Adriana Berdich

ORCID: 0000-0002-7646-7825
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Smart Grid Security and Resilience
  • Advanced Malware Detection Techniques
  • Advanced Steganography and Watermarking Techniques
  • Music and Audio Processing
  • Video Surveillance and Tracking Methods
  • Chaos-based Image/Signal Encryption
  • Robotics and Sensor-Based Localization
  • Anomaly Detection Techniques and Applications
  • Real-time simulation and control systems
  • Bluetooth and Wireless Communication Technologies
  • Image Processing Techniques and Applications
  • Network Security and Intrusion Detection
  • Speech and Audio Processing
  • Digital Rights Management and Security
  • Network Time Synchronization Technologies
  • IoT-based Smart Home Systems
  • Smart Parking Systems Research
  • Digital Transformation in Industry
  • Cryptography and Data Security
  • Robotic Path Planning Algorithms
  • Energy Efficient Wireless Sensor Networks

Polytechnic University of Timişoara
2018-2024

Camera sensor identification can have numerous forensics and authentication applications. In this work, we follow an methodology for smartphone camera sensors using properties of the Dark Signal Nonuniformity (DSNU) in collected images. This requires taking dark pictures, which users easily do by keeping phone against their palm, has already been proposed various works. From such extract low mid frequency AC coefficients from DCT (Discrete Cosine Transform) classify data with help machine...

10.3390/e24081158 article EN cc-by Entropy 2022-08-19

We address the secure pairing of mobile devices based on accelerometer data under various transportation environments, e.g., train, tram, car, bike, walking, etc. As users commonly commute by several modes, extracting session keys from scenarios to private network user's or even public formed belonging distinct that share same location is crucial. The main goal our work establish amount entropy can be collected these environments in order determine concrete security bounds for each...

10.1109/access.2020.2964151 article EN cc-by IEEE Access 2020-01-01

Digital twins are used to replicate the behavior of physical systems, and in-vehicle networks can greatly benefit from this technology. This is mainly because circulate large amounts data coming various sources such as wired, or in some cases even wireless, sensors that fused by actuators responsible for safety-critical tasks require careful testing. In work, we build a laboratory network mimics real vehicle regards wire length, number stubs devices connected it. The Controller Area Network...

10.3390/app13010445 article EN cc-by Applied Sciences 2022-12-29

In the recent years, there has been a lot of focus on designing security for in-vehicle networks and detecting intrusions. Still, no countermeasure is perfect most existing intrusion detection systems have nonzero false negative rate, which implies that adversarial frames may still go undetected bus. Unfortunately, answers are largely missing what will happen with vehicle in such circumstances, i.e., how safety bystanders affected by actions undetected, while little or acceptable...

10.1109/tr.2024.3373810 article EN IEEE Transactions on Reliability 2024-03-25

Smartphones are quickly moving toward complementing or even replacing traditional car keys. We advocate a role-based access control policy mixed with attributes that facilitates to various functionalities of vehicular on-board units from smartphones. use rights-based for in-vehicle similar the case file allocation table contemporary OS, in which read, write execute operations can be performed over vehicle functions. Further, assure appropriate security, we develop protocol suite using...

10.1109/access.2020.3003574 article EN cc-by IEEE Access 2020-01-01

Fingerprinting smartphones based on acoustic characteristics of their loudspeaker may have a number applications in device-to-device authentication as well forensic investigations. In this work we propose an efficient fingerprinting methodology by using the roll-off device speaker, i.e., transition between low and high stopbands to passband segment speaker. We extract from sweep signals, also know chirps, that are commonly used practice test speaker response. This procedure appears be more...

10.1109/tmc.2021.3119987 article EN IEEE Transactions on Mobile Computing 2021-10-15

Smartphones are a vital technology, they improve our social interactions, provide us great deal of information and bring forth the means to control various emerging technologies, like numerous IoT devices that controlled via smartphone apps. In this context, fingerprinting from sensor characteristics is topic high interest not only due privacy implications or potential use in forensics investigations, but also because applications device authentication. work we review existing approaches for...

10.1109/jiot.2023.3277883 article EN cc-by IEEE Internet of Things Journal 2023-05-19

As the security vulnerabilities of controller area networks (CAN) become well known, heavy-duty vehicles implementing SAE J1939 specification layer on this bus are immediate targets. Recently released standards provide clear cybersecurity requirements, but exact methods to be implemented not specified and remain up manufacturers. In work, we address adversary actions countermeasures at control system level for a vehicle CAN bus. This low approach allows us complement regular attacks with...

10.1109/tii.2023.3283995 article EN IEEE Transactions on Industrial Informatics 2023-06-13

Fingerprinting devices based on unique characteristics of their sensors is an important research direction nowadays due to its immediate impact non-interactive authentications and no less privacy implications. In this work, we investigate smartphone fingerprints obtained from microphone data recordings containing human speech, environmental sounds several live performed outdoors. To comply with real-world circumstances, also consider the presence types noise that specific scenarios which...

10.1109/access.2022.3223375 article EN cc-by IEEE Access 2022-01-01

In mobile robot applications, to track and follow moving targets is a challenging task. this paper there developed tracking system with two robots: the master tele-operated from an Android application via Bluetooth, autonomous slave three ultrasonic sensors which will master. The algorithm of employs: i) position control maintain constant distance between master, ii) direction in one six states detected by finite-state machine based on fuzzy logic, smooth transitions states. master-slave are...

10.1109/saci.2018.8440962 article EN 2018-05-01

Mobile device pairing inside vehicles is a ubiquitous task which requires easy to use and secure solutions. In this work we exploit the audio-video domain for devices vehicles. principle, rely on widely used elliptical curve version of Diffie-Hellman key-exchange protocol extract session keys from acoustic as well visual by using head unit display. The need merging audio-visual domains first stems fact that in-vehicle units generally do not have camera so they cannot data smartphones,...

10.3390/app11199276 article EN cc-by Applied Sciences 2021-10-06

Fingerprinting smartphones using their accelerometers has several applications, including activity recognition, driving style classification and device to authentication. In this work, we study accelerometer-based smartphone fingerprinting. We gather data from mobile devices placed together record identical vibrations. Then, extract time domain features, which use train multiple traditional machine learning algorithms based on statistical properties of the data. Finally, raw in a more...

10.1109/saci58269.2023.10158600 article EN 2023-05-23
Dana Petcu Nikola Kasabov Enikő Nagy Ildikó Holik Barbara Abonyi-Tóth and 95 more Ákos Nagy Dénes Tompos Balázs Németh Modafar Al-Shouha Gábor Szűcs Adriana Berdich Patricia Iosif Camelia Burlacu Alfred Anistoroaei Bogdan Groza Nader Karballaeezadeh Danial Mohammadzadeh S. Mohammed Mudabbiruddin Armin Hatami Balázs Solymos László Bacsárdi Tarek Setti Ádám Csapó Bence Richard Hach Daniela Stănescu Lucian Găină Bianca Guşiţă Kristián Fodor Zoltán Balogh György Molnár Ali Maaruof Sepehr Zamani Eszter Virágh András Dániel Bálint Drexler Martin Ferenc Dömény Melánia Puskás Levente Kovács T. Szücs Levente Drexler Lilla Kisbenedek Zoltán Biczó Sándor Szénási Imre Felde Ádám Pintér Ferenc Tolner Balázs Barta György Eigner András Kovács Róbert Lovas Ghazanfar Shahgholian Majid Moazzami Mohammadali Sayed Amir Zanjani Arman Mosavi Mohammad Merei József K. Tar Jelena Tašić Márta Takács Krisztián Bálint Esmeralda Kadëna Silvana Qose Zoltán Rajnai Zoltán Rajnai Beatrix Fregan Ashley Hurrelbrink Alexandru Topîrceanu Miklós Vincze Bence Biricz Miklós Kozlovszky Abdallah Benhamida Marianna Dimitrova Kucarov Annamária R. Várkonyi-Kóczy Béla Molnár Miklós Kozlovszky José Vicente Egas-López Gábor Gosztolya Zsolt Krutilla Attila Kővári Boróka Olteán-Péter Csaba Farkas М. О. Dmitriev György Morva P Kadar Lucian Popa Camil Jichici Tudor Andreica Pal-Stefan Murvay Nesas… Lourdes Ruiz Zoltán Rajnai Florinel Butaru Mihaela Codruta Ancuti Geza Mihai Erdodi Ciprian Șorândaru Sorin Muşuroi Razvan Ancuti Judith Pálfi Zsolt Čonka Róbert Štefko

10.1109/saci58269.2023.10158618 article EN 2023-05-23

As car sharing becomes an increasingly common task, mediating user access rights from external servers comes with threats regarding user's privacy. Clearly, users can be tracked by service mediators, e.g., cloud providers, that manage vehicle fleets, etc. In this work we design and test a simple solution based on oblivious transfer, well-known secure cryptographic block, allows to preserve privacy when gaining the vehicle. We feasibility of deploying such Android capable smartphones but also...

10.1109/vtc2020-spring48590.2020.9129134 article EN 2020-05-01

Abstract Considering an autonomous mobile robot that has to navigate indoor and outdoor from a certain point towards another in tree structure, the paper is giving solution for finding path navigation. The mathematical model proposed number n DP of departure/destination points (DP), IP intersection (IP) connections between them structure. Based on model, problems solved presented this are i) find any departure destination point, ii) generate algorithm guidance follow path. Both algorithms...

10.1088/1757-899x/1182/1/012053 article EN IOP Conference Series Materials Science and Engineering 2021-10-01
Coming Soon ...