• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 63
  • 19
  • 12
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 142
  • 24
  • 19
  • 19
  • 16
  • 16
  • 15
  • 15
  • 15
  • 15
  • 15
  • 14
  • 13
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Paving the Path of LTE Toward 5G: Physical Layer Assurance and Operation in the Unlicensed Spectrum

Labib, Mina Salah Said 28 September 2020 (has links)
Long-Term Evolution (LTE) is the fourth generation (4G) wireless communications standard and its evolution is paving the path for the fifth generation (5G) technology. LTE is also considered for supporting public safety networks, Machine-to-Machine (M2M) communications, and many other applications. Hence, it is critical to ensure that the LTE system performs effectively even in harsh signaling environments. Unfortunately, LTE is vulnerable to intentional interference at the physical layer. We define the term LTE control channel spoofing, which refers to the case when an adversary sets a fake LTE-like base station (evolved NodeB or eNodeB) that transmits a partial or full LTE downlink frame to deceive LTE devices and hinder them from attaching to a real cell. Based on analyzing the initial cell selection process in the LTE specifications, we identify three different level of LTE control channel spoofing. We have built a testbed to demonstrate the feasibility of such an attack. The experimental results show that LTE control channel spoofing can cause permanent denial of service for LTE devices during the cell selection process. We propose effective mitigation techniques to enhance the immunity of LTE systems against all the three forms of LTE control channel spoofing, and ensure that it is secure and available when and where needed. Moreover, the commercial success of LTE and the resulting growth in mobile data demand have motivated cellular network operators to strive for new innovations. LTE-Unlicensed has been recently proposed to allow cellular network operators to offload some of their data traffic by accessing the unlicensed 5 GHz frequency band. There are three variants of LTE-Unlicensed that have been proposed in the industry. These variants differ in their operational features, but they enhance the capacity of LTE and represent a big milestone in its evolution toward 5G. However, LTE-Unlicensed faces several challenges when operating in the 5 GHz bands, as this spectrum is mainly occupied by Wi-Fi and by various radar systems. Therefore, we analyze the algorithms proposed in the industry for the LTE-Unlicensed and Wi-Fi coexistence, and we develop a new spectrum sharing technique for the coexistence between LTE-Unlicensed and radar systems. In order to analyze LTE-Unlicensed and Wi-Fi coexistence, we first explain the technical details of each of the three variants of LTE-Unlicensed, and we provide a comparative analysis of them in terms of their operational features. Then we develop an unbiased and objective evaluation of their proposed coexistence mechanisms with Wi-Fi systems, and numerically compare their performance. In order to emphasize the need for developing a new spectrum sharing technique for the coexistence between LTE-Unlicensed and radar systems, we first present the different regulatory requirements for the 5 GHz unlicensed bands in several world regions, and we perform a comprehensive survey on the different radar types within the 5 GHz sub-bands. Then we develop a novel spectrum sharing technique based on chance-constrained stochastic optimization to allow the LTE-Unlicensed eNodeB to share the spectrum efficiently with a radar system. The optimization problem is formulated to guarantee the minimum performance criteria for the radar operation, and at the same time allows the LTE-Unlicensed eNodeB to control its transmit power to maximize the performance for the serving LTE-Unlicensed device. A mathematical model is used to transform the stochastic optimization problem into a deterministic one, and an exhaustive search is used to solve the resulting optimization problem. Due to the power control mechanism resulting from the proposed algorithm, numerical results show a significant reduction in the protection distance required between the radar and the LTE-Unlicensed network for the two to coexist, as the proposed algorithm can allow the two systems to operate effectively with a protection distance of only 3.95% of the one imposed by the regulations.
122

<b>A Study on the Use of Unsupervised, Supervised, and Semi-supervised Modeling for Jamming Detection and Classification in Unmanned Aerial Vehicles</b>

Margaux Camille Marie Catafort--Silva (18477354) 02 May 2024 (has links)
<p dir="ltr">In this work, first, unsupervised machine learning is proposed as a study for detecting and classifying jamming attacks targeting unmanned aerial vehicles (UAV) operating at a 2.4 GHz band. Three scenarios are developed with a dataset of samples extracted from meticulous experimental routines using various unsupervised learning algorithms, namely K-means, density-based spatial clustering of applications with noise (DBSCAN), agglomerative clustering (AGG) and Gaussian mixture model (GMM). These routines characterize attack scenarios entailing barrage (BA), single- tone (ST), successive-pulse (SP), and protocol-aware (PA) jamming in three different settings. In the first setting, all extracted features from the original dataset are used (i.e., nine in total). In the second setting, Spearman correlation is implemented to reduce the number of these features. In the third setting, principal component analysis (PCA) is utilized to reduce the dimensionality of the dataset to minimize complexity. The metrics used to compare the algorithms are homogeneity, completeness, v-measure, adjusted mutual information (AMI) and adjusted rank index (ARI). The optimum model scored 1.00, 0.949, 0.791, 0.722, and 0.791, respectively, allowing the detection and classification of these four jamming types with an acceptable degree of confidence.</p><p dir="ltr">Second, following a different study, supervised learning (i.e., random forest modeling) is developed to achieve a binary classification to ensure accurate clustering of samples into two distinct classes: clean and jamming. Following this supervised-based classification, two-class and three-class unsupervised learning is implemented considering three of the four jamming types: BA, ST, and SP. In this initial step, the four aforementioned algorithms are used. This newly developed study is intended to facilitate the visualization of the performance of each algorithm, for example, AGG performs a homogeneity of 1.0, a completeness of 0.950, a V-measure of 0.713, an ARI of 0.557 and an AMI of 0.713, and GMM generates 1, 0.771, 0.645, 0.536 and 0.644, respectively. Lastly, to improve the classification of this study, semi-supervised learning is adopted instead of unsupervised learning considering the same algorithms and dataset. In this case, GMM achieves results of 1, 0.688, 0.688, 0.786 and 0.688 whereas DBSCAN achieves 0, 0.036, 0.028, 0.018, 0.028 for homogeneity, completeness, V-measure, ARI and AMI respectively. Overall, this unsupervised learning is approached as a method for jamming classification, addressing the challenge of identifying newly introduced samples.</p>
123

Jamming and glass transition in mean-field theories and beyond / Jamming e transizione vetrosa in teorie di campo medio ed oltre / Transition vitreuse et de jamming en théories de champ moyen et au-delà

Altieri, Ada 06 February 2018 (has links)
La description détaillée des systèmes désordonnés et vitreux représente un défi central en physique statistique et de la matière condensée, puisqu'à ce jour il n'existe pas de théorie unique et établie permettant de comprendre ces systèmes, pourtant omniprésents.Ce travail de recherche est lié en particulier à l'étude des matériaux vitreux à basse température. Plus précisément, si l'on considère des systèmes formés par un ensemble de particules athermiques avec des interactions répulsives de portée finie, en augmentant la densité, on peut observer une transition dite d'encombrement ("jamming"). Celle-ci consiste en un blocage des degrés de liberté accompagné par une augmentation spectaculaire de la rigidité du matériau.Nous étudierons ce problème à l’aide d’une analogie formelle entre des modèles de sphères et le perceptron, un modèle théorique qui développe une transition d'encombrement et des phénomènes de frustration typiques des systèmes désordonnés.En tant que modèle en champ moyen, il permet d'obtenir des résultats analytiques précis et généralisables à des systèmes à haute dimension.L'enjeu majeur de cette étude est de reconstruire le spectre des modes de vibration et toutes les propriétés pertinentes d'une phase spécifique (correspondant au régime dit des sphères dures).Dans ce cadre, nous dériverons le potentiel effectif en fonction des paramètres d'ordre du modèle et nous montrerons qu'il est dominé à proximité du point de jamming par une interaction logarithmique non triviale, qui clarifiera le lien entre les forces de contact et les distances moyennes entre les particules, dans la région critique et au-delà.Comprendre pleinement la transition d'encombrement et les propriétés du perceptron nous permettra de faire des progrès dans plusieurs domaines reliés. En premier lieu, cela peut conduire à une théorie complète des systèmes amorphes, à la fois en dimension infinie et en dimension finie.De plus, le modèle du perceptron semble avoir un lien étroit avec des problèmes dits de Von Neumann. En effet, les systèmes biologiques et écologiques développent souvent des propriétés liées à une condition pseudo-critique en mettant en oeuvre des mécanismes d'optimisation de ressource-consommation.Est-il possible d'identifier un régime caractérisé par une brisure de symétrie? Quel serait le spectre de fluctuations d'énergie dans ces systèmes?Ce ne sont que quelques-unes des questions auxquelles nous essayerons de répondre dans cette thèse.Cependant, l'approximation de champ moyen peut parfois fournir des informationsincorrectes ou trompeuses, en particulier dans l'étude de certaines transitions de phase et la détermination des dimensions critiques inférieure et supérieure.Afin d'avoir une vue d'ensemble et pouvoir manipuler correctement des systèmes en dimension finie, dans la suite de la thèse nous discuterons comment obtenir un développement perturbatif systématique, applicable à tout modèle, à condition que ce dernier soit défini sur un réseau ou un graphe biparti.Notre motivation est en particulier liée à la possibilité d'étudier certaines transitions de phase du second ordre qui existent sur le réseau de Bethe - c'est-à-dire un réseau en arbre sans boucles dont chaque noeud a une connectivité fixe - mais qui sont qualitativement différentes ou absentes dans le modèle entièrement connecté correspondant. / The detailed description of disordered and glassy systems represents an open problem in statistical physics and condensed matter. As yet, there is no single, well-established theory allowing to understand such systems. The research presented in this thesis is related in particular to the study of glassy materials in the low-temperature regime. More precisely, considering systems formed by athermal particles subject to repulsive short-range interactions, upon progressively increasing the density, a so-called jamming transition can be detected. It entails a freezing of the degrees of freedom and hence a huge increase of the material rigidity.We shall study this problem in view of a formal analogy between sphere models and the perceptron, a theoretical model undergoing a jamming transition and frustration phenomena typical of disordered systems. Being a mean-field model, it allows to obtain exact analytical results, which are generalizable to more complex high-dimensional settings.The main aim is to reconstruct the vibrational spectrum and all the relevant properties of a specific phase of the perceptron, corresponding to the hard-sphere regime.In this framework, we will derive the effective potential as a function of the gaps between and forces among the particles, and we will show that it is dominated by a non-trivial logarithmic interaction near the jamming point. This interaction in turn will clarify the relations existing between the relevant variables of the system, in the critical jamming region and beyond.Understanding the jamming transition and the perceptron properties will allow us to make progress in several related fields. First, this study could lay part of the groundwork towards a complete theory of amorphous systems, in both infinite and finite dimensions. Furthermore, the perceptron model seems to a have a close connection with the so-called Von Neumann problems. Indeed, biological and ecological systems often develop pseudo-critical properties and give rise to general mechanisms of resource-consumption optimisation.Is the identification of a broken symmetry regime possible? What would it yield in terms of the spectrum of the energy fluctuations?These are just a few questions we shall attempt to answer in this context.However, the mean-field approximation can sometimes provide wrong or misleading information, especially in studying certain phase transitions and determining the exact lower and upper critical dimensions. To have a broad perspective and correctly deal with finite-dimensional systems, in the second part of the thesis we will discuss obtaining a systematic perturbative expansion which can be applied to any model, as long as defined on a lattice or a bipartite graph.Our motivation is in particular due to the possibility of studying relevant second-order phase transitions which exist on the Bethe lattice — a lattice with a locally tree-like structure and fixed connectivity for each node — but which are qualitatively different or absent in the corresponding fully-connected version.
124

Design and analysis of common control channels in cognitive radio ad hoc networks

Lo, Brandon Fang-Hsuan 13 January 2014 (has links)
Common control channels in cognitive radio (CR) ad hoc networks are spectrum resources temporarily allocated and commonly available to CR users for control message exchange. With no presumably available network infrastructure, CR users rely on cooperation to perform spectrum management functions. One the one hand, CR users need to cooperate to establish common control channels, but on the other hand, they need to have common control channels to facilitate such cooperation. This control channel problem is further complicated by primary user (PU) activities, channel impairments, and intelligent attackers. Therefore, how to reliably and securely establish control links in CR ad hoc networks is a challenging problem. In this work, a framework for control channel design and analysis is proposed to address control channel reliability and security challenges for seamless communication and spectral efficiency in CR ad hoc networks. The framework tackles the problem from three perspectives: (i) responsiveness to PU activities: an efficient recovery control channel method is devised to efficiently establish control links and extend control channel coverage upon PU's return while mitigating the interference with PUs, (ii) robustness to channel impairments: a reinforcement learning-based cooperative sensing method is introduced to improve cooperative gain and mitigate cooperation overhead, and (iii) resilience to jamming attacks: a jamming-resilient control channel method is developed to combat jamming under the impacts of PU activities and spectrum sensing errors by leveraging intrusion defense strategies. This research is particularly attractive to emergency relief, public safety, military, and commercial applications where CR users are highly likely to operate in spectrum-scarce or hostile environment.
125

Performance analysis of the IEEE 802.11A WLAN standard optimum and sub-optimum receiver in frequency-selective, slowly fading Nakagami channels with AWGN and pulsed noise jamming

Kalogrias, Christos 03 1900 (has links)
Approved for public release, distribution is unlimited / Wide local area networks (WLAN) are increasingly important in meeting the needs of next generation broadband wireless communications systems for both commercial and military applications. Under IEEE 802.11a 5GHz WLAN standard, OFDM was chosen as the modulation scheme for transmission because of its well-known ability to avoid multi-path effects while achieving high data rates. The objective of this thesis is to investigate the performance of the IEEE 802.11a WLAN standard receiver over flat fading Nakagami channels in a worst case, pulse-noise jamming environment, for the different combinations of modulation type (binary and non-binary modulation) and code rate specified by the WLAN standard. Receiver performance with Viterbi soft decision decoding (SDD) will be analyzed for additive white Gaussian noise (AWGN) alone and for AWGN plus pulse-noise jamming. Moreover, the performance of the IEEE 802.11a WLAN standard receiver will be examined both in the scenario where perfect side information is considered to be available (optimum receiver) and when it is not (sub-optimum receiver). In the sub-optimum receiver scenario, the receiver performance is examined both when noise-normalization is utilized and when it is not. The receiver performance is severely affected by the pulse-noise jamming environment, especially in the suboptimum receiver scenario. However, the sub-optimum receiver performance is significantly improved when noise-normalization is implemented. / Lieutenant, Hellenic Navy
126

Application de la mécanique statistique à trois problèmes hors d'équilibre : algorithmes, épidémies, milieux granulaires

Deroulers, Christophe 26 September 2006 (has links) (PDF)
Cette thèse de doctorat étudie trois problèmes à l'aide des outils de la mécanique statistique. Nous montrons l'existence du phénomène d'universalité critique pour la transition de phases dynamique de certains algorithmes de recherche combinatoire. Nous donnons les valeurs exactes des exposants critiques et une formule analytique pour une fonction d'échelle. Nous développons un formalisme qui nous permet de calculer un développement perturbatif systématique, en grandes dimensions d'espace, de la fonction de grandes déviations de l'état métastable du processus de contact. Il peut resservir entre autres pour d'autres modèles de biologie des populations. Nous introduisons enfin deux modèles bidimensionnels exactement solubles pour la statique des milieux granulaires. Ils reproduisent la transition de jamming et permettent de discuter les différentes échelles de longueurs de ces milieux et de mettre en défaut l'hypothèse d'Edwards dans un cas réaliste.
127

Amélioration des procédures de cryoconservation de type congélation-lente par simulation et caractérisation des effets de composés chitooligosaccharides / Slow-freezing procedures improvements, by simulation and characterization of the effects of chitooligosaccharides compounds

Desnos, Hugo 05 April 2019 (has links)
Les méthodes d’amélioration des procédures de cryoconservation sont traditionnellement basées sur l’empirisme. Pour s’en démarquer, nous sommes repartis des modèles biophysiques développés pour décrire les procédures en s’appuyant sur 2 méthodes. La 1ère méthode a consisté au développement de techniques de simulation des procédures en caractérisant l’utilisation du Snomax dans l’appareil DSC. Nous avons montré que le contrôle de la température de nucléation (Tn) est possible en choisissant les conditions expérimentales (volume d’échantillon et concentration en Snomax) qui influencent les probabilités de présence de 3 sous-populations d’INA des protéines de P. syringae. La possibilité d’effectuer des simulations a pu être validée pour certaines plages de surfusion dans les solutions de cryoconservation. Ceci a permis la caractérisation des effets physiques influencés par Tn et qui interviennent au cours des procédures et d’alimenter les modèles biophysiques de cryoconservation. La 2ème méthode a consisté à la modification de la composition des solutions afin de réduire le recours au DMSO (cytotoxique) en utilisant des composés de type oligosaccharides : les COS. Après vérification de la biocompatibilité des COS avec des cellules embryonnaires, la caractérisation de l’influence thermodynamique des COS a été effectuée. Il a été montré que les COS sont des cryostabilisateurs qui se lient à une petite quantité de molécule d’eau et n’en affecte pas les propriétés physicochimiques. Les COS peuvent donc être introduits dans le milieu extracellulaire sans risque d’accélérer la déshydratation cellulaire. De plus, il a été montré qu’ils favorisent la gélification du milieu extracellulaire, laquelle est fonction de la proportion massique d’eau en solution résiduelle. Cette gélification fige une partie du système ce qui favorise sa stabilisation au passage des zones de températures à risques de recristallisation / We wished to move aside classical cryopreservation procedure improvements that are based on empiricism and to focus on existing biophysical models in order to describe procedures. We based our study on two methods. The first method consisted in developing the methods for the simulations of procedures, by characterizing the use of Snomax in a DSC device. This study highlighted that the nucleation temperature (Tn) control is possible under precise experimental conditions (sample volume and Snomax concentration) that influence the presence probability of 3 INA subpopulations of the P. syringae protein aggregates. The possibility to simulate the cryopreservation procedures has been achieved for some supercooling ranges within complex cryopreservation solutions. Consequently, it has been possible to characterize the physical effects influenced by Tn and involved within procedures. These results will participate in supplying cryopreservation biophysical models. The second method aimed to modify the composition of cryopreservative solutions in order to reduce the DMSO use (because of its cytotoxicity), using extracellular CPA components: the chitooligosaccharides COS. Subsequent to the biocompatibility verification of the COS with embryonic cells, the thermodynamic influence of the COS has been characterized. Therefore, it has been demonstrated that COS are cryostabilizers that link themselves to a small number of water molecules and does not influence its physicochemical properties. Consequently, COS can be added within the extracellular space without any risk to accelerate the cell dehydration. It has been demonstrated that COS favor the gelation of the extracellular space and that this gelation relies on the mass proportion of water in the residual solution. This gelation immobilizes a part of the system and therefore favor its stabilization when the temperature reaches the risky recrystallization range
128

GNSS Safety and Handling

Björklund, Axel January 2022 (has links)
Satellite navigation (such as GPS) has become widely successful and is used by billions of users daily. Accuratepositioning and timing has a wide range of applications and is increasingly being integrated in safety criticalsystems such as autonomous operations, traffic management, navigation for airplanes and other vehicles. Thesecurity and vulnerabilities of satellite navigation is however often not considered in the same way as for exampledata security, even though the high efficacy of spoofing with off-the-self software-defined radio (SDR) has beendemonstrated repeatedly. The lack of concern comes partially from the lack of options as satellite navigationauthentication has not previously existed in the civil domain.This work benchmarks the anti-spoofing and signal level measurements of commercial receivers in both simulatedand real-world scenarios and implements additional anti-spoofing measures. The additional anti-spoofingmeasures are implemented using no additional information than what the receiver should already have accessto in any modern commercial vehicle. Upcoming EU regulation 2021/1228 for vehicles used in internationaltransport will also mandate the use of these three anti-spoofing measures by August 2023. Here receiver time isverified by the means of Network Time Protocol (NTP) and real time clock (RTC); receiver motion is verifiedby the means of dead reckoning and inertial measurement unit (IMU); receiver navigation data is verified by themeans of asymmetric cryptography and Galileo Open Service Navigation Message Authentication (OSNMA).The computational overhead is analyzed as well as cost and worldwide Market feasibility. We estimate thateven basic timing devices would only have to perform one NTP request every 17 days and a microcontrollerpowerful enough to do OSNMA costs less than $2. Finally, the benefits of multi-band receivers and futuredevelopments in both the user and space segments are discussed.
129

Investigation of Jamming Phenomenon in a DRI Furnace Pellet Feed System using the Discrete Element Method and Computational Fluid Dynamics

John Gregory Rosser (15448535) 11 May 2023 (has links)
<p>  </p> <p>Direct reduction ironmaking has gained popularity as a low carbon alternative to the typical blast furnace ironmaking route. A popular method of producing direct reduced iron is through the reduction of iron ore pellets in a reduction shaft furnace. Critical to this process is the use of a reliable continuous pellet feed system to provide a steady flow of pellets to the furnace. Therefore, any disruption in pellet flow can have a significant negative impact on the production rate of iron. </p> <p><br></p> <p>An iron ore pellet feed system for a direct reduction ironmaking furnace is jamming during winter operation. The pellets are jamming in a hopper at the top of the feed system above the furnace, and a hot gas, that seals off the furnace flue gas, flows counter to the pellets. A computational model of the feed system is built utilizing the discrete element method and computational fluid dynamics, using Siemen’s commercial multiphysics software Star-CCM+, to study the conditions that cause the jam to occur. The study is divided into six parts: pellet bulk flow calibration, computational cost reduction, modeling of the baseline operation, modeling the effect of moisture, development of a thermal model, and investigation of the minimal amount of icy and wet material to jam the system. The findings show that the location of jamming during operation matches the area in the simulation where it is most likely to occur, and that moisture alone is unlikely to result in jamming. Results indicate that the system will jam when charged with a minimum of 15% icy pellets, and when charged with 10% icy together with 5% wet pellets. Experimental work is recommended to validate the findings and to calibrate the simulations accordingly.</p>
130

Impacts of misbehavior in Intelligent Transportation Systems (ITS) : The case of cooperative maneuvers / Påverkan av felaktigt beteende i Intelligenta Transportsystem (ITS) : Fallet med kooperativa manövrar

Henriksson, Andreas January 2022 (has links)
Connected and autonomous vehicles are emerging technologies that have fostered the Intelligent Transportation System (ITS). ITS has the objective of optimizing traffic safety, mobility, and fuel consumption. To achieve this, a range of different services are provided that utilize communication in a vehicular network. One of these services that has received a lot of attention lately due to its ongoing standardization is the Maneuver Coordination Service (MCS). MCS has already shown great potential in the support of complex traffic areas, also called Transition Area (TA), where vehicles must cooperate to avoid Transition of Controls (ToCs). ITS-services often rely on communicated data; small errors, such as inaccessible or incorrect data, can cause the system to behave incorrectly. Signal interference (jamming) can cause communication interruptions, making vehicles unaware of each other. Incorrect data can be intentional due to data injection attacks, but also unintentional due to malfunctioning sensors, making vehicles incorrectly aware of each other. Incorrect behavior in systems such as ITS can lead to traffic congestion or even life-threatening collisions. This study focuses on MCS and examines traffic behavior when the service, in a generic traffic scenario, is subjected to jamming and falsification attacks with a variety of strategies (negative and positive speed, acceleration and position offset). We considered external attackers (not authenticated) that can disrupt communication, as well as internal attackers (authenticated) that are limited to tampering with outgoing data. Through severe collisions and travel time delays, the results show an impact on both safety and mobility. The results also show that different attacks with different impacts on the adversary can cause similar effects on the traffic, thus allowing the adversary to choose attacks based on the desired impact and its rationality, i.e. its willingness to be part of the impact. The study also proposes an extension to an already proposed Maneuver Coordination Protocol (MCP). We show that our extended MCP can be beneficial in avoiding dangerous maneuvers that could lead to collisions with cars in the blind spot. / Uppkopplade och autonoma fordon är framväxande teknologier som har främjat Intelligenta Transporteringssystem (ITS). ITS har som mål att optimera trafiksäkerhet, mobilitet och bränsleförbrukning. För att uppnå detta tillhandahålls en rad olika tjänster som utnyttjar kommunikation i ett fordonsnät. En av dessa tjänster som har fått mycket uppmärksamhet under den senaste tiden, tack vare sin pågående standardisering, är Manöverkoordinationtjänsten (MCS). MCS har redan visat stor potential för att stödja komplexa trafikområden, även kallade Övergångsområden (TA), där fordon måste samarbeta för att undvika kontrollövergångar (ToCs). ITS-tjänster förlitar sig ofta på kommunicerad data; små fel, som otillgängliga eller felaktiga data, kan göra att systemet beter sig felaktigt. Signalstörningar kan orsaka kommunikationsavbrott, vilket gör fordon omedvetna om varandra. Felaktig data kan vara avsiktliga på grund av datainjektionsattacker, men också oavsiktliga på grund av felaktiga sensorer, vilket gör fordon felaktigt medvetna om varandra. Felaktigt beteende i system som ITS kan leda till trafikstockningar eller till och med livshotande kollisioner. Denna studie fokuserar på MCS och undersöker trafikbeteendet när tjänsten, i ett generiskt trafikscenario, utsätts för signalstörningar och förfalskningsattacker med en mängd olika strategier (negativ och positiv hastighet, acceleration och positionsförskjutning). Vi tog hänsyn till externa angripare (ej autentiserade) som kan störa kommunikationen, såväl som interna angripare (autentiserade) som är begränsade till att manipulera utgående data. Genom allvarliga kollisioner och restidsförseningar visar resultaten en inverkan på både säkerhet och mobilitet. Resultaten visar också att olika attacker med olika inverkan på angriparen kan orsaka liknande effekter på trafiken, vilket gör att angriparen kan välja attacker baserat på den önskade effekten och rationaliteten, d.v.s. dens villighet att vara en del av påverkan. Studien föreslår också en utökning av en redan föreslagen MCP. Vi visar att vårt utökade MCP kan vara till nytta för att undvika farliga manövrar som kan leda till kollisioner med bilar i döda vinkeln.

Page generated in 0.0744 seconds