Roshan Sedar

ORCID: 0000-0003-3170-5575
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Vehicular Ad Hoc Networks (VANETs)
  • Autonomous Vehicle Technology and Safety
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Transportation and Mobility Innovations
  • Anomaly Detection Techniques and Applications
  • Adversarial Robustness in Machine Learning
  • Interconnection Networks and Systems
  • Network Security and Intrusion Detection
  • Traffic control and management
  • Advanced Malware Detection Techniques
  • Cloud Computing and Resource Management
  • Advanced Optical Network Technologies
  • Context-Aware Activity Recognition Systems
  • Smart Grid Security and Resilience
  • Reinforcement Learning in Robotics
  • Wireless Body Area Networks
  • Privacy-Preserving Technologies in Data
  • Advanced Authentication Protocols Security
  • IoT and GPS-based Vehicle Safety Systems
  • Security in Wireless Sensor Networks
  • Innovation in Digital Healthcare Systems
  • Bluetooth and Wireless Communication Technologies
  • Nuclear Physics and Applications
  • Scientific Computing and Data Management

Centre Tecnologic de Telecomunicacions de Catalunya
2019-2024

Cancer Targeted Technology (United States)
2022

Universitat Politècnica de Catalunya
2015-2021

UCLouvain
2018

Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X come inadvertently with challenges which involve security vulnerabilities breaches. Addressing concerns is essential for seamless safe operation mission-critical use cases. This paper surveys current literature on provides a systematic comprehensive review the most relevant enhancements...

10.1109/ojcoms.2023.3239115 article EN cc-by IEEE Open Journal of the Communications Society 2023-01-01

The vision of cooperative, connected and automated mobility (CCAM) across Europe can only be realized when harmonized solutions that support cross-border traffic exist. possibility providing CCAM services along different countries vehicles drive various national borders has a huge innovative business potential. However, the seamless provision connectivity uninterrupted delivery also poses interesting technical challenges. situation is particularly given multi-country, multi-operator,...

10.3390/fi12010005 article EN cc-by Future Internet 2019-12-24

Highly dependable communication networks usually rely on some kind of Fast Re-Route (FRR) mechanism which allows to quickly re-route traffic upon failures, entirely in the data plane. This paper studies design FRR mechanisms for emerging reconfigurable switches.

10.1145/3359989.3365410 article EN 2019-12-03

Emerging applications expect fast turn-around from in-network failover mechanisms. This paper starts exploring the design space for supporting high availability and low latency using reroute in programmable data planes. In particular, we present a primitive well-known mechanisms that is both efficient terms of packet processing latency, memory requirements, switch throughput.

10.1145/3229574.3229580 article EN 2018-08-01

Research on vehicle-to-everything (V2X) is attracting significant attention nowadays, driven by the recent advances in beyond-5G (B5G) networks and multi-access edge computing (MEC) paradigm. However, inherent heterogeneity of B5G combined with security vulnerabilities MEC infrastructure dynamic V2X scenarios introduces unprecedented challenges. Efficient resource management multi-domain environments vital, especially growing threat distributed denial-of-service (DDoS) attacks against...

10.1109/ojvt.2024.3375448 article EN cc-by IEEE Open Journal of Vehicular Technology 2024-01-01

Vehicle-to-everything (V2X) communication is contributing towards the realization of futuristic vehicular networks such as Internet-of-Vehicles (IoV). The IoV expected to usher in a new direction intelligence and networking achieve goal intelligent transport systems, which rely on secure exchange messages between vehicles infrastructure. However, transmission false/incorrect data by malicious may cause serious damages road safety. Therefore, it crucial detect safety-threatening incorrect...

10.1109/icc45855.2022.9838796 article EN ICC 2022 - IEEE International Conference on Communications 2022-05-16

Highly dependable communication networks usually rely on some kind of Fast Re-Route (FRR) mechanism which allows to quickly re-route traffic upon failures, entirely in the data plane. This paper studies design FRR mechanisms for emerging reconfigurable switches. Our main contribution is an primitive programmable planes, PURR, provides low failover latency and high switch throughput, by avoiding packet recirculation. PURR tolerates multiple concurrent failures comes with minimal memory...

10.1109/tnet.2020.3045293 article EN IEEE/ACM Transactions on Networking 2021-01-07

Community networks are IP constantly being improved that evolve into large-scale computing platforms. This has resulted from the effort to adapt cloud model towards services can operate and utilize resources inside community network. The network its infrastructure contributed by individuals, companies, organizations maintained itself. devices often low resource devices, such as home gateways, with limited capabilities. Currently, these configured run only. become a drawback for further...

10.1109/ficloud.2015.49 article EN 2015-08-01

Emerging vehicle-to-everything (V2X) services rely on the secure exchange of periodic messages between vehicles and infrastructure. However, transmission false/incorrect data by malicious may pose important security perils. Therefore, it is essential to detect safety-threatening erroneous information mitigate potentially detrimental effects road users. In this paper, we assess effectiveness a reinforcement learning (RL) approach for misbehaviour detection in V2X scenarios using an...

10.1109/meditcom49071.2021.9647514 article EN 2021-09-07

The transformative Internet-of-Vehicles (IoV) paradigm comes inadvertently with challenges which involve security vulnerabilities and privacy breaches. In this context, denial-of-service (DoS) attacks may perniciously affect the normal operation of IoV systems by causing extensive periods network unavailability where legitimate vehicles are prevented from accessing vehicular services. paper, we offer an in-depth vulnerability assessment 5G-enabled when DoS attack variants launched at...

10.1109/netsoft54395.2022.9844055 article EN 2022-06-27

Vehicle-to-everything (V2X) communications enable real-time information exchange between vehicles and infrastructure, which extends the perception range of beyond limits on-board sensors and, thus, facilitating realisation cooperative, connected, automated mobility (CCAM) services that will improve road safety traffic efficiency. In context CCAM, successful deployments cooperative intelligent transport system (C-ITS) use cases, with integration advanced wireless communication technologies,...

10.3390/s21062090 article EN cc-by Sensors 2021-03-17

Cooperative, connected and automated mobility (CCAM) services along different countries require cross-border solutions to support seamless delivery of in a multioperator, multi-telco-vendor, multi-car-manufacturer scenario. The H2020 5GCroCo project will trial 5G technologies the European corridor France, Germany Luxembourg, as well five small-scale sites. analyses three use cases: tele-operated driving, high- definition map generation distribution for autonomous vehicles, anticipated...

10.1109/eucnc48522.2020.9200952 article EN 2020-06-01

Cross-border scenarios are of extreme importance in current research work on 5G networks for connected vehicles. Network services and applications vehicles, which specific cases expected to run Mobile Edge Computing (MEC) infrastructure, might experience problems through country borders due inter-domain. Given that cross-border typically imply a change network operator, deployed MEC need such environments and, where applicable, different entities synchronize their input/output vehicular...

10.1109/5gwf49715.2020.9221221 article EN 2020 IEEE 3rd 5G World Forum (5GWF) 2020-09-01

This demo presents the instantiation of a high level architecture proposed by INSPIRE-5Gplus to manage secured End-to-End (E2E) Network Slices. Slices are associated with Security Service Level Agreement (SSLA) enhance security on virtual deployed resources, thus securing created E2E Secure The network slicing is validated against vehicular scenario, based Anticipated Cooperative Collision Avoidance use case. In this we propose detect false messages through novel SSLA an Intrusion Detection...

10.1109/nfv-sdn50289.2020.9289861 article EN 2020-11-10

Emerging vehicle-to-everything (V2X) systems call for a diverse set of novel mechanisms to address vulnerabilities and security breaches. In this context, misbehavior detection approaches aim detect malicious behavior rogue V2X entities possible attacks that may originate from them. paper, we introduce data-driven ensemble framework which jointly leverages clustering reinforcement learning misbehaviors in unlabeled vehicular data. A rigorous assessment using an open-source dataset reveals...

10.1109/globecom48099.2022.10001264 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2022-12-04

Vehicular mobility underscores the need for collaborative misbehavior detection at vehicular edge. However, locally trained models are susceptible to adversarial attacks that aim deliberately influence learning outcomes. In this paper, we introduce a deep reinforcement learning-based approach employs transfer among roadside units (RSUs). presence of label-flipping and policy induction attacks, perform selective knowledge from trustworthy source RSUs foster relevant expertise in avoid...

10.48550/arxiv.2409.02844 preprint EN arXiv (Cornell University) 2024-09-04

In order to improve road safety, modern vehicles are equipped with smart sensors and Vehicle-to-Everything (V2X) communication technologies that facilitate the exchange of data (e.g., location, speed, hazards) other vehicles, infrastructure, pedestrians, thus extending range perception beyond capabilities on-board sensors. All these can be processed by a Collision Avoidance service deployed in mobile edge computing (MEC) platform guarantee low latency detection localization hazards. this...

10.1109/vtc2022-spring54318.2022.9860970 article EN 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2022-06-01

The ubiquitous Vehicle-to-Everything (V2X) connectivity enables successful deployments of emerging vehicular services around the world. However, geographical cross-border scenarios are challenging for over heterogeneous infrastructure and at same time vehicles to maintain seamless service across borders. In this paper, we present development validation an experimental vehicle On-Board Unit (OBU) execution Anticipated Cooperative Collision Avoidance (ACCA) in scenarios. OBU flexibly supports...

10.1145/3411276.3414693 article EN 2020-09-07

The 5GCroCo project has been working on aspects around vehicular communications taking into consideration different perspectives such as i) infrastructures with multiple administrative domains where to achieve the most efficient service deployment, and ii) automotive services themselves for providing advanced functionalities users. This article aims present results collected top of Barcelona small-scale trial infrastructure during experimental phases. In particular, goal conducted...

10.1109/eucnc/6gsummit54941.2022.9815648 article EN 2022-06-07
Coming Soon ...