational resources. An extensive evaluation study highlights the strengths and weaknesses of the presented solutions which are based on iterative convex optimization solvers . - URLBibTeXEndNoteDOIKaloxylos, Alexandros, Anastasius Gavras, and Raffaele De Peppe. “Empowering Vertical Industries Through 5G Networks - Current Status And Future Trends”, Zenodo, 2020. doi:10.5281/zenodo.3698113.
@misc{kaloxylos_alexandros_2020_3698113,
author = {Kaloxylos, Alexandros and Gavras, Anastasius and De Peppe, Raffaele},
keywords = {cybersecurity},
month = {aug},
publisher = {Zenodo},
title = {Empowering Vertical Industries through 5G Networks - Current Status and Future Trends},
year = 2020
}%0 Generic
%1 kaloxylos_alexandros_2020_3698113
%A Kaloxylos, Alexandros
%A Gavras, Anastasius
%A De Peppe, Raffaele
%D 2020
%I Zenodo
%R 10.5281/zenodo.3698113
%T Empowering Vertical Industries through 5G Networks - Current Status and Future Trends
%U https://doi.org/10.5281/zenodo.3698113 - URLBibTeXEndNoteHASRATYAN, Nina, Nina OLESEN, Adrien Becue, Ulrich Seldeslachts, Sadio BÂ, Andrea CHIAPPETTA, Andrei COSTIN, et al. Ecso Transportation Sector Report, Cyber Security For Road, Rail, Air, And Sea. Wg3 I Sectoral Demand, 2020. https://www.researchgate.net/publication/340518921_ECSO_Transportation_Sector_Report_Cyber_security_for_road_rail_air_and_sea_WG3_I_Sectoral_Demand.
@book{book,
author = {HASRATYAN, Nina and OLESEN, Nina and Becue, Adrien and Seldeslachts, Ulrich and BÂ, Sadio and CHIAPPETTA, Andrea and COSTIN, Andrei and DOBELMANN, Janine and HENNY, Christopher and Sayyad Khodashenas, Pouria and RIZZO, Gabriele and RUSSOTTO, Rémy and Sangwan, Jayant and SCHULZ-KAMM, Eva and WILKINSON, Lorraine and WOLLWEBER, Thorsten and DROUGKAS, Athanasios and Gransart, Christophe and GUYAUX-PECHACKOVA, Hana and Tschersich, Markus},
keywords = {cybersecurity joint_paper},
month = {01},
title = {ECSO Transportation Sector Report, Cyber security for road, rail, air, and sea. WG3 I Sectoral Demand},
year = 2020
}%0 Book
%1 book
%A HASRATYAN, Nina
%A OLESEN, Nina
%A Becue, Adrien
%A Seldeslachts, Ulrich
%A BÂ, Sadio
%A CHIAPPETTA, Andrea
%A COSTIN, Andrei
%A DOBELMANN, Janine
%A HENNY, Christopher
%A Sayyad Khodashenas, Pouria
%A RIZZO, Gabriele
%A RUSSOTTO, Rémy
%A Sangwan, Jayant
%A SCHULZ-KAMM, Eva
%A WILKINSON, Lorraine
%A WOLLWEBER, Thorsten
%A DROUGKAS, Athanasios
%A Gransart, Christophe
%A GUYAUX-PECHACKOVA, Hana
%A Tschersich, Markus
%D 2020
%T ECSO Transportation Sector Report, Cyber security for road, rail, air, and sea. WG3 I Sectoral Demand
%U https://www.researchgate.net/publication/340518921_ECSO_Transportation_Sector_Report_Cyber_security_for_road_rail_air_and_sea_WG3_I_Sectoral_Demand - AbstractURLBibTeXEndNoteDOIKantartopoulos, Panagiotis, Nikolaos Pitropakis, Alexios Mylonas, and Nicolas Kylilis. “Exploring Adversarial Attacks And Defences For Fake Twitter Account Detection”. Technologies 8, no. 4: 64. doi:https://doi.org/10.3390/technologies8040064.Social media has become very popular and important in people’s lives, as personal ideas, beliefs and opinions are expressed and shared through them. Unfortunately, social networks, and specifically Twitter, suffer from massive existence and perpetual creation of fake users. Their goal is to deceive other users employing various methods, or even create a stream of fake news and opinions in order to influence an idea upon a specific subject, thus impairing the platform’s integrity. As such, machine learning techniques have been widely used in social networks to address this type of threat by automatically identifying fake accounts. Nonetheless, threat actors update their arsenal and launch a range of sophisticated attacks to undermine this detection procedure, either during the training or test phase, rendering machine learning algorithms vulnerable to adversarial attacks. Our work examines the propagation of adversarial attacks in machine learning based detection for fake Twitter accounts, which is based on AdaBoost. Moreover, we propose and evaluate the use of k-NN as a countermeasure to remedy the effects of the adversarial attacks that we have implemented.
@article{kylilis2020exploring,
abstract = {Social media has become very popular and important in people’s lives, as personal ideas, beliefs and opinions are expressed and shared through them. Unfortunately, social networks, and specifically Twitter, suffer from massive existence and perpetual creation of fake users. Their goal is to deceive other users employing various methods, or even create a stream of fake news and opinions in order to influence an idea upon a specific subject, thus impairing the platform’s integrity. As such, machine learning techniques have been widely used in social networks to address this type of threat by automatically identifying fake accounts. Nonetheless, threat actors update their arsenal and launch a range of sophisticated attacks to undermine this detection procedure, either during the training or test phase, rendering machine learning algorithms vulnerable to adversarial attacks. Our work examines the propagation of adversarial attacks in machine learning based detection for fake Twitter accounts, which is based on AdaBoost. Moreover, we propose and evaluate the use of k-NN as a countermeasure to remedy the effects of the adversarial attacks that we have implemented.},
author = {Kantartopoulos, Panagiotis and Pitropakis, Nikolaos and Mylonas, Alexios and Kylilis, Nicolas},
journal = {Technologies},
keywords = {cybersecurity},
number = 4,
pages = 64,
publisher = {Multidisciplinary Digital Publishing Institute},
title = {Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection},
volume = 8,
year = 2020
}%0 Journal Article
%1 kylilis2020exploring
%A Kantartopoulos, Panagiotis
%A Pitropakis, Nikolaos
%A Mylonas, Alexios
%A Kylilis, Nicolas
%D 2020
%I Multidisciplinary Digital Publishing Institute
%J Technologies
%N 4
%P 64
%R https://doi.org/10.3390/technologies8040064
%T Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection
%U https://www.mdpi.com/2227-7080/8/4/64
%V 8
%X Social media has become very popular and important in people’s lives, as personal ideas, beliefs and opinions are expressed and shared through them. Unfortunately, social networks, and specifically Twitter, suffer from massive existence and perpetual creation of fake users. Their goal is to deceive other users employing various methods, or even create a stream of fake news and opinions in order to influence an idea upon a specific subject, thus impairing the platform’s integrity. As such, machine learning techniques have been widely used in social networks to address this type of threat by automatically identifying fake accounts. Nonetheless, threat actors update their arsenal and launch a range of sophisticated attacks to undermine this detection procedure, either during the training or test phase, rendering machine learning algorithms vulnerable to adversarial attacks. Our work examines the propagation of adversarial attacks in machine learning based detection for fake Twitter accounts, which is based on AdaBoost. Moreover, we propose and evaluate the use of k-NN as a countermeasure to remedy the effects of the adversarial attacks that we have implemented. - AbstractURLBibTeXEndNoteDOISouli, N., C. Laoudias, P. Kolios, C. Vitale, G. Ellinas, A. Lalos, J. Casademont, P. S. Khodashenas, and P. Kapsalas. “Gnss Location Verification In Connected And Autonomous Vehicles Using In-Vehicle Multimodal Sensor Data Fusion”. In 2020 22Nd International Conference On Transparent Optical Networks (Icton), 1-4, 2020. doi:10.1109/ICTON51198.2020.9203087.Connected and Autonomous Vehicles (CAVs) rely on Global Navigation Satellite Systems (GNSS), e.g., the Global Positioning System (GPS), for the provision of accurate location information for various functionalities including Vehicle-to-Vehicle/Infrastructure (V2V/V2I) communication and self-navigation. However, GNSS-based location awareness is prone to spoofing attacks, where the attacker generates counterfeit satellite signals. This in turn poses a serious threat to the CAV, e.g., car, drone, etc., as well as the surrounding entities. Thus, this threat needs to be detected reliably and mitigated timely to prevent undesired consequences (e.g., damages, casualties, etc.). To this end, this work proposes a location verification solution that leverages in-vehicle sensor readings (e.g., accelerometer, etc.) and Signals of Opportunity (SoO), as an alternative source of location information. In particular, the multimodal sensor data with SoO location measurements are fused by means of a Kalman filter and the estimated fusion-based location is used to verify the location output of the GPS receiver. In case the GPS location deviates considerably from the fusion-based location, then a location spoofing attack is ascertained. Preliminary experimental results with real GPS and sensor data collected with a drone demonstrate the effectiveness of the proposed approach.
@inproceedings{9203087,
abstract = {Connected and Autonomous Vehicles (CAVs) rely on Global Navigation Satellite Systems (GNSS), e.g., the Global Positioning System (GPS), for the provision of accurate location information for various functionalities including Vehicle-to-Vehicle/Infrastructure (V2V/V2I) communication and self-navigation. However, GNSS-based location awareness is prone to spoofing attacks, where the attacker generates counterfeit satellite signals. This in turn poses a serious threat to the CAV, e.g., car, drone, etc., as well as the surrounding entities. Thus, this threat needs to be detected reliably and mitigated timely to prevent undesired consequences (e.g., damages, casualties, etc.). To this end, this work proposes a location verification solution that leverages in-vehicle sensor readings (e.g., accelerometer, etc.) and Signals of Opportunity (SoO), as an alternative source of location information. In particular, the multimodal sensor data with SoO location measurements are fused by means of a Kalman filter and the estimated fusion-based location is used to verify the location output of the GPS receiver. In case the GPS location deviates considerably from the fusion-based location, then a location spoofing attack is ascertained. Preliminary experimental results with real GPS and sensor data collected with a drone demonstrate the effectiveness of the proposed approach.},
author = {Souli, N. and Laoudias, C. and Kolios, P. and Vitale, C. and Ellinas, G. and Lalos, A. and Casademont, J. and Khodashenas, P. S. and Kapsalas, P.},
booktitle = {2020 22nd International Conference on Transparent Optical Networks (ICTON)},
keywords = {cybersecurity},
pages = {1-4},
title = {GNSS Location Verification in Connected and Autonomous Vehicles Using in-Vehicle Multimodal Sensor Data Fusion},
year = 2020
}%0 Conference Paper
%1 9203087
%A Souli, N.
%A Laoudias, C.
%A Kolios, P.
%A Vitale, C.
%A Ellinas, G.
%A Lalos, A.
%A Casademont, J.
%A Khodashenas, P. S.
%A Kapsalas, P.
%B 2020 22nd International Conference on Transparent Optical Networks (ICTON)
%D 2020
%P 1-4
%R 10.1109/ICTON51198.2020.9203087
%T GNSS Location Verification in Connected and Autonomous Vehicles Using in-Vehicle Multimodal Sensor Data Fusion
%U https://ieeexplore.ieee.org/abstract/document/9203087
%X Connected and Autonomous Vehicles (CAVs) rely on Global Navigation Satellite Systems (GNSS), e.g., the Global Positioning System (GPS), for the provision of accurate location information for various functionalities including Vehicle-to-Vehicle/Infrastructure (V2V/V2I) communication and self-navigation. However, GNSS-based location awareness is prone to spoofing attacks, where the attacker generates counterfeit satellite signals. This in turn poses a serious threat to the CAV, e.g., car, drone, etc., as well as the surrounding entities. Thus, this threat needs to be detected reliably and mitigated timely to prevent undesired consequences (e.g., damages, casualties, etc.). To this end, this work proposes a location verification solution that leverages in-vehicle sensor readings (e.g., accelerometer, etc.) and Signals of Opportunity (SoO), as an alternative source of location information. In particular, the multimodal sensor data with SoO location measurements are fused by means of a Kalman filter and the estimated fusion-based location is used to verify the location output of the GPS receiver. In case the GPS location deviates considerably from the fusion-based location, then a location spoofing attack is ascertained. Preliminary experimental results with real GPS and sensor data collected with a drone demonstrate the effectiveness of the proposed approach. - AbstractURLBibTeXEndNoteDOICasademont, J., B. Cordero, D. Camps-Mur, L. A. M. da Conceição, A. Lalos, C. Vitale, C. Laoudias, and P. S. Khodashenas. “Multi-Radio V2X Communications Interoperability Through A Multi-Access Edge Computing (Mec)”. In 2020 22Nd International Conference On Transparent Optical Networks (Icton), 1-4, 2020. doi:10.1109/ICTON51198.2020.9203495.Nowadays, we are ready to have precommercial Cooperative Intelligent Transport Systems (C-ITS), nevertheless there exist challenging functional and security aspects that need to be addressed. One of them is the fact that, in every era, there will be several radio technologies which will be used by vehicles that need to be connected between them, therefore, the systems needs to provide interoperability services. The other critical issue is to reinforce security against attacks on localization receivers or in vehicles equipment. Most of these functions are based in a large amount of computation power, to this end, this paper presents the approach taken by H2020 CARAMEL project, using a Multi-access Edge Computing (MEC) that could provide the necessary performance assets.
@inproceedings{9203495,
abstract = {Nowadays, we are ready to have precommercial Cooperative Intelligent Transport Systems (C-ITS), nevertheless there exist challenging functional and security aspects that need to be addressed. One of them is the fact that, in every era, there will be several radio technologies which will be used by vehicles that need to be connected between them, therefore, the systems needs to provide interoperability services. The other critical issue is to reinforce security against attacks on localization receivers or in vehicles equipment. Most of these functions are based in a large amount of computation power, to this end, this paper presents the approach taken by H2020 CARAMEL project, using a Multi-access Edge Computing (MEC) that could provide the necessary performance assets.},
author = {Casademont, J. and Cordero, B. and Camps-Mur, D. and da Conceição, L. A. M. and Lalos, A. and Vitale, C. and Laoudias, C. and Khodashenas, P. S.},
booktitle = {2020 22nd International Conference on Transparent Optical Networks (ICTON)},
keywords = {cybersecurity},
pages = {1-4},
title = {Multi-Radio V2X Communications Interoperability Through a Multi-Access Edge Computing (MEC)},
year = 2020
}%0 Conference Paper
%1 9203495
%A Casademont, J.
%A Cordero, B.
%A Camps-Mur, D.
%A da Conceição, L. A. M.
%A Lalos, A.
%A Vitale, C.
%A Laoudias, C.
%A Khodashenas, P. S.
%B 2020 22nd International Conference on Transparent Optical Networks (ICTON)
%D 2020
%P 1-4
%R 10.1109/ICTON51198.2020.9203495
%T Multi-Radio V2X Communications Interoperability Through a Multi-Access Edge Computing (MEC)
%U https://ieeexplore.ieee.org/abstract/document/9203495
%X Nowadays, we are ready to have precommercial Cooperative Intelligent Transport Systems (C-ITS), nevertheless there exist challenging functional and security aspects that need to be addressed. One of them is the fact that, in every era, there will be several radio technologies which will be used by vehicles that need to be connected between them, therefore, the systems needs to provide interoperability services. The other critical issue is to reinforce security against attacks on localization receivers or in vehicles equipment. Most of these functions are based in a large amount of computation power, to this end, this paper presents the approach taken by H2020 CARAMEL project, using a Multi-access Edge Computing (MEC) that could provide the necessary performance assets. - AbstractBibTeXEndNoteDOIPiperigkos, N., A. S. Lalos, K. Berberidis, C. Laoudias, and K. Moustakas. “5G Enabled Cooperative Localization Of Connected And Semi-Autonomous Vehicles Via Sparse Laplacian Processing”. In 2020 22Nd International Conference On Transparent Optical Networks (Icton), 1-4, 2020. doi:10.1109/ICTON51198.2020.9203314.Cooperative Localization has received extensive interest from several scientific communities including Robotics, Optimization, Signal Processing and Wireless Communications. It is expected to become a major aspect for a number of crucial applications in the field of Connected and (Semi-) Autonomous vehicles (CAVs), such as collision avoidance/warning, cooperative adaptive cruise control, safely navigation, etc. 5G mobile networks will be the key to providing connectivity for vehicle to everything (V2X) communications, allowing CAVs to share with other entities of the network the data they collect and measure. Typical measurement models usually deployed for this problem, are absolute position information from Global Positioning System (GPS), relative distance to neighbouring vehicles and relative angle or azimuth angle, from Light Detection and Ranging (LIDAR) or Radio Detection and Ranging (RADAR) sensors. In this paper, we provide a cooperative estimation approach that performs multi modal-fusion between interconnected vehicles. This method is based on a Graph Signal Processing tool, known as Laplacian Graph Processing, and significantly outperforms existing method both in terms of attained accuracy and computational complexity.
@inproceedings{9203314,
abstract = {Cooperative Localization has received extensive interest from several scientific communities including Robotics, Optimization, Signal Processing and Wireless Communications. It is expected to become a major aspect for a number of crucial applications in the field of Connected and (Semi-) Autonomous vehicles (CAVs), such as collision avoidance/warning, cooperative adaptive cruise control, safely navigation, etc. 5G mobile networks will be the key to providing connectivity for vehicle to everything (V2X) communications, allowing CAVs to share with other entities of the network the data they collect and measure. Typical measurement models usually deployed for this problem, are absolute position information from Global Positioning System (GPS), relative distance to neighbouring vehicles and relative angle or azimuth angle, from Light Detection and Ranging (LIDAR) or Radio Detection and Ranging (RADAR) sensors. In this paper, we provide a cooperative estimation approach that performs multi modal-fusion between interconnected vehicles. This method is based on a Graph Signal Processing tool, known as Laplacian Graph Processing, and significantly outperforms existing method both in terms of attained accuracy and computational complexity.},
author = {Piperigkos, N. and Lalos, A. S. and Berberidis, K. and Laoudias, C. and Moustakas, K.},
booktitle = {2020 22nd International Conference on Transparent Optical Networks (ICTON)},
keywords = {cybersecurity},
pages = {1-4},
title = {5G Enabled Cooperative Localization of Connected and Semi-Autonomous Vehicles via Sparse Laplacian Processing},
year = 2020
}%0 Conference Paper
%1 9203314
%A Piperigkos, N.
%A Lalos, A. S.
%A Berberidis, K.
%A Laoudias, C.
%A Moustakas, K.
%B 2020 22nd International Conference on Transparent Optical Networks (ICTON)
%D 2020
%P 1-4
%R 10.1109/ICTON51198.2020.9203314
%T 5G Enabled Cooperative Localization of Connected and Semi-Autonomous Vehicles via Sparse Laplacian Processing
%X Cooperative Localization has received extensive interest from several scientific communities including Robotics, Optimization, Signal Processing and Wireless Communications. It is expected to become a major aspect for a number of crucial applications in the field of Connected and (Semi-) Autonomous vehicles (CAVs), such as collision avoidance/warning, cooperative adaptive cruise control, safely navigation, etc. 5G mobile networks will be the key to providing connectivity for vehicle to everything (V2X) communications, allowing CAVs to share with other entities of the network the data they collect and measure. Typical measurement models usually deployed for this problem, are absolute position information from Global Positioning System (GPS), relative distance to neighbouring vehicles and relative angle or azimuth angle, from Light Detection and Ranging (LIDAR) or Radio Detection and Ranging (RADAR) sensors. In this paper, we provide a cooperative estimation approach that performs multi modal-fusion between interconnected vehicles. This method is based on a Graph Signal Processing tool, known as Laplacian Graph Processing, and significantly outperforms existing method both in terms of attained accuracy and computational complexity. - AbstractURLBibTeXEndNoteDOIVitale, C., N. Piperigkos, C. Laoudias, G. Ellinas, J. Casademont, P. Sayyad Khodashenas, A. Kloukiniotis, et al. “The Caramel Project: A Secure Architecture For Connected And Autonomous Vehicles”. In 2020 European Conference On Networks And Communications (Eucnc), 133-138, 2020. doi:10.1109/EuCNC48522.2020.9200945.Connected and Autonomous Vehicles (CAVs) rely on Global Navigation Satellite Systems (GNSS), e.g., the Global Positioning System (GPS), for the provision of accurate location information for various functionalities including Vehicle-to-Vehicle/Infrastructure (V2V/V2I) communication and self-navigation. However, GNSS-based location awareness is prone to spoofing attacks, where the attacker generates counterfeit satellite signals. This in turn poses a serious threat to the CAV, e.g., car, drone, etc., as well as the surrounding entities. Thus, this threat needs to be detected reliably and mitigated timely to prevent undesired consequences (e.g., damages, casualties, etc.). To this end, this work proposes a location verification solution that leverages in-vehicle sensor readings (e.g., accelerometer, etc.) and Signals of Opportunity (SoO), as an alternative source of location information. In particular, the multimodal sensor data with SoO location measurements are fused by means of a Kalman filter and the estimated fusion-based location is used to verify the location output of the GPS receiver. In case the GPS location deviates considerably from the fusion-based location, then a location spoofing attack is ascertained. Preliminary experimental results with real GPS and sensor data collected with a drone demonstrate the effectiveness of the proposed approach.
@inproceedings{9200945,
abstract = {Connected and Autonomous Vehicles (CAVs) rely on Global Navigation Satellite Systems (GNSS), e.g., the Global Positioning System (GPS), for the provision of accurate location information for various functionalities including Vehicle-to-Vehicle/Infrastructure (V2V/V2I) communication and self-navigation. However, GNSS-based location awareness is prone to spoofing attacks, where the attacker generates counterfeit satellite signals. This in turn poses a serious threat to the CAV, e.g., car, drone, etc., as well as the surrounding entities. Thus, this threat needs to be detected reliably and mitigated timely to prevent undesired consequences (e.g., damages, casualties, etc.). To this end, this work proposes a location verification solution that leverages in-vehicle sensor readings (e.g., accelerometer, etc.) and Signals of Opportunity (SoO), as an alternative source of location information. In particular, the multimodal sensor data with SoO location measurements are fused by means of a Kalman filter and the estimated fusion-based location is used to verify the location output of the GPS receiver. In case the GPS location deviates considerably from the fusion-based location, then a location spoofing attack is ascertained. Preliminary experimental results with real GPS and sensor data collected with a drone demonstrate the effectiveness of the proposed approach.},
author = {Vitale, C. and Piperigkos, N. and Laoudias, C. and Ellinas, G. and Casademont, J. and Sayyad Khodashenas, P. and Kloukiniotis, A. and Lalos, A. S. and Moustakas, K. and Barrientos Lobato, P. and Moreno Castillo, J. and Kapsalas, P. and Hofmann, K. P.},
booktitle = {2020 European Conference on Networks and Communications (EuCNC)},
keywords = {cybersecurity},
pages = {133-138},
title = {The CARAMEL Project: a Secure Architecture for Connected and Autonomous Vehicles},
year = 2020
}%0 Conference Paper
%1 9200945
%A Vitale, C.
%A Piperigkos, N.
%A Laoudias, C.
%A Ellinas, G.
%A Casademont, J.
%A Sayyad Khodashenas, P.
%A Kloukiniotis, A.
%A Lalos, A. S.
%A Moustakas, K.
%A Barrientos Lobato, P.
%A Moreno Castillo, J.
%A Kapsalas, P.
%A Hofmann, K. P.
%B 2020 European Conference on Networks and Communications (EuCNC)
%D 2020
%P 133-138
%R 10.1109/EuCNC48522.2020.9200945
%T The CARAMEL Project: a Secure Architecture for Connected and Autonomous Vehicles
%U https://ieeexplore.ieee.org/document/9200945
%X Connected and Autonomous Vehicles (CAVs) rely on Global Navigation Satellite Systems (GNSS), e.g., the Global Positioning System (GPS), for the provision of accurate location information for various functionalities including Vehicle-to-Vehicle/Infrastructure (V2V/V2I) communication and self-navigation. However, GNSS-based location awareness is prone to spoofing attacks, where the attacker generates counterfeit satellite signals. This in turn poses a serious threat to the CAV, e.g., car, drone, etc., as well as the surrounding entities. Thus, this threat needs to be detected reliably and mitigated timely to prevent undesired consequences (e.g., damages, casualties, etc.). To this end, this work proposes a location verification solution that leverages in-vehicle sensor readings (e.g., accelerometer, etc.) and Signals of Opportunity (SoO), as an alternative source of location information. In particular, the multimodal sensor data with SoO location measurements are fused by means of a Kalman filter and the estimated fusion-based location is used to verify the location output of the GPS receiver. In case the GPS location deviates considerably from the fusion-based location, then a location spoofing attack is ascertained. Preliminary experimental results with real GPS and sensor data collected with a drone demonstrate the effectiveness of the proposed approach. - AbstractURLBibTeXEndNoteDOIKyrkou, Christos, Andreas Papachristodoulou, Andreas Kloukiniotis, Andreas Papandreou, Aris S. Lalos, Konstantinos Moustakas, and Theocharis Theocharides. “Towards Artificial-Intelligence-Based Cybersecurity For Robustifying Automated Driving Systems Against Camera Sensor Attacks”. In 2020 Ieee Computer Society Annual Symposium On Vlsi (Isvlsi), 476-481, 2020. doi:10.1109/ISVLSI49217.2020.00-11.CARAMEL is a European project that aims amongst others to improve and extend cyberthreat detection and mitigation techniques for automotive driving systems. This paper highlights the important role that advanced artificial intelligence and machine learning techniques can have in proactively addressing modern autonomous vehicle cybersecurity challenges and on mitigating associated safety risks when dealing with targetted attacks on a vehicle's camera sensors. The cybersecurity solutions developed by CARAMEL are based on powerful AI tools and algorithms to combat security risks in automated driving systems and will be hosted on embedded processors and platforms. As such, it will be possible to have a specialized anti-hacking device that addresses newly introduced technological dimensions for increased robustness and cybersecurity in addition to industry needs for high speed, low latency, functional safety, light weight, low power consumption.
@inproceedings{9154906,
abstract = {CARAMEL is a European project that aims amongst others to improve and extend cyberthreat detection and mitigation techniques for automotive driving systems. This paper highlights the important role that advanced artificial intelligence and machine learning techniques can have in proactively addressing modern autonomous vehicle cybersecurity challenges and on mitigating associated safety risks when dealing with targetted attacks on a vehicle's camera sensors. The cybersecurity solutions developed by CARAMEL are based on powerful AI tools and algorithms to combat security risks in automated driving systems and will be hosted on embedded processors and platforms. As such, it will be possible to have a specialized anti-hacking device that addresses newly introduced technological dimensions for increased robustness and cybersecurity in addition to industry needs for high speed, low latency, functional safety, light weight, low power consumption.},
author = {Kyrkou, Christos and Papachristodoulou, Andreas and Kloukiniotis, Andreas and Papandreou, Andreas and Lalos, Aris S. and Moustakas, Konstantinos and Theocharides, Theocharis},
booktitle = {2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)},
keywords = {cybersecurity},
month = {July},
pages = {476-481},
title = {Towards Artificial-Intelligence-Based Cybersecurity for Robustifying Automated Driving Systems Against Camera Sensor Attacks},
year = 2020
}%0 Conference Paper
%1 9154906
%A Kyrkou, Christos
%A Papachristodoulou, Andreas
%A Kloukiniotis, Andreas
%A Papandreou, Andreas
%A Lalos, Aris S.
%A Moustakas, Konstantinos
%A Theocharides, Theocharis
%B 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
%D 2020
%P 476-481
%R 10.1109/ISVLSI49217.2020.00-11
%T Towards Artificial-Intelligence-Based Cybersecurity for Robustifying Automated Driving Systems Against Camera Sensor Attacks
%U https://ieeexplore.ieee.org/document/9154906/
%X CARAMEL is a European project that aims amongst others to improve and extend cyberthreat detection and mitigation techniques for automotive driving systems. This paper highlights the important role that advanced artificial intelligence and machine learning techniques can have in proactively addressing modern autonomous vehicle cybersecurity challenges and on mitigating associated safety risks when dealing with targetted attacks on a vehicle's camera sensors. The cybersecurity solutions developed by CARAMEL are based on powerful AI tools and algorithms to combat security risks in automated driving systems and will be hosted on embedded processors and platforms. As such, it will be possible to have a specialized anti-hacking device that addresses newly introduced technological dimensions for increased robustness and cybersecurity in addition to industry needs for high speed, low latency, functional safety, light weight, low power consumption.