- Vehicular Ad Hoc Networks (VANETs)
- Autonomous Vehicle Technology and Safety
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Transportation and Mobility Innovations
- Anomaly Detection Techniques and Applications
- Adversarial Robustness in Machine Learning
- Interconnection Networks and Systems
- Network Security and Intrusion Detection
- Traffic control and management
- Advanced Malware Detection Techniques
- Cloud Computing and Resource Management
- Advanced Optical Network Technologies
- Context-Aware Activity Recognition Systems
- Smart Grid Security and Resilience
- Reinforcement Learning in Robotics
- Wireless Body Area Networks
- Privacy-Preserving Technologies in Data
- Advanced Authentication Protocols Security
- IoT and GPS-based Vehicle Safety Systems
- Security in Wireless Sensor Networks
- Innovation in Digital Healthcare Systems
- Bluetooth and Wireless Communication Technologies
- Nuclear Physics and Applications
- Scientific Computing and Data Management
Centre Tecnologic de Telecomunicacions de Catalunya
2019-2024
Cancer Targeted Technology (United States)
2022
Universitat Politècnica de Catalunya
2015-2021
UCLouvain
2018
Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X come inadvertently with challenges which involve security vulnerabilities breaches. Addressing concerns is essential for seamless safe operation mission-critical use cases. This paper surveys current literature on provides a systematic comprehensive review the most relevant enhancements...
The vision of cooperative, connected and automated mobility (CCAM) across Europe can only be realized when harmonized solutions that support cross-border traffic exist. possibility providing CCAM services along different countries vehicles drive various national borders has a huge innovative business potential. However, the seamless provision connectivity uninterrupted delivery also poses interesting technical challenges. situation is particularly given multi-country, multi-operator,...
Highly dependable communication networks usually rely on some kind of Fast Re-Route (FRR) mechanism which allows to quickly re-route traffic upon failures, entirely in the data plane. This paper studies design FRR mechanisms for emerging reconfigurable switches.
Emerging applications expect fast turn-around from in-network failover mechanisms. This paper starts exploring the design space for supporting high availability and low latency using reroute in programmable data planes. In particular, we present a primitive well-known mechanisms that is both efficient terms of packet processing latency, memory requirements, switch throughput.
Research on vehicle-to-everything (V2X) is attracting significant attention nowadays, driven by the recent advances in beyond-5G (B5G) networks and multi-access edge computing (MEC) paradigm. However, inherent heterogeneity of B5G combined with security vulnerabilities MEC infrastructure dynamic V2X scenarios introduces unprecedented challenges. Efficient resource management multi-domain environments vital, especially growing threat distributed denial-of-service (DDoS) attacks against...
Vehicle-to-everything (V2X) communication is contributing towards the realization of futuristic vehicular networks such as Internet-of-Vehicles (IoV). The IoV expected to usher in a new direction intelligence and networking achieve goal intelligent transport systems, which rely on secure exchange messages between vehicles infrastructure. However, transmission false/incorrect data by malicious may cause serious damages road safety. Therefore, it crucial detect safety-threatening incorrect...
Highly dependable communication networks usually rely on some kind of Fast Re-Route (FRR) mechanism which allows to quickly re-route traffic upon failures, entirely in the data plane. This paper studies design FRR mechanisms for emerging reconfigurable switches. Our main contribution is an primitive programmable planes, PURR, provides low failover latency and high switch throughput, by avoiding packet recirculation. PURR tolerates multiple concurrent failures comes with minimal memory...
Community networks are IP constantly being improved that evolve into large-scale computing platforms. This has resulted from the effort to adapt cloud model towards services can operate and utilize resources inside community network. The network its infrastructure contributed by individuals, companies, organizations maintained itself. devices often low resource devices, such as home gateways, with limited capabilities. Currently, these configured run only. become a drawback for further...
Emerging vehicle-to-everything (V2X) services rely on the secure exchange of periodic messages between vehicles and infrastructure. However, transmission false/incorrect data by malicious may pose important security perils. Therefore, it is essential to detect safety-threatening erroneous information mitigate potentially detrimental effects road users. In this paper, we assess effectiveness a reinforcement learning (RL) approach for misbehaviour detection in V2X scenarios using an...
The transformative Internet-of-Vehicles (IoV) paradigm comes inadvertently with challenges which involve security vulnerabilities and privacy breaches. In this context, denial-of-service (DoS) attacks may perniciously affect the normal operation of IoV systems by causing extensive periods network unavailability where legitimate vehicles are prevented from accessing vehicular services. paper, we offer an in-depth vulnerability assessment 5G-enabled when DoS attack variants launched at...
Vehicle-to-everything (V2X) communications enable real-time information exchange between vehicles and infrastructure, which extends the perception range of beyond limits on-board sensors and, thus, facilitating realisation cooperative, connected, automated mobility (CCAM) services that will improve road safety traffic efficiency. In context CCAM, successful deployments cooperative intelligent transport system (C-ITS) use cases, with integration advanced wireless communication technologies,...
Cooperative, connected and automated mobility (CCAM) services along different countries require cross-border solutions to support seamless delivery of in a multioperator, multi-telco-vendor, multi-car-manufacturer scenario. The H2020 5GCroCo project will trial 5G technologies the European corridor France, Germany Luxembourg, as well five small-scale sites. analyses three use cases: tele-operated driving, high- definition map generation distribution for autonomous vehicles, anticipated...
Cross-border scenarios are of extreme importance in current research work on 5G networks for connected vehicles. Network services and applications vehicles, which specific cases expected to run Mobile Edge Computing (MEC) infrastructure, might experience problems through country borders due inter-domain. Given that cross-border typically imply a change network operator, deployed MEC need such environments and, where applicable, different entities synchronize their input/output vehicular...
This demo presents the instantiation of a high level architecture proposed by INSPIRE-5Gplus to manage secured End-to-End (E2E) Network Slices. Slices are associated with Security Service Level Agreement (SSLA) enhance security on virtual deployed resources, thus securing created E2E Secure The network slicing is validated against vehicular scenario, based Anticipated Cooperative Collision Avoidance use case. In this we propose detect false messages through novel SSLA an Intrusion Detection...
Emerging vehicle-to-everything (V2X) systems call for a diverse set of novel mechanisms to address vulnerabilities and security breaches. In this context, misbehavior detection approaches aim detect malicious behavior rogue V2X entities possible attacks that may originate from them. paper, we introduce data-driven ensemble framework which jointly leverages clustering reinforcement learning misbehaviors in unlabeled vehicular data. A rigorous assessment using an open-source dataset reveals...
Vehicular mobility underscores the need for collaborative misbehavior detection at vehicular edge. However, locally trained models are susceptible to adversarial attacks that aim deliberately influence learning outcomes. In this paper, we introduce a deep reinforcement learning-based approach employs transfer among roadside units (RSUs). presence of label-flipping and policy induction attacks, perform selective knowledge from trustworthy source RSUs foster relevant expertise in avoid...
In order to improve road safety, modern vehicles are equipped with smart sensors and Vehicle-to-Everything (V2X) communication technologies that facilitate the exchange of data (e.g., location, speed, hazards) other vehicles, infrastructure, pedestrians, thus extending range perception beyond capabilities on-board sensors. All these can be processed by a Collision Avoidance service deployed in mobile edge computing (MEC) platform guarantee low latency detection localization hazards. this...
The ubiquitous Vehicle-to-Everything (V2X) connectivity enables successful deployments of emerging vehicular services around the world. However, geographical cross-border scenarios are challenging for over heterogeneous infrastructure and at same time vehicles to maintain seamless service across borders. In this paper, we present development validation an experimental vehicle On-Board Unit (OBU) execution Anticipated Cooperative Collision Avoidance (ACCA) in scenarios. OBU flexibly supports...
The 5GCroCo project has been working on aspects around vehicular communications taking into consideration different perspectives such as i) infrastructures with multiple administrative domains where to achieve the most efficient service deployment, and ii) automotive services themselves for providing advanced functionalities users. This article aims present results collected top of Barcelona small-scale trial infrastructure during experimental phases. In particular, goal conducted...