![]() The resource-demanding nature of real-world tests makes it indispensable to develop and improve the efficiency of virtual environment based testing methods. Testing self-driving vehicles is still a new and immature process the globally harmonised procedure expected much later. Simulation results for h–nearest neighbor platoon formations along with experimental results using the scaled cars governed by robotic operating system (ROS) verify the effectiveness of the method. Besides, the impacts of increasing the connectivity among the nodes on the security level of the platoon are presented. Furthermore, we study the effects of different information flow topologies, namely, the unidirectional and bidirectional data transfer structures. Both cases of single attacker–single defender and multiple attackers–multiple defenders cases are investigated. ![]() Thus, based on the defined game and its optimal equilibrium point, the defender(s) selects optimal actuator placement action to face the attacker(s). The attacker tries to minimize this energy while the defender attempts to maximize it. ![]() The game payoff is the energy needed by the attacker to steer the consensus follower–leader dynamics of the system towards his desired direction. This paper proposes a general approach to find an optimal actuator placement strategy according to the Stackelberg game between the attacker and the defender. One (or more) external intelligent intruder(s) might attack one (or more) of the vehicles participating in a platoon. Vehicle platooning, as a large class of cyber‐physical systems, is prone to be under the risk of cyber attacks. Furthermore, the security comparison and efficiency analysis indicate that the proposed construction is reasonable with regard to security and viable in terms of efficiency to be applied to practical scenarios as vehicle‐data sharing in cloud computing. The proposed SCF‐IBEET construction achieves one‐wayness under chosen‐identity and chosen‐ciphertext attacks, indistinguishability under chosen‐identity and chosen‐ciphertext attacks, and trapdoor anonymity securities with respect to five different types of adversaries. Therefore, this article introduces the notion of secure‐channel‐free IBEET (SCF‐IBEET) scheme and presents a generic construction of the SCF‐IBEET scheme by addressing the above‐mentioned issues simultaneously. ![]() However, the existing IBEET schemes are unable to be applicable into the vehicle‐data sharing in cloud computing due to the fact that they did not consider the consequences of unexpected exposure of trapdoors given to cloud server and different levels of computing capabilities of the system entities. Identity‐based encryption with equality test (IBEET) is a viable solution to this challenge as it not only ensures data privacy but also enables searchable functionality over the encrypted data while dealing with the certificate management issue that exists in public key encryption with equality test (PKEET). ![]() However, the untrusted nature of the cloud server raises a challenge on how to balance privacy and functionality over the vehicle‐data outsourced to the vehicle‐data sharing system. Taking advantage of cloud computing, enabling a vehicle‐data sharing system can make various services based on vehicle‐data available. With the rapid rise of connected vehicles on the road, there is an exponential growth in vehicle‐related data (vehicle‐data) generated and accumulated by connected vehicles. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |