scholarly journals Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 43711-43724 ◽  
Author(s):  
Zeeshan Ali ◽  
Shehzad Ashraf Chaudhry ◽  
Muhammad Sher Ramzan ◽  
Fadi Al-Turjman
Digital Twin ◽  
2021 ◽  
Vol 1 ◽  
pp. 12
Author(s):  
Zhihan Lv ◽  
Shuxuan Xie

Advanced computer technologies such as big data, Artificial Intelligence (AI), cloud computing, digital twins, and edge computing have been applied in various fields as digitalization has progressed. To study the status of the application of digital twins in the combination with AI, this paper classifies the applications and prospects of AI in digital twins by studying the research results of the current published literature. We discuss the application status of digital twins in the four areas of aerospace, intelligent manufacturing in production workshops, unmanned vehicles, and smart city transportation, and we review the current challenges and  topics that need to be looked forward to in the future. It was found that the integration of digital twins and AI has significant effects in aerospace flight detection simulation, failure warning, aircraft assembly, and even unmanned flight. In the virtual simulation test of automobile autonomous driving, it can save 80% of the time and cost, and the same road conditions reduce the parameter scale of the actual vehicle dynamics model and greatly improve the test accuracy. In the intelligent manufacturing of production workshops, the establishment of a virtual workplace environment can provide timely fault warning, extend the service life of the equipment, and ensure the overall workshop operational safety. In smart city traffic, the real road environment is simulated, and traffic accidents are restored, so that the traffic situation is clear and efficient, and urban traffic management can be carried out quickly and accurately. Finally, we looked forward to the future of digital twins and AI, hoping to provide a reference for future research in related fields.


Author(s):  
Arseniy Bimbinov

This paper is devoted to identifying the most likely threats to the transport environment of a smart city. The analysis of the published plans for the development of the smart city transport environment in Russia and abroad allowed us to determine the main directions in this area. By means of modeling, approximate scenarios of harm to public relations are formulated. It is established that in relation to one of the possible threats (causing harm during the operation of unmanned vehicles), the current criminal legislation is powerless. It is determined that the regulation of issues related to «intellectual» technologies, including those related to harm caused by them, should be based on certain General provisions that have a universal character. The work was carried out with the financial support of the RFBR under agreement no. 19-29-069 mk.


2018 ◽  
Vol 8 (9) ◽  
pp. 1508 ◽  
Author(s):  
Israa Aziz ◽  
Hai Jin ◽  
Ihsan Abdulqadder ◽  
Zaid Hussien ◽  
Zaid Abduljabbar ◽  
...  

Self-reconfiguration in electrical power grids is a significant tool for their planning and operation during both normal and abnormal conditions. The increasing in employment of Intelligent Electronic Devices (IEDs), as well as the rapid growth of the new communication technologies have increased the application of Feeder Automation (FA) in Distribution Networks (DNs). In a Smart Grid (SG), automation equipment, such as a Smart Breaker (SB), is used. Using either a wired or a wireless network or even a combination of both, communication between the Control Center (CC) and SBs can be made. Nowadays, wireless technology is widely used in the communication of DNs. This may cause several security vulnerabilities in the power system, such as remote attacks, with the goal of cutting off the electrical power provided to significant consumers. Therefore, to preserve the cybersecurity of the system, there is a need for a secure scheme. The available literature investments proposed a heavyweight level in security schemes, while the overhead was not considered. To overcome this drawback, this paper presents an efficient lightweight authentication mechanism with the necessary steps to ensure real-time automatic reconfiguration during a fault. As a first stage, authentication will be made between CC and SB, SB then sends the information about its status. To ensure the integrity of the authentication exchange, a hash function is used, while the symmetric algorithm is used to ensure privacy. The applicability of the suggested scheme has been proved by conducting security performance and analysis. The proposed scheme will be injected on ABB medium voltage breaker with the REF 542plus controller. Therefore, the probable benefit of the suggested scheme is the contribution to provide more flexibility for electrical utilities in terms of reducing the overall computational overhead and withstanding to various types of attacks, while also opening new prospects in FA of SGs.


2021 ◽  
Vol 54 (13) ◽  
pp. 488-492
Author(s):  
Mark V. Mamchenko ◽  
Mariya A. Romanova ◽  
Peter M. Trefilov

2019 ◽  
Vol 6 (1) ◽  
pp. 288-296 ◽  
Author(s):  
Alireza Esfahani ◽  
Georgios Mantas ◽  
Rainer Matischek ◽  
Firooz B. Saghezchi ◽  
Jonathan Rodriguez ◽  
...  

2020 ◽  
Vol 150 ◽  
pp. 102496 ◽  
Author(s):  
Mohammad Wazid ◽  
Ashok Kumar Das ◽  
Vivekananda Bhat K ◽  
Athanasios V. Vasilakos

T-Comm ◽  
2020 ◽  
Vol 14 (8) ◽  
pp. 42-46
Author(s):  
Evgeniy M. Lobov ◽  
◽  
Dmitry N. Shubin ◽  
Nikolai A. Kandaurov ◽  
Elizaveta O. Lobova ◽  
...  

The article discusses an algorithm for generating a new class of polyphase pseudo-random sequences with a nonlinear generation algorithm for use in secure communication systems with spread spectrum technology. In particular, the proposed sequences are relevant to use for generating signals in a secure command radio link between unmanned vehicles located in different environments, and dispatch centers of the "smart city". An analysis of the existing ensembles and an assessment of their main characteristics are carried out. Namely, the size of the ensemble, which affects the security of the communication system, and the level of maximum emissions of the cross-correlation function. The existing ensembles of polyphase pseudo-random sequences do not simultaneously have satisfactory values of the considered indicators. Therefore, an urgent task is to develop an ensemble that finds a compromise between these two characteristics and has a nonlinear generation algorithm. The essence of the algorithm for the formation of the proposed new class of polyphase pseudo-random sequences is to expand the classical polyphase sequences, for example, Frank, Chu, or Milewski, which have good correlation properties, de Bruijn sequences with a large ensemble and a nonlinear formation algorithm. Comparative analysis of the proposed method for forming a class of polyphase sequences shows the advantage of its use. In particular, an improvement in cross-correlation characteristics and a significant increase in the size of the ensemble of new sequences compared to the original sequences are shown. These properties can be used to increase the structural secrecy of command radio links.


Sign in / Sign up

Export Citation Format

Share Document