SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Asplund Mikael) "

Sökning: WFRF:(Asplund Mikael)

  • Resultat 1-50 av 88
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Ahlberg, Carl, et al. (författare)
  • GIMME - A General Image Multiview Manipulation Engine
  • 2011
  • Ingår i: Proceedings of the International Conference on ReConFigurable Computing and FPGAs (ReConFig 2011). - Los Alamitos, Calif : IEEE Computer Society. - 9780769545516
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents GIMME (General Image Multiview Manipulation Engine), a highly flexible reconfigurable stand-alone mobile two-camera vision platform with stereo-vision capability. GIMME relies on reconfigurable hardware (FPGA) to perform application-specific low to medium-level image-processing at video rate. The Qseven-extension enables additional processing power. Thanks to its compact design, low power consumption and standardized interfaces (power and communication), GIMME is an ideal vision platform for autonomous and mobile robot applications.
  •  
2.
  • Ahlberg, Carl, et al. (författare)
  • GIMME2 - An embedded system for stereo vision and processing of megapixel images with FPGA-acceleration
  • 2015
  • Ingår i: 2015 International Conference on ReConFigurable Computing and FPGAs, ReConFig 2015. - 9781467394062
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents GIMME2, an embedded stereovision system, designed to be compact, power efficient, cost effective, and high performing in the area of image processing. GIMME2 features two 10 megapixel image sensors and a Xilinx Zynq, which combines FPGA-fabric with a dual-core ARM CPU on a single chip. This enables GIMME2 to process video-rate megapixel image streams at real-time, exploiting the benefits of heterogeneous processing.
  •  
3.
  • Ahlberg, Carl, et al. (författare)
  • The Black Pearl: An Autonomous Underwater Vehicle
  • 2013
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • The Black Pearl is a custom made autonomous underwater vehicle developed at Mälardalen University, Sweden. It is built in a modular fashion, including its mechanics, electronics and software. After a successful participation at the RoboSub competition in 2012 and winning the prize for best craftsmanship, this year we made minor improvements to the hardware, while the focus of the robot's evolution shifted to the software part. In this paper we give an overview of how the Black Pearl is built, both from the hardware and software point of view.
  •  
4.
  • Asplund, Mikael, 1981-, et al. (författare)
  • A Formal Approach to Autonomous Vehicle Coordination
  • 2012
  • Ingår i: FM 2012: Formal Methods. - Berlin, Heidelberg : Springer Berlin/Heidelberg. - 9783642327582 - 9783642327599 ; , s. 52-67
  • Bokkapitel (refereegranskat)abstract
    • Increasing demands on safety and energy efficiency will require higher levels of automation in transportation systems. This involves dealing with safety-critical distributed coordination. In this paper we demonstrate how a Satisfiability Modulo Theories (SMT) solver can be used to prove correctness of a vehicular coordination problem. We formalise a recent distributed coordination protocol and validate our approach using an intersection collision avoidance (ICA) case study. The system model captures continuous time and space, and an unbounded number of vehicles and messages. The safety of the case study is automatically verified using the Z3 theorem prover.
  •  
5.
  • Asplund, Mikael, et al. (författare)
  • A Partition-tolerant Manycast Algorithm for Disaster Area Networks
  • 2009
  • Ingår i: 28TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS. - : IEEE Computer Society. - 9780769538266 ; , s. 156-165
  • Konferensbidrag (refereegranskat)abstract
    • Information dissemination in disaster scenarios requires timely and energy-efficient communication in intermittently connected networks. When the existing infrastructure is damaged or overloaded, we suggest the use of a manycast algorithm that runs over a wireless mobile ad hoc network, and overcomes partitions using a store-and-forward mechanism. This paper presents a random walk gossip protocol that uses an efficient data structure to keep track of already informed nodes with minimal signalling. Avoiding unnecessary transmissions also makes it less prone to overloads. Experimental evaluation shows higher delivery ratio, lower latency, and lower overhead compared to a recently published algorithm.
  •  
6.
  • Asplund, Matthias, et al. (författare)
  • A study of railway wheel profile parameters used as indicators of an increased risk of wheel defects
  • 2016
  • Ingår i: Proceedings of the Institution of mechanical engineers. Part F, journal of rail and rapid transit. - : SAGE Publications. - 0954-4097 .- 2041-3017. ; 230:2, s. 323-334
  • Tidskriftsartikel (refereegranskat)abstract
    • The capacity demands on the railways will increase in the future, as well as the demands for a robust and available system. The availability of the railway system is dependent on the condition of the infrastructure and the rolling stock. To inspect the rolling stock and to prevent damage to the track due to faulty wheels, infrastructure managers normally install wayside monitoring systems along the track. Such systems indicate, for example, wheels that fall outside the defined safety limits and have to be removed from service to prevent further damage to the track. Due to the nature of many wayside monitoring systems, which only monitor vehicles at definite points along the track, damage may be induced on the track prior to fault detection at the location of the system. Such damage can entail capacity-consuming speed reductions and manual track inspections before the track can be opened for traffic again. The number of wheel defects must therefore be kept to a minimum. In this paper wheel profile parameters measured by a wayside wheel profile measurement system, installed along the Swedish Iron Ore Line, are examined and related to warning and alarm indications from a wheel defect detector installed on the same line. The study shows that an increased wheel wear, detectable by changes in the wheel profile parameters could be used to reduce the risk of capacity-consuming wheel defect failure events and its reactive measures.
  •  
7.
  • Asplund, Mikael, et al. (författare)
  • Analysing Delay-tolerant Networks with Correlated Mobility
  • 2012
  • Ingår i: Ad-hoc, Mobile, and Wireless Networks. - Berlin, Heidelberg : Springer. - 9783642316371 - 9783642316388 ; , s. 83-97
  • Konferensbidrag (refereegranskat)abstract
    • This book constitutes the refereed proceedings of the 11th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2012 held in Belgrade, Serbia, July 9-11, 2012. The 36 revised full papers presented were carefully reviewed and selected from 76 submissions. The accepted papers cover a wide spectrum of traditional networking topics ranging from routing to the application layer, to localization in various networking environments such as wireless sensor and ad-hoc networks, and give insights in a variety of application areas.
  •  
8.
  • Asplund, Mikael, et al. (författare)
  • Attitudes and Perceptions of IoT Security in Critical Societal Services
  • 2016
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 4, s. 2130-2138
  • Tidskriftsartikel (refereegranskat)abstract
    • A quiet revolution that impacts several sectors, ranging over transport, home automation, energy, industrial control, and health services is undergoing with addition of new networked devices leading to enhanced services. In this paper, we aim to identify information security requirements that are common over several (vertical) sectors, and in particular, ones that impact critical societal services, namely, the energy, water, and health management systems. We present the results of an interview-based study where actors in these sectors were asked about their perceptions and attitudes on the security of Internet of Things (IoT). We set these perceptions and attitudes in context through a literature review of IoT security, and relate to current challenges in this area. This paper demonstrates that despite an overall optimistic view on IoT in critical societal services, there is a lack of consensus on risks related to IoT security.
  •  
9.
  • Asplund, Matthias, et al. (författare)
  • Automatic laser scanning of wheel profiles: condition monitoring to achieve greater capacity for existing infrastructure in an extreme climate
  • 2013
  • Ingår i: Automatic laser scanning of wheel profiles. - India : Indian Railways, the host of 10th IHHA Conferance. - 9788192651910 ; , s. 445-451
  • Konferensbidrag (refereegranskat)abstract
    • The Iron Ore Line (Malmbanan) is a 473 km long track section located in northern Sweden and has been in operation since 1903. It is mainly used to transport iron ore and pellets from the mines in Kiruna and Malmberget to Narvik Harbour (Norway) in the northwest and Luleå Harbour (Sweden) in the southeast. The track section on the Swedish side is owned by the Swedish Government and managed by Trafikverket (the Swedish Transport Administration), while the ore wagons are owned and managed by the freight operator (LKAB). Due to the high axle load exerted by the iron ore transports, 30 tonnes, and the high demand for a constant ore/pellets flow, the track and wagons must be monitored and maintained on a regular basis. The condition of the wagon wheel profile is one of the most important aspects in this procedure. For this reason an automatic laser-based wheel profile monitoring system has been installed on this line. This system can automatically measure and monitor the wagon wheel profiles at speeds up to 130 km/h. The system was installed and is being operated in a collaboration project between the freight operator and infrastructure manager. The information generated is collected by the e-maintenance personnel at Luleå Railway Research Center (JVTC). The measurements will be used to diagnose the condition of the wheel and rail, and to optimize their maintenance further. This paper presents a study of the selection and the installation of the equipment. Some results from the measurements are shown. The system’s availability during performance in extreme climate conditions, with severe cold and large quantities of snow, is presented. Then the benefits and perceived challenges of the system are discussed. Some potential improvements in rail and wheel maintenance, to achieve more capacity, are analysed.
  •  
10.
  • Asplund, Mikael, 1981- (författare)
  • Automatically proving the correctness of vehicle coordination
  • 2018
  • Ingår i: ICT Express. - : Elsevier. - 2405-9595. ; 4:1, s. 51-54
  • Tidskriftsartikel (refereegranskat)abstract
    • In the next generation of road-based transportation systems, where vehicles exchange information and coordinate their actions, a major challenge will be to ensure that the interaction rules are safe and lead to progress. In this paper we address the problem of automatically verifying the correctness of such distributed vehicular coordination protocols. We propose a novel modeling approach for communicating mobile entities based on the concept of satisfiability modulo theories (SMT). We apply this method to an intersection collision avoidance protocol and show how the method can be used to investigate the settings under which such a protocol achieves safety and progress.
  •  
11.
  • Asplund, Mikael, 1981- (författare)
  • Combining Detection and Verification for Secure Vehicular Cooperation Groups
  • 2020
  • Ingår i: ACM Transactions on Cyber-Physical Systems. - : ACM Press. - 2378-962X .- 2378-9638. ; 4:1, s. 1-31
  • Tidskriftsartikel (refereegranskat)abstract
    • Coordinated vehicles for intelligent traffic management are instances of cyber-physical systems with strict correctness requirements. A key building block for these systems is the ability to establish a group membership view that accurately captures the locations of all vehicles in a particular area of interest. In this article, we formally define view correctness in terms of soundness and completeness and establish theoretical bounds for the ability to verify view correctness. Moreover, we present an architecture for an online view detection and verification process that uses the information available locally to a vehicle. This architecture uses an SMT solver to automatically prove view correctness (if possible). We evaluate this architecture using both synthetic and trace-based scenarios and demonstrate that the ability to verify view correctness is on par with the ability to detect view violations.
  •  
12.
  • Asplund, Matthias, et al. (författare)
  • Condition monitoring of rolling stock wheels : approach towards maintenance decision making
  • 2014
  • Ingår i: 27th International Congress on Condition Monitoring and Diagnostic Engineering (COMADEM 2014). - : COMADEM International.
  • Konferensbidrag (refereegranskat)abstract
    • Due to the more or less fixed inherent capacity of a railway system, capacity consuming events like failures within a railway network should be kept to a minimum. This could be achieved by the use of existing and new condition monitoring systems which can detect, report and predict failure events in an early stage. Demands for higher service quality, higher capacity, network availability and track quality together with less human intervention on tracks, drive the development of railway condition monitoring systems.Failure driven capacity consumption due to worn or defected rolling stock wheels have a big impact on the capacity and the infrastructure condition. Wheel defects such as out-of-round wheels, generates high forces, and could result in large capacity consumption especially for areas with cold climate conditions. Bad wheels cause even higher track wear that reduce the life length of the track. Wheels with fatigue defects could also influence the track safety issues. This paper presents how different wheel defects can be monitored; together with a review of the most common wayside condition monitoring systems on the Swedish railway network. The study also describes how the decision making process could take advantage of the condition monitoring data in order to increase the achieved network capacity.
  •  
13.
  • Asplund, Mikael, 1981- (författare)
  • Disconnected Discoveries: Availability Studies in Partitioned Networks
  • 2011
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • This thesis is concerned with exploring methods for making computing systems more resilient to problems in the network communication, both in the setting of existing infrastructure but also in the case where no infrastructure is available. Specifically, we target a situation called network partitions which means that a computer or device network is split in two or more parts that cannot communicate with each other.The first of the two tracks in the thesis is concerned with upholding system availability during a network partition even when there are integrity constraints on data. This means that the system will optimistically accept requests since it is impossible to coordinate nodes that have no means of communicating during finite intervals; thus requiring a reconciliation process to take place once the network is healed.We provide several different algorithms for reconciling divergent states of the nodes, one of which is able to allow the system to continue accepting operations during the reconciliation phase as opposed to having to stop all invocations.  The algorithms are evaluated analytically, proving correctness and the conditions for termination.  The performance of the algorithms has been analysed using simulations and as a middleware plugin in an emulated setting.The second track considers more extreme conditions where the network is partitioned by its nature. The nodes move around in an area and opportunistically exchange messages with nodes that they meet. This as a model of the situation in a disaster area where the telecommunication networks are disabled. This scenario poses a number of challenges where protocols need to be both partition-tolerant and energy-efficient to handle node mobility, while still providing good delivery and latency properties.We analyse worst-case latency for message dissemination in such intermittently connected networks. Since the analysis is highly dependent on the mobility of the nodes, we provide a model for characterising connectivity of dynamic networks. This model captures in an abstract way how fast a protocol can spread a message in such a setting. We show how this model can be derived analytically as well as from actual trace files.Finally, we introduce a manycast protocol suited for disaster area networks. This protocol has been evaluated using simulations which shows that it provides very good performance under the circumstances, and it has been implemented as a proof-of-concept on real hardware.
  •  
14.
  • Asplund, Mikael, et al. (författare)
  • Emerging Information Infrastructures : Cooperation in Disasters
  • 2009
  • Ingår i: Critical Information Infrastructure Security. - Berlin : Springer. - 9783642035517 ; , s. 258-270
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Disasters are characterised by their devastating effect on human lives and the society’s ability to function. Unfortunately, rescue operations and the possibility to re-establish a working society after such events is often hampered by the lack of functioning communication infrastructures. This paper describes the challenges ahead in creating new communication networks to support post-disaster operations, and sets them in the context of the current issues in protection of critical infrastructures. The analysis reveals that while there are some common concerns there are also fundamental differences. The paper serves as an overview of some promising research directions and pointers to existing works in these areas.
  •  
15.
  • Asplund, Mikael, 1981-, et al. (författare)
  • Emerging Information Infrastructures : Cooperation in Disasters
  • 2009
  • Ingår i: Critical Information Infrastructure Security. - Berlin, Heidelberg : Springer Berlin/Heidelberg. - 9783642035517 - 9783642035524 ; , s. 258-270
  • Konferensbidrag (refereegranskat)abstract
    •   In this paper we describe how to include high level semantic information, such as aesthetics and emotions; into Content Based Image Retrieval. We present a, color-based emotion-related image descriptor that can be used for describing the emotional content of images. The color emotion metric used is derived from psychophysical experiments rind based oil three variables: activity, weight and teat. It was originally designed for single-colors, bill, recent research has shown that the salve emotion estimates call be applied in the retrieval of multi-colored images. Here we describe a new approach, based oil the assumption that perceived color emotions in images are mainly affected by homogenous regions, defined by the emotion metric; and transitions between regions. RGB coordinates are converted to emotion coordinates, mid for each emotion channel, statistical measurements of gradient magnitudes within a. stack of low-pass filtered images are used for finding interest; points corresponding to homogeneous regions and transitions between regions. Emotion characteristics are derived for patches surrounding cacti interest, point, and saved in a, bag-of-emotions; that for instance, can be used for retrieving images based oil emotional content.
  •  
16.
  • Asplund, Mikael, 1981-, et al. (författare)
  • Formalising Reconciliation in Partitionable Networks with Distributed Services
  • 2006
  • Ingår i: Rigorous Development of Complex Fault-Tolerant Systems. - Heidelberg : Springer Verlag. - 3540482652 ; , s. 37-58
  • Bokkapitel (refereegranskat)abstract
    • This book brings together 19 papers focusing on the application of rigorous design techniques to the development of fault-tolerant, software-based systems. It is an outcome of the REFT 2005 Workshop on Rigorous Engineering of Fault-Tolerant Systems held in conjunction with the Formal Methods 2005 conference at Newcastle upon Tyne, UK, in July 2005.
  •  
17.
  • Asplund, Mikael, 1981-, et al. (författare)
  • In-store payments using Bitcoin
  • 2018
  • Ingår i: 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). - : IEEE. - 9781538636626 - 9781538636633
  • Konferensbidrag (refereegranskat)abstract
    • The possibility of in-store payments would further increase the potential usefulness of cryptocurrencies. However, this would require much faster transaction verification than current solutions provide (one hour for Bitcoin) since customers are likely not prepared to wait a very long time for their purchase to be accepted by a store. We propose a solution for enabling in-store payments with waiting times in the order of a few seconds, which is still compatible with the current Bitcoin protocol. The idea is based on a payment card in combination with a protocol for ensuring that losing a card does not mean losing the money on it. We analyse the required transaction verification delay and also the potentially added risks that the solution brings compared to current systems.
  •  
18.
  • Asplund, Mikael, 1981-, et al. (författare)
  • Integrering av den sociala dimensionen i datautbildningar
  • 2019
  • Ingår i: Bidrag från 7:e Utvecklingskonferensen för Sveriges ingenjörsutbildningar. - : Luleå: Luleå tekniska universitet. - 9789177906056 ; , s. 189-190
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)
  •  
19.
  • Asplund, Mikael, 1981-, et al. (författare)
  • Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints
  • 2007
  • Ingår i: Dependable Systems and Networks, DSN 2007. - : IEEE Computer Society. - 0769528554 ; , s. 656-665
  • Konferensbidrag (refereegranskat)abstract
    • Replicated systems that run over partitionable environments, can exhibit increased availability if isolated partitions are allowed to optimistically continue their execution independently. This availability gain is traded against consistency, since several replicas of the same objects could be updated separately. Once partitioning terminates, divergences in the replicated state needs to be reconciled. One way to reconcile the state consists of letting the application manually solve inconsistencies. However, there are several situations where automatic reconciliation of the replicated state is meaningful. We have implemented replication and automatic reconciliation protocols that can be used as building blocks in a partition-tolerant middleware. The novelty of the protocols is the continuous service of the application even during the reconciliation process. A prototype system is experimentally evaluated to illustrate the increased availability despite network partitions.
  •  
20.
  • Asplund, Mikael, et al. (författare)
  • Middleware extensions that trade consistency for availability
  • 2009
  • Ingår i: CONCURRENCY AND COMPUTATION-PRACTICE and EXPERIENCE. - : John Wiley & Sons. - 1532-0626 .- 1532-0634. ; 21:9, s. 1181-1203
  • Tidskriftsartikel (refereegranskat)abstract
    • Replicated distributed object systems are deployed to provide timely and reliable services to actors at distributed locations. This paper treats applications in which data updates are dependent on satisfaction of integrity constraints over multiple objects. Network partitions, caused by occasional link failures, overload or attacks create problems in keeping both consistency and availability in such networks. We propose a means of achieving higher availability by providing partition-awareness in middleware. The general approach has been illustrated by implementing a number of CORBA extensions that trade consistency for availability during network partitions. This paper contains a thorough experimental evaluation that presents the gains and costs of our approach. The experiments clearly illustrate the benefit of our protocols in terms of significantly higher availability and the number of performed operations.
  •  
21.
  • Asplund, Mikael, 1981- (författare)
  • Model-based Membership Verification in Vehicular Platoons
  • 2015
  • Ingår i: Proceedings. - : IEEE Computer Society. - 9781467380447 ; , s. 125-132
  • Konferensbidrag (refereegranskat)abstract
    • Cooperative vehicular systems have the potentialto significantly increase traffic efficiency and safety. However,they also raise the question of to what extent information thatis received from other vehicles can be trusted. In this paperwe present a novel approach for increasing the trustworthinessof cooperative driving through a model-based approach forverifying membership views in vehicular platoons. We define aformal model for platoon membership, cooperative awarenessclaims, and membership verification mechanisms. With the helpof a satisfiability solver, we are able to quantitatively analysethe impact of different system parameters on the verifiability ofreceived information. Our results demonstrate the importance ofcross validating received messages, as well as the surprising diffi-culty in establishing correct membership views despite powerfulverification mechanisms.
  •  
22.
  • Asplund, Mikael, 1981-, et al. (författare)
  • Post-Partition Reconciliation Protocols for Maintaning Consistency
  • 2006
  • Ingår i: SAC '06 Proceedings of the 2006 ACM symposium on Applied computing. - New York, NY, USA : ACM Press. - 1595931082 ; , s. 710-717
  • Konferensbidrag (refereegranskat)abstract
    • This paper addresses design exploration for protocols that are employed in systems with availability-consistency trade-offs. Distributed data is modelled as states of objects replicated across a network, and whose updates require satisfaction of integrity constraints over multiple objects. Upon detection of a partition, such a network will continue to provide delivery of services in parallel partitions; but only for updates with non-critical integrity constraints. Once the degraded mode ends, the parallel network partitions are reconciled to arrive at one partition. Using a formal treatment of the reconciliation process, three algorithms are proposed and studied in terms of their influence on service outage duration. The longer the reconciliation time, the lower is system availability; since the interval in which no services are provided is longer. However, the reconciliation time in turn is affected by the time to construct the post-partition system state. The shorter the construction time the higher is the number of updates that took place in the degraded mode but that will not be taken up in the reconciled partition. This will lead to a longer interval for rejecting/redoing these operations and thereby increase reconciliation time.
  •  
23.
  • Asplund, Mikael, 1981- (författare)
  • Poster: Securing Vehicular Platoon Membership
  • 2014
  • Ingår i: <em>Proceedings of IEEE Vehicular Networking Conference (VNC)</em>. - : IEEE Computer Society. - 9781479976607 ; , s. 119-120
  • Konferensbidrag (refereegranskat)abstract
    • Vehicular platoons have the potential to bring considerable fuel-savings and increase traffic efficiency. A key component for the next generation platoon systems is a secure membership component which can accommodate membership changes in a dynamic and potentially hostile environment. In this poster paper we analyse the conditions for creating a secure membership protocol which is resilient to attacks and faults in the communication protocols.
  •  
24.
  • Asplund, Mikael, 1981-, et al. (författare)
  • Random walk gossip-based manycast with partition detection
  • 2008
  • Ingår i: Supplemental Proceedings of the International Conference on Dependable Systems and Networks, DSN, 2008. - : IEEE Computer Society. ; , s. G40-G41
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    •    
  •  
25.
  • Asplund, Mikael, 1981-, et al. (författare)
  • Rapid selection and dissemination of urgent messages over delay-tolerant networks (DTNs)
  • 2015
  • Ingår i: Advances in Delay-Tolerant Networks (DTNs). - : Elsevier. - 9780857098405 - 9780857098467 ; , s. 187-203
  • Bokkapitel (refereegranskat)abstract
    • Today many new applications are emerging that take advantage of wireless communication in handheld and embedded devices. Some of these emerging applications, such as information sharing in vehicular systems, have strong requirements for timely message dissemination, even if the network is not always 100% connected. In this chapter we discuss message differentiation mechanisms that can be used in intermittently connected networks to improve delivery and latency properties when messages have a limited time to live in the network. We present a simulation-based study on a large-scale vehicular scenario comparing different prioritisation mechanisms for a partition-tolerant manycast protocol. We show that negative effects of overloads can be significantly reduced by using information within the message about how far it has spread and how much time is remaining.
  •  
26.
  • Asplund, Matthias, et al. (författare)
  • Reliability and measurement accuracy of a condition monitoring system in an extreme climate : a case study of automatic laser scanning of wheel profiles
  • 2014
  • Ingår i: Proceedings of the Institution of mechanical engineers. Part F, journal of rail and rapid transit. - : SAGE Publications. - 0954-4097 .- 2041-3017. ; 228:6, s. 695-704
  • Tidskriftsartikel (refereegranskat)abstract
    • The Iron Ore Line (Malmbanan) is a 473 km long track section located in northern Sweden and has been in operation since 1903. This track section stretches through two countries, namely Sweden and Norway, and the main part of the track runs on the Swedish side, where the owner is the Swedish Government and the infrastructure manager is Trafikverket (the Swedish Transport Administration). The ore trains are owned and managed by the freight operator and mining company LKAB. Due to the high axle load exerted by transportation of the iron ore, 30 tonnes, and the high demand for a constant flow of ore and pellets, the track and wagons must be monitored and maintained on a regular basis. The condition of the wagon wheel is one of the most important aspects in this connection, and here the wheel profile plays an important role. For this reason an automatic laser-based wheel profile monitoring system (WPMS) has been installed on this line using a system lifecycle approach that is based on the reliability, availability, maintainability and safety (RAMS) approach for railways. The system was prepared and installed and is being operated in a collaborative project between the freight operator and infrastructure manager. The measurements are used to diagnose the condition of the wheels, and to further optimize their maintenance. This paper presents a study of the concepts and ideas of the WPMS, and the selection, installation and validation of the equipment using a system lifecycle approach that is based on RAMS for railways. Results from the profile measurements and validation are shown. The system’s reliability during performance in extreme climate conditions, with severe cold and large quantities of snow, is presented. Then the benefits, perceived challenges and acquired knowledge of the system are discussed, and an improved V-model for the lifecycle approach is presented.
  •  
27.
  • Asplund, Mikael, 1981- (författare)
  • Restoring Consistency after Network Partitions
  • 2007
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The software industry is facing a great challenge. While systems get more complex and distributed across the world, users are becoming more dependent on their availability. As systems increase in size and complexity so does the risk that some part will fail. Unfortunately, it has proven hard to tackle faults in distributed systems without a rigorous approach. Therefore, it is crucial that the scientific community can provide answers to how distributed computer systems can continue functioning despite faults.Our contribution in this thesis is regarding a special class of faults which occurs whennetwork links fail in such a way that parts of the network become isolated, such faults are termed network partitions. We consider the problem of how systems that have integrity constraints on data can continue operating in presence of a network partition. Such a system must act optimistically while the network is split and then perform a some kind of reconciliation to restore consistency afterwards.We have formally described four reconciliation algorithms and proven them correct. The novelty of these algorithms lies in the fact that they can restore consistency after network partitions in a system with integrity constraints and that one of the protocols allows the system to provide service during the reconciliation. We have implemented and evaluated the algorithms using simulation and as part of a partition-tolerant CORBA middleware. The results indicate that it pays off to act optimistically and that it is worthwhile to provide service during reconciliation.
  •  
28.
  • Asplund, Mikael, 1981-, et al. (författare)
  • Software-related Energy Footprint of a Wireless Broadband Module
  • 2011
  • Ingår i: The 9th ACM International Symposium on Mobility Management and Wireless Access (MobiWac). - New York, NY, USA : ACM. - 9781450309011
  • Konferensbidrag (refereegranskat)abstract
    • Energy economy in mobile devices is becoming an increasinglyimportant factor as the devices become more advancedand rich in features. A large part of the energy footprint of amobile device comes from the wireless communication module,and even more so as the amount of trac increases.In this paper we study the energy footprint of a mobilebroadband hardware module, and how it is aected by software,by performing systematic power consumption measurements.We show that there are several cases where thesoftware does not properly take into account the eect thatdata communication has on the power consumption. Thisopens up for potential energy savings by creating better applicationsthat are aware of the energy characteristics of thecommunication layer.
  •  
29.
  • Asplund, Mikael, 1981-, et al. (författare)
  • Specification, Implementation and Verification of Dynamic Group Membership for Vehicle Coordination
  • 2017
  • Ingår i: Dependable Computing (PRDC), 2017 IEEE 22nd Pacific Rim International Symposium on. - : IEEE. - 9781509056521 - 9781509056538 ; , s. 321-328
  • Konferensbidrag (refereegranskat)abstract
    • New advanced traffic management solutions with fully or semi-autonomous vehicles that communicate over a wireless interface to coordinate their driving decisions create new challenges in distributed computing. In this paper we address the problem of dynamic group membership in three stages. First, we propose three criteria to specify correctness and performance of the group views created by such algorithms in terms of soundness, completeness and freshness. Second, we develop a group membership protocol tailored for vehicular coordination. Finally, we show through simulation and model-based verification that the protocol does indeed meet the criteria and provide at least 95% perfect group membership views under as adverse conditions as 70% packet loss or very high churn rate.
  •  
30.
  • Asplund, Mikael, 1981-, et al. (författare)
  • Wireless Ad Hoc Dissemination for Search and Rescue
  • 2010
  • Ingår i: Proceedings of the 7th International ISCRAM Conference. - : ISCRAM.
  • Konferensbidrag (refereegranskat)abstract
    • In search and rescue scenarios local information on victims and other finds needs to be disseminated rapidly toother rescue workers and team leaders. However, post disaster scenarios may imply the collapse of informationinfrastructure including cellular communication and Internet connectivity. Even if we consider wireless ad hoccommunication as a means of information dissemination we should count on frequent loss of connectivity in thenetwork due to unpredictable mobility and sparse network topologies. In this paper we present the realization ofan existing manycast protocol (random walk gossip) on commodity handheld devices running the Androidplatform. This communication mode is used to demonstrate the potential for distributed informationdissemination on victims and finds. The application layer is an adaptation of an existing surveying informationtool (POSIT) which is now fully decentralized and relies on text communication to achieve energy efficiency.
  •  
31.
  • Asplund, Mikael, et al. (författare)
  • Worst-case latency of broadcast in intermittently connected networks
  • 2012
  • Ingår i: International Journal of Ad Hoc and Ubiquitous Computing. - : Inderscience. - 1743-8225 .- 1743-8233. ; 11:2-3, s. 125-138
  • Tidskriftsartikel (refereegranskat)abstract
    • Worst-case latency is an important characteristic of information dissemination protocols. However, in sparse mobile ad hoc networks where end-to-end connectivity cannot be achieved and store-carry-forward algorithms are needed, such worst-case analyses have not been possible to perform on real mobility traces due to lack of suitable models. We propose a new metric called delay expansion that reflects connectivity and reachability properties of intermittently connected networks. Using the delay expansion, we show how bounds on worst-case latency can be derived for a general class of broadcast protocols and a wide range of real mobility patterns. The paper includes theoretical results that show how worst-case latency can be related with delay expansion for a given mobility scenario, as well as simulations to validate the theoretical model.
  •  
32.
  • Bergman, Sara, et al. (författare)
  • Permissioned Blockchains and Distributed Databases : A Performance Study
  • 2020
  • Ingår i: Concurrency and Computation. - : John Wiley & Sons. - 1532-0626 .- 1532-0634. ; 32:12
  • Tidskriftsartikel (refereegranskat)abstract
    • Blockchains are increasingly studied in the context of new applications. Permissioned blockchains promise to deal with the issue of complete removal of trust, a notion that is currently the hallmark of the developed society. Before the idea is adopted in contexts where resource efficiency and fast operation is a requirement, one could legitimately ask the question: can permissioned blockchains match the performance of traditional large‐scale databases? This paper compares two popular frameworks, Hyperledger Fabric and Apache Cassandra, as representatives of permissioned blockchains and distributed databases, respectively. We compare their latency for varying workloads and network sizes. The results show that, for small systems, blockchains can start to compete with traditional databases, but also that the difference in consistency models and differences in setup can have a large impact on the resulting performance.
  •  
33.
  • Bianzino, Aruna Prem, et al. (författare)
  • Cooperative proxies: Optimally trading energy and quality of service in mobile devices
  • 2014
  • Ingår i: Computer Networks. - : Elsevier. - 1389-1286 .- 1872-7069. ; 75:Part A, s. 297-312
  • Tidskriftsartikel (refereegranskat)abstract
    • This work studies the energy and quality of service (QoS) trade-off in the context of mobile devices with two communication interfaces (a high energy and a low energy interface). We propose an optimisation scheme during underload scenarios where proxy groups are dynamically formed exploiting both interfaces. The scheme integrates a reward mechanism that compensates a proxy while carrying other group members’ traffic, and deals with churn (joining and leaving of nodes) in a cell area. For traffic flows that approximate knowledge about current services we show that the scheme can achieve energy savings of 60% for all mobile nodes as whole. We also demonstrate the impact on disruption-sensitive flows as a function of the traffic mix, and that the use of rewards for selection of proxies is a fair mechanism in the long term.
  •  
34.
  • Boeira, Felipe, 1992- (författare)
  • Authentic Communication and Trustworthy Location in Mobile Networks
  • 2023
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Widespread mobile network connectivity has changed society and, consequently, increased our dependency on its proper functioning for transportation, safety, finance, and more. This thesis is concerned with improving the security of mobile networks and focuses on two such instances: vehicular and cellular networks. We aim at mitigating certain security risks even in the presence of strong attackers, which could be manifested in the form of internal malicious agents in cellular network providers or connected vehicles compromised with malicious software, to mention a couple of examples. Within this scope, we target two main challenges: proving that a selected set of security protocols in vehicular and cellular networks guarantee the expected security properties and improving the trustworthiness of location information shared by neighbouring vehicles. Our contributions to security protocols involve employing formal methods to verify security properties in the vehicular communication protocol Ensemble and in the fifth generation of cellular networks (5G). The Ensemble protocol aims to enable multi-brand truck platooning and is currently in a prestandardisation effort in Europe. We report a potential weakness that was resolved in the latest versions and verify that strong security properties are fulfilled. To make verification tractable, we propose a strategy based on the hierarchy of cryptographic keys which may also be employed in protocols that have similar keying structures. In 5G, we identify a weakness that could be exploited to frame people into suspicion of serious crimes when lawful interception operations are conducted. We then design the changes required to guarantee non-frameability in 5G and formally verify the expected security properties. In the context of location trustworthiness, we design and evaluate a proof-of-location scheme tailored for vehicular networks called Vouch+. Vouch+ can operate in centralised or decentralised modes and combines location information shared by neighbouring vehicles (or the infrastructure) with a plausibility model to ensure the validity of the position claimed by other vehicles. Furthermore, we propose and evaluate reaction strategies that mitigate the studied position falsification attacks on vehicular platooning. Through our results, we demonstrate how mobile networks may benefit from employing rigorous methods to obtain higher assurance about their expected security properties. Furthermore, we show how considering increasing adversarial capabilities supports the assessment of these networks’ resilience and the design of new security mechanisms.  
  •  
35.
  • Boeira, Felipe, et al. (författare)
  • Decentralized proof of location in vehicular Ad Hoc networks
  • 2019
  • Ingår i: Computer Communications. - : ELSEVIER. - 0140-3664 .- 1873-703X. ; 147, s. 98-110
  • Tidskriftsartikel (refereegranskat)abstract
    • Future cooperative transportation systems will be highly dependent on correct situation awareness that can be established with the help of inter-vehicular communication. Location information from surrounding vehicles will most likely be used in such systems to make automated driving decisions, making it essential to guarantee location assurance. In this paper we propose Vouch+, which provides a scheme to improve trustworthiness of shared location information. The proposed scheme uses cryptographic primitives and mobility awareness to enable location proofs that work also in high-speed scenarios. Vouch+ takes a decentralized approach to establish trust in location information, but can also be used with future 5G infrastructure. The evaluation of Vouch+ using a synthetic dataset from the city of Cologne shows that using a decentralized approach is viable for cases where traffic is dense enough. In addition, simulation-based experiments show that Vouch+ is able to handle the high-mobility environment of vehicular networks and can counteract studied position-based attacks using reaction strategies.
  •  
36.
  • Boeira, Felipe, 1992-, et al. (författare)
  • Effects of Colluding Sybil Nodes in Message Falsification Attacks for Vehicular Platooning
  • 2017
  • Ingår i: 2017 IEEE Vehicular Networking Conference (VNC). - : IEEE. - 9781538609866 - 9781538609859 - 9781538609873
  • Konferensbidrag (refereegranskat)abstract
    • This paper studies the impact of vulnerabilities associated with the Sybil attack (through falsification of multiple identities) and message falsification in vehicular platooning. Platooning employs Inter-Vehicular Communication (IVC) to control a group of vehicles. It uses broadcast information such as acceleration, position, and velocity to operate a longitudinal control law. Cooperation among vehicles allows platoons to reduce fuel consumption and risks associated with driver mistakes. In spite of these benefits, the use of network communication to control vehicles exposes a relevant attack surface that can be exploited by malicious actors. To carry out this study, we evaluate five scenarios to quantify the potential impact of such attacks, identifying how platoons behave under varying Sybil attack conditions and what are the associated safety risks. This research also presents the use of location hijacking attack. In this attack, innocent vehicles that are not part of a platoon are used as a way to create trust bond between the false identities and the physical vehicles. We demonstrate that the ability to create false identities increases the effectiveness of message falsification attacks by making them easier to deploy and harder to detect in time.
  •  
37.
  • Boeira, Felipe, 1992-, et al. (författare)
  • Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol
  • 2022
  • Ingår i: 2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022). - : IEEE COMPUTER SOC. - 9781665484176 - 9781665484183 ; , s. 305-318
  • Konferensbidrag (refereegranskat)abstract
    • Vehicular networks will enable a range of novel applications to enhance road traffic efficiency, safety, and reduce fuel consumption. As for other cyber-physical systems, security is essential to the deployment of these applications and standardisation efforts are ongoing. In this paper, we perform a systematic security evaluation of a vehicular platooning protocol through a thorough analysis of the protocol and security standards. We tackle the complexity of the resulting model with a proof strategy based on a relation on keys. The key relation forms a partial order, which encapsulates both secrecy and authenticity dependencies. We show that our order-aware approach makes the verification feasible and proves authenticity properties along with secrecy of all keys used throughout the protocol.
  •  
38.
  • Boeira, Felipe, et al. (författare)
  • Mitigating Position Falsification Attacks in Vehicular Platooning
  • 2018
  • Ingår i: 2018 IEEE VEHICULAR NETWORKING CONFERENCE (VNC). - : IEEE. - 9781538694282
  • Konferensbidrag (refereegranskat)abstract
    • As connected vehicles are envisioned to provide novel intelligent transportation systems, cyberattacks and security schemes are becoming an increasing concern. Several studies have shown that algorithms that make use of location information from other vehicles, such as vehicular platoon controllers, are vulnerable to message falsification attacks. Moreover, the ability for an attacking vehicle to appear as several vehicles through a so-called Sybil attack can significantly increase the severity of the attack. In this paper, we investigate how these attacks can be detected using Vouch location proof scheme (by identifying false location messages) and propose several reaction strategies to mitigate them. We also show through simulation that it is possible to prevent collisions by reacting appropriately to the false beacons in time while not reacting to false positives coming from the detector.
  •  
39.
  • Boeira, Felipe, et al. (författare)
  • No Doppelganger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios
  • 2022
  • Ingår i: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 22). - New York, NY, USA : ASSOC COMPUTING MACHINERY. - 9781450392167 ; , s. 280-281
  • Konferensbidrag (refereegranskat)abstract
    • The expansion of mobile network capabilities throughout the decades has increased peoples exposure to the digital world, and the next generations of communication networks are expected to achieve ubiquitous connectivity and immersive use cases. Security and privacy concerns have arisen and are continuously taken into account in the design of mobile networks. However, a relevant limitation currently lies in the use of shared secrets for providing security and privacy to users. Ideally, we believe that users identities should be immune to impersonation as long as their own devices remain secure, notwithstanding the network operators and other entities potentially being compromised. In this paper, we develop this idea with the objective of providing the non-repudiation property, which represents a mitigation to its dual, impersonation.
  •  
40.
  • Boeira, Felipe, et al. (författare)
  • On the impact of sybil attacks in cooperative driving scenarios
  • 2017
  • Ingår i: 2017 IFIP Networking Conference (IFIP Networking) and Workshops. - : IEEE. - 9783901882944 - 9781538628294
  • Konferensbidrag (refereegranskat)abstract
    • Platooning employs a set of technologies to manage how a group of vehicles operates, including radar, GPS and Inter-Vehicular Communication (IVC). It uses broadcasted information such as acceleration, position and velocity to operate vehicle members of the platoon. Cooperation among vehicles allows platoons to reduce fuel consumption and risks associated with driver mistakes. In spite of these benefits, the use of IVC to control vehicles exposes a relevant attack surface that can be exploited by malicious actors. In this paper we study the impact of vulnerabilities associated with the Sybil attack (through falsification of multiple identities) and message falsification in vehicular platooning. Simulation results show that this attack may impact the longitudinal control and compromise the entire platoon control. © Copyright 2018 IEEE
  •  
41.
  • Boeira, Felipe, et al. (författare)
  • Provable Non-Frameability for 5G Lawful Interception
  • 2023
  • Ingår i: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023. - : ASSOC COMPUTING MACHINERY. - 9781450398596 ; , s. 109-120
  • Konferensbidrag (refereegranskat)abstract
    • Mobile networks have grown in size and relevance, with novel applications in areas including transportation, finance, and health. The wide use of mobile networks generates rich data about users, raising interest in using such data for law enforcement and antiterrorism through Lawful Interception (LI). Countries worldwide have established legal frameworks to conduct LI, and technical standards have been created for its implementation and deployment, but without sufficient (and rigorous) security controls. While LI originated for benign purposes, we show in this paper that malicious entities could exploit it to frame users into suspicion of criminal activity. Further, we propose a solution for non-frameability, which we formally prove uphold desired properties even in scenarios where attackers completely infiltrate the operator networks. To perform the formal verification, we extend prior work with a more complete model of the fifth generation (5G) of mobile networks in the Tamarin prover.
  •  
42.
  • Cucurull, Jordi, 1981-, et al. (författare)
  • Anomaly detection and mitigation for disaster area networks
  • 2010
  • Ingår i: Recent Advances in Intrusion Detection. - Berlin, Heidelberg : Springer Berlin/Heidelberg. - 9783642155116 - 3642155111 ; , s. 339-359
  • Bokkapitel (refereegranskat)abstract
    • One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common operational picture and thereby reliable dissemination are prevalent.In this paper we address anomaly detection in intermittently connected mobile ad hoc networks in which there is little or no knowledge about the actors on the scene, and opportunistic contacts together with a store-and-forward mechanism are used to overcome temporary partitions. The approach uses a statistical method for detecting anomalies when running a manycast protocol for dissemination of important messages to k receivers. Simulation of the random walk gossip (RWG) protocol combined with detection and mitigation mechanisms is used to illustrate that resilience can be built into a network in a fully distributed and attack-agnostic manner, at a modest cost in terms of drop in delivery ratio and additional transmissions. The approach is evaluated with attacks by adversaries that behave in a similar manner to fair nodes when invoking protocol actions.
  •  
43.
  • Cucurull, Jordi, et al. (författare)
  • Surviving Attacks in Challenged Networks
  • 2012
  • Ingår i: IEEE Transactions on Dependable and Secure Computing. - : IEEE Computer Society. - 1545-5971 .- 1941-0018. ; 9:6, s. 917-929
  • Tidskriftsartikel (refereegranskat)abstract
    • In the event of a disaster, telecommunication infrastructures can be severely damaged or overloaded. Hastily formed networks can provide communication services in an ad hoc manner. These networks are challenging due to the chaotic context where intermittent connection is the norm and the identity and number of participants cannot be assumed. In such environments malicious actors may try to disrupt the communications to create more chaos for their own benefit. This paper proposes a general security framework for monitoring and reacting to disruptive attacks. It includes a collection of functions to detect anomalies, diagnose them, and perform mitigation. The measures are deployed in each node in a fully distributed fashion, but their collective impact is a significant resilience to attacks, so the actors can disseminate information under adverse conditions. The approach is evaluated in the context of a simulated disaster area network with a many-cast dissemination protocol, Random Walk Gossip, with a store-and-forward mechanism. A challenging threat model where adversaries may 1) try to drain the resources both at node level (battery life) and network level (bandwidth), or 2) reduce message dissemination in their vicinity, without spending much of their own energy, is adopted. The results demonstrate that the approach diminishes the impact of the attacks considerably.
  •  
44.
  • Eidenskog, Maria, 1981-, et al. (författare)
  • Changing the world one engineer at a time – unmaking the traditional engineering education when introducing sustainability subjects
  • 2023
  • Ingår i: International Journal of Sustainability in Higher Education. - : EMERALD GROUP PUBLISHING LTD. - 1467-6370 .- 1758-6739. ; 24:9, s. 70-84
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose: The information technology (IT) sector has been seen as central to society's transformation to a more just and sustainable society, which underlines teachers’ responsibility to foster engineers who can contribute specifically to such ends. This study aims to report an effort to significantly update an existing engineering programme in IT with this ambition and to analyse the effects and challenges associated with the transformation.Design/methodology/approach: This study is based on a combination of action-oriented research based on implementing key changes to the curriculum; empirical investigations including surveys and interviews with students and teachers, and analysis of these; and a science and technology studies-inspired analysis.Findings: Respondents were generally positive towards adding topics relating to sustainability. However, in the unmaking of traditional engineering subjects, changes created a conflict between core versus soft subjects in which the core subjects tended to gain the upper hand. This conflict can be turned into productive discussions by focusing on what kinds of engineers the authors’ educate and how students can be introduced to societal problems as an integrated part of their education.Practical implications: This study can be helpful for educators in the engineering domain to support them in their efforts to transition from a (narrow) focus on traditional disciplines to one where the bettering of society is at the core.Originality/value: This study provides a novel approach to the transformation of engineering education through a theoretical analysis seldom used in studies of higher education on a novel case study.
  •  
45.
  • Ekstrand, Fredrik, et al. (författare)
  • Resource Limited Hardware-based Stereo Matching for High-Speed Vision System
  • 2011
  • Ingår i: ICARA 2011 - Proceedings of the 5th International Conference on Automation, Robotics and Applications. - 9781457703287 ; , s. 465-469
  • Konferensbidrag (refereegranskat)abstract
    • This paper proposes a limited implementation of areabasedstereo matching for minimal resource utilization. It shows that it is possible to achieve an acceptable disparity map without the use of expensive resources. The matching accuracy for the single-row SAD can even outperform that of its full-row counterpart. Additionally, it excels in terms of frame rate and resource utilization, and is highly suitable for real-time stereo-vision systems.
  •  
46.
  • Ekstrand, Fredrik, et al. (författare)
  • Utilization and Performance Considerations in Resource Optimized Stereo Matching for Real-Time Reconfigurable Hardware
  • 2012
  • Ingår i: VISAPP 2012 - Proceedings of the International Conference on Computer Vision Theory and Application, vol. 2. - 9789898565044 ; , s. 415-418
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • This paper presents a set of approaches for increasing the accuracy of basic area-based stereo matching methods. It is targeting real-time FPGA systems for dense disparity map estimation. The methods are focused on low resource usage and maximized improvement per cost unit to enable the inclusion of an autonomous system in an FPGA. The approach performs on par with other area-matching implementations, but at substantially lower resource usage. Additionally, the solution removes the requirement for external memory for reconfigurable hardware together with the limitation in image size accompanying standard methods. As a fully piped complete on-chip solution, it is highly suitable for real-time stereo-vision systems, with a frame rate over 100 fps for Megapixel images.
  •  
47.
  • Emygdio de Melo, Carlos Felipe, et al. (författare)
  • UAVouch : A Secure Identity and Location Validation Scheme for UAV-Networks
  • 2021
  • Ingår i: IEEE Access. - Piscataway : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 9, s. 82930-82946
  • Tidskriftsartikel (refereegranskat)abstract
    • Emerging surveillance applications of UAV teams rely on secure communication to exchange information, coordinate their movements, and fulfill mission objectives. Protecting the network by identifying malicious nodes that are trying to disturb the system is an important task, particularly in the military domain. This paper presents the design and evaluation of UAVouch, an identity and location validation scheme that combines a public-key based authentication mechanism with a movement plausibility check for groups of UAVs. The key idea of UAVouch is to supplement the authentication mechanism by periodically checking the plausibility of the locations of neighboring UAVs, allowing the detection of intruders that are unable to follow expected trajectories. The proposed solution was evaluated in a simulated military surveillance scenario in which it detected malicious nodes’ position falsification attacks with an average accuracy of above 85%. © Copyright 2021 IEEE
  •  
48.
  • Fagerberg, Linn, et al. (författare)
  • Analysis of the human tissue-specific expression by genome-wide integration of transcriptomics and antibody-based proteomics
  • 2014
  • Ingår i: Molecular & Cellular Proteomics. - 1535-9476 .- 1535-9484. ; 13:2, s. 397-406
  • Tidskriftsartikel (refereegranskat)abstract
    • Global classification of the human proteins with regards to spatial expression patterns across organs and tissues is important for studies of human biology and disease. Here, we used a quantitative transcriptomics analysis (RNA-Seq) to classify the tissue-specific expression of genes across a representative set of all major human organs and tissues and combined this analysis with antibody- based profiling of the same tissues. To present the data, we launch a new version of the Human Protein Atlas that integrates RNA and protein expression data corresponding to 80% of the human protein-coding genes with access to the primary data for both the RNA and the protein analysis on an individual gene level. We present a classification of all human protein-coding genes with regards to tissue-specificity and spatial expression pattern. The integrative human expression map can be used as a starting point to explore the molecular constituents of the human body.
  •  
49.
  • Grimsdal, Gunnar, et al. (författare)
  • Can Microkernels Mitigate Microarchitectural Attacks?
  • 2019
  • Ingår i: Secure IT Systems. - Cham : Springer. - 9783030350543 - 9783030350550 ; , s. 238-253
  • Bokkapitel (refereegranskat)abstract
    • Microarchitectural attacks such as Meltdown and Spectre have attracted much attention recently. In this paper we study how effective these attacks are on the Genode microkernel framework using three different kernels, Okl4, Nova, and Linux. We try to answer the question whether the strict process separation provided by Genode combined with security-oriented kernels such as Okl4 and Nova can mitigate microarchitectural attacks. We evaluate the attack effectiveness by measuring the throughput of data transfer that violates the security properties of the system. Our results show that the underlying side-channel attack Flush+Reload used in both Meltdown and Spectre, is effective on all investigated platforms. We were also able to achieve high throughput using the Spectre attack, but we were not able to show any effective Meltdown attack on Okl4 or Nova.
  •  
50.
  • Holscher, Anton, et al. (författare)
  • Evaluation of an SDN-based Microservice Architecture
  • 2022
  • Ingår i: PROCEEDINGS OF THE 2022 IEEE 8TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2022): NETWORK SOFTWARIZATION COMING OF AGE: NEW CHALLENGES AND OPPORTUNITIES. - : IEEE. - 9781665406949 ; , s. 151-156
  • Konferensbidrag (refereegranskat)abstract
    • Microservice architectures decompose applications into individual components for enhanced maintainability and horizontal scaling, but also comes with an increased cost for orchestrating the services. Software-Defined Networks (SDNs) enables the dynamic configuration of network switches using controllers. In this paper we propose a microservice architecture that leverages SDN to orchestrate the microservices with the goal of reducing the orchestration latency cost. We perform a set of experiments using Mininet in which we implement a tailor-made microservice application that uses SDN for orchestration in combination with a set of different controllers and load balancers. Our results show that our proposed architecture performs in the same order of magnitude as a corresponding monolithic system.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-50 av 88
Typ av publikation
konferensbidrag (43)
tidskriftsartikel (22)
bokkapitel (7)
doktorsavhandling (6)
licentiatavhandling (6)
rapport (3)
visa fler...
annan publikation (1)
visa färre...
Typ av innehåll
refereegranskat (66)
övrigt vetenskapligt/konstnärligt (22)
Författare/redaktör
Nadjm-Tehrani, Simin (17)
Asplund, Lars (9)
Nadjm-Tehrani, Simin ... (9)
Ahlberg, Carl (8)
Ekström, Mikael (8)
Ekstrand, Fredrik (8)
visa fler...
Spampinato, Giacomo (7)
Lidholm, Jörgen (5)
Rantatalo, Matti (4)
Vinel, Alexey, 1983- (3)
Asplund, Fredrik, 19 ... (3)
Pignaton de Freitas, ... (2)
Leifler, Ola, 1978- (2)
Galar, Diego (2)
Wandt, Karina (2)
Oksvold, Per (1)
Pontén, Fredrik (1)
Hansson, Hans (1)
Sivertsson, Åsa (1)
Uhlén, Mathias (1)
von Feilitzen, Kalle (1)
Huss, Mikael (1)
Schwenk, Jochen M. (1)
Nilsson, Peter (1)
Fagerberg, Linn (1)
Groop, Leif (1)
Lindskog, Cecilia (1)
Törngren, Martin, 19 ... (1)
Ahlqvist, Emma (1)
Mardinoglu, Adil, 19 ... (1)
Lennartson, Bengt, 1 ... (1)
Asplund, Lillemor (1)
Odeberg, Jacob (1)
Campeanu, Gabriel (1)
Ciccozzi, Federico (1)
Feljan, Juraj (1)
Gustavsson, Andreas (1)
Sentilles, Séverine (1)
Svogor, Ivan (1)
Segerblad, Emil (1)
Gurtov, Andrei (1)
Gurtov, Andrei, 1979 ... (1)
Pattou, Francois (1)
Islami, Lejla (1)
Nilsson, Ulf, Profes ... (1)
Sandberg, Henrik, Pr ... (1)
Danielsson, Frida (1)
Remberger, Mikael (1)
Raverdy, Violeta (1)
Ekstedt, Mathias (1)
visa färre...
Lärosäte
Linköpings universitet (59)
Mälardalens universitet (11)
Kungliga Tekniska Högskolan (6)
Luleå tekniska universitet (6)
Högskolan i Halmstad (4)
Chalmers tekniska högskola (2)
visa fler...
Karolinska Institutet (2)
Uppsala universitet (1)
Högskolan Väst (1)
Lunds universitet (1)
Naturvårdsverket (1)
Mittuniversitetet (1)
Karlstads universitet (1)
Försvarshögskolan (1)
IVL Svenska Miljöinstitutet (1)
visa färre...
Språk
Engelska (85)
Svenska (3)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (40)
Teknik (33)
Medicin och hälsovetenskap (3)
Samhällsvetenskap (3)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy