Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324849
A. Morar, Maria Anca Balutoiu, A. Moldoveanu, F. Moldoveanu, Alexandru Butean, V. Asavei
Augmented reality has become a very powerful tool nowadays. With the recent technological advance, smartphones have the ability to display augmented content on the screen. What makes the difference is the naturalness with which the multimedia content is superimposed over the video stream acquired with the phone's camera. This perfect overlay depends on the accurate estimation of the position and orientation of the smartphone's camera relative to the 3D representation of the space. ARCore is an augmented reality framework that computes the position and orientation of the smartphone. In order to assess the possibility of integrating ARCore within a virtual and augmented reality platform, we evaluated the accuracy of the ARCore localization technology, using the HTC Vive system as a reference. We designed an evaluation methodology, along with visualization tools that enable a thorough comparison between these two technologies.
{"title":"Evaluation of the ARCore Indoor Localization Technology","authors":"A. Morar, Maria Anca Balutoiu, A. Moldoveanu, F. Moldoveanu, Alexandru Butean, V. Asavei","doi":"10.1109/RoEduNet51892.2020.9324849","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324849","url":null,"abstract":"Augmented reality has become a very powerful tool nowadays. With the recent technological advance, smartphones have the ability to display augmented content on the screen. What makes the difference is the naturalness with which the multimedia content is superimposed over the video stream acquired with the phone's camera. This perfect overlay depends on the accurate estimation of the position and orientation of the smartphone's camera relative to the 3D representation of the space. ARCore is an augmented reality framework that computes the position and orientation of the smartphone. In order to assess the possibility of integrating ARCore within a virtual and augmented reality platform, we evaluated the accuracy of the ARCore localization technology, using the HTC Vive system as a reference. We designed an evaluation methodology, along with visualization tools that enable a thorough comparison between these two technologies.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"21 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124468291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324871
Alexandru Vochescu, Ioana Culic, Alexandru Radovici
One of the most engaging domains in the IT technology is represented by the Internet of Things (loT) area. IoT solution are more and more present in our lives: from the daily-use devices such as smart watches or rings, to more peculiar applications such as smart tables or smart home fragrances. As a result of this development, IoT technologies can become intrusive as they have access to a lot of our personal data and are able to control an increasing number of aspects of our lives. As a result, IoT is currently viewed by many individuals and companies from a security issue perspective. Many of the security threats related to the IoT technologies come from the way software and applications are implemented or from the programming frameworks used. What is more, as the applications become increasingly complex and the hardware devices increasingly constrained, many security mechanisms cannot be applied. The purpose of this paper is to present a multi-layer secure framework dedicated to hardware-constrained devices.
{"title":"Multi-Layer Security Framework for IoT Devices","authors":"Alexandru Vochescu, Ioana Culic, Alexandru Radovici","doi":"10.1109/RoEduNet51892.2020.9324871","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324871","url":null,"abstract":"One of the most engaging domains in the IT technology is represented by the Internet of Things (loT) area. IoT solution are more and more present in our lives: from the daily-use devices such as smart watches or rings, to more peculiar applications such as smart tables or smart home fragrances. As a result of this development, IoT technologies can become intrusive as they have access to a lot of our personal data and are able to control an increasing number of aspects of our lives. As a result, IoT is currently viewed by many individuals and companies from a security issue perspective. Many of the security threats related to the IoT technologies come from the way software and applications are implemented or from the programming frameworks used. What is more, as the applications become increasingly complex and the hardware devices increasingly constrained, many security mechanisms cannot be applied. The purpose of this paper is to present a multi-layer secure framework dedicated to hardware-constrained devices.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"31 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324845
Lucian Florin Ilca, T. Balan
The Industrial Control Systems (ICS) and its sub-processes, hardware and software, make possible the management and operation of industrial critical infrastructure and services such as: energy, water, defense, transportation. Nowadays, the biggest vendors on the market started developing for the ICS marketplace new systems with more power, control, stability, but these complex systems are susceptible to different threats such as: insider attack, third-party, technical or physical failure, external attacks. Therefore, is critical to protect ICS assets. Paying attention to the ISA/IEC 62443 standard, this paper is proposing methods for source code analysis using open source tools that can be used in development or testing phase by ICS professionals in order to detect new vulnerabilities and bugs (e.g. weak encryption, code disclosure, clear text passwords) using a vulnerability remediation management tool in order to have a complete view of new and existing security breaches. The purpose of this research paper is providing valuable information to ICS developers to increase security level in the production area with very little effort for the Internet exposed Programmable Logic Controllers (PLC).
{"title":"Vulnerability Remediation in ICS Infrastructure Based on Source Code Analysis","authors":"Lucian Florin Ilca, T. Balan","doi":"10.1109/RoEduNet51892.2020.9324845","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324845","url":null,"abstract":"The Industrial Control Systems (ICS) and its sub-processes, hardware and software, make possible the management and operation of industrial critical infrastructure and services such as: energy, water, defense, transportation. Nowadays, the biggest vendors on the market started developing for the ICS marketplace new systems with more power, control, stability, but these complex systems are susceptible to different threats such as: insider attack, third-party, technical or physical failure, external attacks. Therefore, is critical to protect ICS assets. Paying attention to the ISA/IEC 62443 standard, this paper is proposing methods for source code analysis using open source tools that can be used in development or testing phase by ICS professionals in order to detect new vulnerabilities and bugs (e.g. weak encryption, code disclosure, clear text passwords) using a vulnerability remediation management tool in order to have a complete view of new and existing security breaches. The purpose of this research paper is providing valuable information to ICS developers to increase security level in the production area with very little effort for the Internet exposed Programmable Logic Controllers (PLC).","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324870
Octavian Grigorescu, Cristian Sandescu, Alexandru Caba
The goal of this project is to create an intelligent system that will be installed under a cybernetic infrastructure, with the purpose of detecting cyber-attacks and learning about their methods of scanning and penetrating. For this project, we aim to examine data generated by the attacker's actions and highlight the value of information provided by them. Thus, we create honeypots that hold “Capture the Flag” type of games in the area of web applications. These games have multiple challenges of varying difficulties aiming to keep the attacker busy in order to learn his behavior. We created a web application with multiple vulnerabilities and published the honeypot in the exposed internet for about 2 months. During this period, we discovered a lot of noise produced by the bots and scrappers that tried to find out relevant information from the machine. Besides this, we found 2 attempts of human interaction that succeeded to solve a couple of vulnerabilities and gave up at one point leaving the challenges unfinished.
{"title":"Web Application Honeypot Published in the Wild","authors":"Octavian Grigorescu, Cristian Sandescu, Alexandru Caba","doi":"10.1109/RoEduNet51892.2020.9324870","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324870","url":null,"abstract":"The goal of this project is to create an intelligent system that will be installed under a cybernetic infrastructure, with the purpose of detecting cyber-attacks and learning about their methods of scanning and penetrating. For this project, we aim to examine data generated by the attacker's actions and highlight the value of information provided by them. Thus, we create honeypots that hold “Capture the Flag” type of games in the area of web applications. These games have multiple challenges of varying difficulties aiming to keep the attacker busy in order to learn his behavior. We created a web application with multiple vulnerabilities and published the honeypot in the exposed internet for about 2 months. During this period, we discovered a lot of noise produced by the bots and scrappers that tried to find out relevant information from the machine. Besides this, we found 2 attempts of human interaction that succeeded to solve a couple of vulnerabilities and gave up at one point leaving the challenges unfinished.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114578265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/roedunet51892.2020.9324851
Grigore Lupescu, N. Tapus
The integrated GPU is nowadays found in many consumer and industrial System on Chips, and poses unique challenges to program (thermal, power, shared resources etc.). The goal of this work is to identify several key aspects in a compute framework (basic design, execution models, data communication, fault tolerance and latency), which handle the integrated GPU limitations and provide a proper abstraction.
{"title":"Compute framework aspects for integrated GPUs","authors":"Grigore Lupescu, N. Tapus","doi":"10.1109/roedunet51892.2020.9324851","DOIUrl":"https://doi.org/10.1109/roedunet51892.2020.9324851","url":null,"abstract":"The integrated GPU is nowadays found in many consumer and industrial System on Chips, and poses unique challenges to program (thermal, power, shared resources etc.). The goal of this work is to identify several key aspects in a compute framework (basic design, execution models, data communication, fault tolerance and latency), which handle the integrated GPU limitations and provide a proper abstraction.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128660205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/roedunet51892.2020.9324885
Răzvan-Bogdan-Audrei Rădoi, R. Rughinis
Recent developments in the field of Machine Learning have resulted in great progress, both academically and commercially, in various applications. The success of these applications comes from being able to either predict or categorize series or elements that, before, could not be analyzed using classical statistical methods, thus solving complex, real problems that people are facing daily. Traffic is one of the most common issues in urban areas. It causes delays and frustration to both people and businesses, impacting billions across the globe. It is one of the greatest problems of the contemporary world. We propose a heterogeneous, distributed system that is able to provide traffic predictions at scale, with tremendous precision and consistency, using novel learning models and cloud-based system technologies. In a case study on data collected from Puget Sound, Washington, in 2017, we measure the precision of our novel system at an average of below 1 km/h. At the 90th percentile, the model is still able to provide valuable predictions, with an absolute error under 5 km/h.
{"title":"A Heterogenous System for Traffic Prediction","authors":"Răzvan-Bogdan-Audrei Rădoi, R. Rughinis","doi":"10.1109/roedunet51892.2020.9324885","DOIUrl":"https://doi.org/10.1109/roedunet51892.2020.9324885","url":null,"abstract":"Recent developments in the field of Machine Learning have resulted in great progress, both academically and commercially, in various applications. The success of these applications comes from being able to either predict or categorize series or elements that, before, could not be analyzed using classical statistical methods, thus solving complex, real problems that people are facing daily. Traffic is one of the most common issues in urban areas. It causes delays and frustration to both people and businesses, impacting billions across the globe. It is one of the greatest problems of the contemporary world. We propose a heterogeneous, distributed system that is able to provide traffic predictions at scale, with tremendous precision and consistency, using novel learning models and cloud-based system technologies. In a case study on data collected from Puget Sound, Washington, in 2017, we measure the precision of our novel system at an average of below 1 km/h. At the 90th percentile, the model is still able to provide valuable predictions, with an absolute error under 5 km/h.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129004645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324875
V. Stefanescu, I. Radoi
With the latest technological advancements and the unprecedented number of Internet connected devices, digital health products have become an attractive topic. However, when it comes to self-diagnosis systems, even if the state-of-the-art applications are very popular, their functioning is undisclosed. There is no transparency in terms of dataset, medical contributions and symptom assessment algorithms. Therefore, this paper proposes an open-data, open-source and community-driven data aggregation system that can receive and validate medical contributions from around the world. The resulting dataset enables the development of heuristic-driven self-diagnosis systems that can provide the statistical likelihood of having a particular condition or disease. Our solution for obtaining this dataset aims to promote transparency and trust among these autonomous diagnosis systems. The aggregation pipeline is designed with guidance from medical specialists and the collected dataset will be validated, anonymized and made publicly available. A self-diagnosis system was designed as a proof-of-concept for the open-data platform. A symptom-disease knowledge database was used as dataset and the system was deployed on a cloud-native environment so it can be validated by doctors and users. The idea of having a publicly available and community-driven medical dataset was validated by 27 (93.1%) out of 29 interviewed doctors. The proof-of-concept was assessed as “correct” by 17 (58.6%) specialists out of the same 29 doctors, and as “satisfactory” by 23 (69.7%) users out of a total of 33 interviewed users.
{"title":"Autonomous Self-Diagnosis System","authors":"V. Stefanescu, I. Radoi","doi":"10.1109/RoEduNet51892.2020.9324875","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324875","url":null,"abstract":"With the latest technological advancements and the unprecedented number of Internet connected devices, digital health products have become an attractive topic. However, when it comes to self-diagnosis systems, even if the state-of-the-art applications are very popular, their functioning is undisclosed. There is no transparency in terms of dataset, medical contributions and symptom assessment algorithms. Therefore, this paper proposes an open-data, open-source and community-driven data aggregation system that can receive and validate medical contributions from around the world. The resulting dataset enables the development of heuristic-driven self-diagnosis systems that can provide the statistical likelihood of having a particular condition or disease. Our solution for obtaining this dataset aims to promote transparency and trust among these autonomous diagnosis systems. The aggregation pipeline is designed with guidance from medical specialists and the collected dataset will be validated, anonymized and made publicly available. A self-diagnosis system was designed as a proof-of-concept for the open-data platform. A symptom-disease knowledge database was used as dataset and the system was deployed on a cloud-native environment so it can be validated by doctors and users. The idea of having a publicly available and community-driven medical dataset was validated by 27 (93.1%) out of 29 interviewed doctors. The proof-of-concept was assessed as “correct” by 17 (58.6%) specialists out of the same 29 doctors, and as “satisfactory” by 23 (69.7%) users out of a total of 33 interviewed users.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122099461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/roedunet51892.2020.9324850
Ionut Cernica, N. Popescu
One of the most dangerous threats on the internet nowadays is phishing attacks. This type of attack can lead to data breaches, and with it to image and financial loss in a company. The most common technique to exploit this type of attack is by sending emails to the target users to trick them to send their credentials to the attacker servers. If the user clicks on the link from the email, then good detection is needed to protect the user credentials. Many papers presented Computer Vision as a good detection technique, but we will explain why this solution can generate lots of false positives in some important environments. This paper focuses on challenges of the Computer Vision detection technique and proposes a combination of multiple techniques together with Computer Vision technique in order to solve the challenges we have shown. We also will present a methodology to detect phishing attacks that will work with the proposed combination techniques.
{"title":"Computer Vision Based Framework For Detecting Phishing Webpages","authors":"Ionut Cernica, N. Popescu","doi":"10.1109/roedunet51892.2020.9324850","DOIUrl":"https://doi.org/10.1109/roedunet51892.2020.9324850","url":null,"abstract":"One of the most dangerous threats on the internet nowadays is phishing attacks. This type of attack can lead to data breaches, and with it to image and financial loss in a company. The most common technique to exploit this type of attack is by sending emails to the target users to trick them to send their credentials to the attacker servers. If the user clicks on the link from the email, then good detection is needed to protect the user credentials. Many papers presented Computer Vision as a good detection technique, but we will explain why this solution can generate lots of false positives in some important environments. This paper focuses on challenges of the Computer Vision detection technique and proposes a combination of multiple techniques together with Computer Vision technique in order to solve the challenges we have shown. We also will present a methodology to detect phishing attacks that will work with the proposed combination techniques.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324889
Eric-Bogdan Postolache, Darius Mihai, Marian Mihailescu, Sergiu Weisz, M. Barbulescu, M. Cărăbaş, N. Tapus
The FreeBSD specific hypervisor solution, bhyve, is a mature virtualization solution that allows its users to configure the virtual machines in a robust manner by adding different types of devices. Moreover, the virtual machine state can be suspended for a later use by using the snapshotting mechanism. However, the existing snapshot mechanism can only store the state of one device of each type. This behaviour may be troublesome for entities that want to use the save and restore mechanism for virtual machines with multiple same type devices (e.g., two disks, two network interfaces) since it can lead to an inconsistent virtual machine state. This paper proposes a solution for extending this feature by allowing the saving and restoration of multiple devices of the same type, whenever they are used together
{"title":"Suspend feature for multiple devices of same type in bhyve","authors":"Eric-Bogdan Postolache, Darius Mihai, Marian Mihailescu, Sergiu Weisz, M. Barbulescu, M. Cărăbaş, N. Tapus","doi":"10.1109/RoEduNet51892.2020.9324889","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324889","url":null,"abstract":"The FreeBSD specific hypervisor solution, bhyve, is a mature virtualization solution that allows its users to configure the virtual machines in a robust manner by adding different types of devices. Moreover, the virtual machine state can be suspended for a later use by using the snapshotting mechanism. However, the existing snapshot mechanism can only store the state of one device of each type. This behaviour may be troublesome for entities that want to use the save and restore mechanism for virtual machines with multiple same type devices (e.g., two disks, two network interfaces) since it can lead to an inconsistent virtual machine state. This paper proposes a solution for extending this feature by allowing the saving and restoration of multiple devices of the same type, whenever they are used together","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"C-17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126759599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/RoEduNet51892.2020.9324868
Z. Constantinescu, Monica Vladoiu
Amazing progress of various inter-related technologies, such as communications, automatic control, and embedded systems has changed the traditional vehicle model pushing it forward towards new paradigms: Internet of Vehicles, Connected Vehicles, Vehicular Clouds/Fogs, Fog Computing, Smart Vehicles, Intelligent IoV etc. However, implementing such paradigms is very challenging due to their extreme complexity, which prevents them to be a more substantial part of our daily life, at the full potential of the technology involved. To tackle such complexity, new approaches are necessary and, therefore, we propose here a user-centric architecture of a smart connected vehicle that can be used also for smart surrounding environments and that provides for autonomic, pervasive, and fog computing. Its current implementation in a connected vehicle is also shown.
{"title":"Towards Vehicular Fog Computing: an Architecture for Connected Vehicles and Vehicular Clouds","authors":"Z. Constantinescu, Monica Vladoiu","doi":"10.1109/RoEduNet51892.2020.9324868","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324868","url":null,"abstract":"Amazing progress of various inter-related technologies, such as communications, automatic control, and embedded systems has changed the traditional vehicle model pushing it forward towards new paradigms: Internet of Vehicles, Connected Vehicles, Vehicular Clouds/Fogs, Fog Computing, Smart Vehicles, Intelligent IoV etc. However, implementing such paradigms is very challenging due to their extreme complexity, which prevents them to be a more substantial part of our daily life, at the full potential of the technology involved. To tackle such complexity, new approaches are necessary and, therefore, we propose here a user-centric architecture of a smart connected vehicle that can be used also for smart surrounding environments and that provides for autonomic, pervasive, and fog computing. Its current implementation in a connected vehicle is also shown.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122966119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}