- Vehicular Ad Hoc Networks (VANETs)
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Digital Media Forensic Detection
- Smart Grid Security and Resilience
- Advanced Malware Detection Techniques
- Advanced Steganography and Watermarking Techniques
- Music and Audio Processing
- Video Surveillance and Tracking Methods
- Chaos-based Image/Signal Encryption
- Robotics and Sensor-Based Localization
- Anomaly Detection Techniques and Applications
- Real-time simulation and control systems
- Bluetooth and Wireless Communication Technologies
- Image Processing Techniques and Applications
- Network Security and Intrusion Detection
- Speech and Audio Processing
- Digital Rights Management and Security
- Network Time Synchronization Technologies
- IoT-based Smart Home Systems
- Smart Parking Systems Research
- Digital Transformation in Industry
- Cryptography and Data Security
- Robotic Path Planning Algorithms
- Energy Efficient Wireless Sensor Networks
Polytechnic University of Timişoara
2018-2024
Camera sensor identification can have numerous forensics and authentication applications. In this work, we follow an methodology for smartphone camera sensors using properties of the Dark Signal Nonuniformity (DSNU) in collected images. This requires taking dark pictures, which users easily do by keeping phone against their palm, has already been proposed various works. From such extract low mid frequency AC coefficients from DCT (Discrete Cosine Transform) classify data with help machine...
We address the secure pairing of mobile devices based on accelerometer data under various transportation environments, e.g., train, tram, car, bike, walking, etc. As users commonly commute by several modes, extracting session keys from scenarios to private network user's or even public formed belonging distinct that share same location is crucial. The main goal our work establish amount entropy can be collected these environments in order determine concrete security bounds for each...
Digital twins are used to replicate the behavior of physical systems, and in-vehicle networks can greatly benefit from this technology. This is mainly because circulate large amounts data coming various sources such as wired, or in some cases even wireless, sensors that fused by actuators responsible for safety-critical tasks require careful testing. In work, we build a laboratory network mimics real vehicle regards wire length, number stubs devices connected it. The Controller Area Network...
In the recent years, there has been a lot of focus on designing security for in-vehicle networks and detecting intrusions. Still, no countermeasure is perfect most existing intrusion detection systems have nonzero false negative rate, which implies that adversarial frames may still go undetected bus. Unfortunately, answers are largely missing what will happen with vehicle in such circumstances, i.e., how safety bystanders affected by actions undetected, while little or acceptable...
Smartphones are quickly moving toward complementing or even replacing traditional car keys. We advocate a role-based access control policy mixed with attributes that facilitates to various functionalities of vehicular on-board units from smartphones. use rights-based for in-vehicle similar the case file allocation table contemporary OS, in which read, write execute operations can be performed over vehicle functions. Further, assure appropriate security, we develop protocol suite using...
Fingerprinting smartphones based on acoustic characteristics of their loudspeaker may have a number applications in device-to-device authentication as well forensic investigations. In this work we propose an efficient fingerprinting methodology by using the roll-off device speaker, i.e., transition between low and high stopbands to passband segment speaker. We extract from sweep signals, also know chirps, that are commonly used practice test speaker response. This procedure appears be more...
Smartphones are a vital technology, they improve our social interactions, provide us great deal of information and bring forth the means to control various emerging technologies, like numerous IoT devices that controlled via smartphone apps. In this context, fingerprinting from sensor characteristics is topic high interest not only due privacy implications or potential use in forensics investigations, but also because applications device authentication. work we review existing approaches for...
As the security vulnerabilities of controller area networks (CAN) become well known, heavy-duty vehicles implementing SAE J1939 specification layer on this bus are immediate targets. Recently released standards provide clear cybersecurity requirements, but exact methods to be implemented not specified and remain up manufacturers. In work, we address adversary actions countermeasures at control system level for a vehicle CAN bus. This low approach allows us complement regular attacks with...
Fingerprinting devices based on unique characteristics of their sensors is an important research direction nowadays due to its immediate impact non-interactive authentications and no less privacy implications. In this work, we investigate smartphone fingerprints obtained from microphone data recordings containing human speech, environmental sounds several live performed outdoors. To comply with real-world circumstances, also consider the presence types noise that specific scenarios which...
In mobile robot applications, to track and follow moving targets is a challenging task. this paper there developed tracking system with two robots: the master tele-operated from an Android application via Bluetooth, autonomous slave three ultrasonic sensors which will master. The algorithm of employs: i) position control maintain constant distance between master, ii) direction in one six states detected by finite-state machine based on fuzzy logic, smooth transitions states. master-slave are...
Mobile device pairing inside vehicles is a ubiquitous task which requires easy to use and secure solutions. In this work we exploit the audio-video domain for devices vehicles. principle, rely on widely used elliptical curve version of Diffie-Hellman key-exchange protocol extract session keys from acoustic as well visual by using head unit display. The need merging audio-visual domains first stems fact that in-vehicle units generally do not have camera so they cannot data smartphones,...
Fingerprinting smartphones using their accelerometers has several applications, including activity recognition, driving style classification and device to authentication. In this work, we study accelerometer-based smartphone fingerprinting. We gather data from mobile devices placed together record identical vibrations. Then, extract time domain features, which use train multiple traditional machine learning algorithms based on statistical properties of the data. Finally, raw in a more...
As car sharing becomes an increasingly common task, mediating user access rights from external servers comes with threats regarding user's privacy. Clearly, users can be tracked by service mediators, e.g., cloud providers, that manage vehicle fleets, etc. In this work we design and test a simple solution based on oblivious transfer, well-known secure cryptographic block, allows to preserve privacy when gaining the vehicle. We feasibility of deploying such Android capable smartphones but also...
Abstract Considering an autonomous mobile robot that has to navigate indoor and outdoor from a certain point towards another in tree structure, the paper is giving solution for finding path navigation. The mathematical model proposed number n DP of departure/destination points (DP), IP intersection (IP) connections between them structure. Based on model, problems solved presented this are i) find any departure destination point, ii) generate algorithm guidance follow path. Both algorithms...