RP

Radha Poovendran

Authored

8 records found

BARON

Base-Station Authentication Through Core Network for Mobility Management in 5G Networks

Fifth-generation (5G) cellular communication networks are being deployed on applications beyond mobile devices, including vehicular networks and industry automation. Despite their increasing popularity, 5G networks, as defined by the Third Generation Partnership Project (3GPP), h ...

Truck platoon security

State-of-the-art and road ahead

Trucks form a platoon, where they align in a lane on freeways, in order to save fuel. The trucks positioned behind the first truck in the platoon can save fuel because their air drag reduces. In a truck platoon, various technologies such as Adaptive Cruise Control (ACC) system an ...

Truck platoon security

State-of-the-art and road ahead

Trucks form a platoon, where they align in a lane on freeways, in order to save fuel. The trucks positioned behind the first truck in the platoon can save fuel because their air drag reduces. In a truck platoon, various technologies such as Adaptive Cruise Control (ACC) system an ...

EVExchange

A Relay Attack on Electric Vehicle Charging System

To support the increasing spread of Electric Vehicles (EVs), Charging Stations (CSs) are being installed worldwide. The new generation of CSs employs the Vehicle-To-Grid (V2G) paradigm by implementing novel standards such as the ISO 15118. This standard enables high-level communi ...

QEVSEC

Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer

Dynamic Wireless Power Transfer (DWPT) can be used for on-demand recharging of Electric Vehicles (EV) while driving. However, DWPT raises numerous security and privacy concerns. Recently, researchers demonstrated that DWPT systems are vulnerable to adversarial attacks. In an EV c ...

Guest Editorial

Cyber-Physical Threats and Solutions for Autonomous Transportation Systems

In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats due to the widespread use of legacy in-vehicle communication systems. As a representative legacy bus system, the Controller Area Network (CAN) hosts Electronic Control Units (ECUs) ...
The attacks that leverage the side-channels produced by processes running on mobile and IoT devices are a concrete threat for cyber–physical systems. This special issue is focused on the most recent research work that investigates novel aspects of this topic. This editorial summa ...